Chain equilibria in secure strategies

In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automation and remote control 2017-06, Vol.78 (6), p.1159-1172
Hauptverfasser: Iskakov, A. B., Iskakov, M. B.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1172
container_issue 6
container_start_page 1159
container_title Automation and remote control
container_volume 78
creator Iskakov, A. B.
Iskakov, M. B.
description In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players j > i but ignores the threats of players j < i provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.
doi_str_mv 10.1134/S0005117917060169
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1907343584</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1907343584</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</originalsourceid><addsrcrecordid>eNp1kE9LxDAQxYMoWFc_gLeCeKzOZNqkPUrxHyx4UM8hTdM1y9ruJu3Bb29KPQjiaRje770ZHmOXCDeIlN--AkCBKCuUIABFdcQSFFBmBMSPWTLL2ayfsrMQtgCIwClh1_WHdn1qD5PbucY7ncYtWDN5m4bR69FunA3n7KTTu2AvfuaKvT_cv9VP2frl8bm-W2eGUIyZsWUumqbNgaCoct1ITlA1LYpO8K4k0UkjUMsomKqllgtqhSk0SM3j4zmt2NWSu_fDYbJhVNth8n08qbACSTkV5UzhQhk_hOBtp_befWr_pRDU3Ib600b08MUTIttvrP-V_K_pGy4PXq0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1907343584</pqid></control><display><type>article</type><title>Chain equilibria in secure strategies</title><source>SpringerLink Journals</source><creator>Iskakov, A. B. ; Iskakov, M. B.</creator><creatorcontrib>Iskakov, A. B. ; Iskakov, M. B.</creatorcontrib><description>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players j &gt; i but ignores the threats of players j &lt; i provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</description><identifier>ISSN: 0005-1179</identifier><identifier>EISSN: 1608-3032</identifier><identifier>DOI: 10.1134/S0005117917060169</identifier><language>eng</language><publisher>Moscow: Pleiades Publishing</publisher><subject>Asymmetry ; Battlefields ; CAE) and Design ; Calculus of Variations and Optimal Control; Optimization ; Chains ; Competition ; Computer-Aided Engineering (CAD ; Control ; Economic models ; Game theory ; Mathematical Game Theory and Applications ; Mathematics ; Mathematics and Statistics ; Mechanical Engineering ; Mechatronics ; Players ; Robotics ; Security ; Systems Theory</subject><ispartof>Automation and remote control, 2017-06, Vol.78 (6), p.1159-1172</ispartof><rights>Pleiades Publishing, Ltd. 2017</rights><rights>Copyright Springer Science &amp; Business Media 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1134/S0005117917060169$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1134/S0005117917060169$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Iskakov, A. B.</creatorcontrib><creatorcontrib>Iskakov, M. B.</creatorcontrib><title>Chain equilibria in secure strategies</title><title>Automation and remote control</title><addtitle>Autom Remote Control</addtitle><description>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players j &gt; i but ignores the threats of players j &lt; i provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</description><subject>Asymmetry</subject><subject>Battlefields</subject><subject>CAE) and Design</subject><subject>Calculus of Variations and Optimal Control; Optimization</subject><subject>Chains</subject><subject>Competition</subject><subject>Computer-Aided Engineering (CAD</subject><subject>Control</subject><subject>Economic models</subject><subject>Game theory</subject><subject>Mathematical Game Theory and Applications</subject><subject>Mathematics</subject><subject>Mathematics and Statistics</subject><subject>Mechanical Engineering</subject><subject>Mechatronics</subject><subject>Players</subject><subject>Robotics</subject><subject>Security</subject><subject>Systems Theory</subject><issn>0005-1179</issn><issn>1608-3032</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LxDAQxYMoWFc_gLeCeKzOZNqkPUrxHyx4UM8hTdM1y9ruJu3Bb29KPQjiaRje770ZHmOXCDeIlN--AkCBKCuUIABFdcQSFFBmBMSPWTLL2ayfsrMQtgCIwClh1_WHdn1qD5PbucY7ncYtWDN5m4bR69FunA3n7KTTu2AvfuaKvT_cv9VP2frl8bm-W2eGUIyZsWUumqbNgaCoct1ITlA1LYpO8K4k0UkjUMsomKqllgtqhSk0SM3j4zmt2NWSu_fDYbJhVNth8n08qbACSTkV5UzhQhk_hOBtp_befWr_pRDU3Ib600b08MUTIttvrP-V_K_pGy4PXq0</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Iskakov, A. B.</creator><creator>Iskakov, M. B.</creator><general>Pleiades Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170601</creationdate><title>Chain equilibria in secure strategies</title><author>Iskakov, A. B. ; Iskakov, M. B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Asymmetry</topic><topic>Battlefields</topic><topic>CAE) and Design</topic><topic>Calculus of Variations and Optimal Control; Optimization</topic><topic>Chains</topic><topic>Competition</topic><topic>Computer-Aided Engineering (CAD</topic><topic>Control</topic><topic>Economic models</topic><topic>Game theory</topic><topic>Mathematical Game Theory and Applications</topic><topic>Mathematics</topic><topic>Mathematics and Statistics</topic><topic>Mechanical Engineering</topic><topic>Mechatronics</topic><topic>Players</topic><topic>Robotics</topic><topic>Security</topic><topic>Systems Theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Iskakov, A. B.</creatorcontrib><creatorcontrib>Iskakov, M. B.</creatorcontrib><collection>CrossRef</collection><jtitle>Automation and remote control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Iskakov, A. B.</au><au>Iskakov, M. B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chain equilibria in secure strategies</atitle><jtitle>Automation and remote control</jtitle><stitle>Autom Remote Control</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>78</volume><issue>6</issue><spage>1159</spage><epage>1172</epage><pages>1159-1172</pages><issn>0005-1179</issn><eissn>1608-3032</eissn><abstract>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players j &gt; i but ignores the threats of players j &lt; i provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</abstract><cop>Moscow</cop><pub>Pleiades Publishing</pub><doi>10.1134/S0005117917060169</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0005-1179
ispartof Automation and remote control, 2017-06, Vol.78 (6), p.1159-1172
issn 0005-1179
1608-3032
language eng
recordid cdi_proquest_journals_1907343584
source SpringerLink Journals
subjects Asymmetry
Battlefields
CAE) and Design
Calculus of Variations and Optimal Control
Optimization
Chains
Competition
Computer-Aided Engineering (CAD
Control
Economic models
Game theory
Mathematical Game Theory and Applications
Mathematics
Mathematics and Statistics
Mechanical Engineering
Mechatronics
Players
Robotics
Security
Systems Theory
title Chain equilibria in secure strategies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T01%3A03%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chain%20equilibria%20in%20secure%20strategies&rft.jtitle=Automation%20and%20remote%20control&rft.au=Iskakov,%20A.%20B.&rft.date=2017-06-01&rft.volume=78&rft.issue=6&rft.spage=1159&rft.epage=1172&rft.pages=1159-1172&rft.issn=0005-1179&rft.eissn=1608-3032&rft_id=info:doi/10.1134/S0005117917060169&rft_dat=%3Cproquest_cross%3E1907343584%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1907343584&rft_id=info:pmid/&rfr_iscdi=true