To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure firstname.lastname@example.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Given the relatively small industry scale of cow-calf operations in New York to other regions of the country, little is known about differences in determinant values for feeder cattle. Using auction prices and quality characteristics over 7 years, differences in market, lot, and quality parameters suggest opportunities for improved marketing performance. A delta profit model is constructed to inform timing of marketing decisions for producers. The results indicate a relatively high potential for producers to increase farm returns by delaying sales of lighter-weight feeder cattle from the fall to spring auction months, given sufficient rates of gain and reasonable overwintering costs.
The cooperative guidance problem of multiple inferior missiles intercepting a hypersonic target with the specific impact angle constraint in the two-dimensional plane is addressed in this paper, taking into consideration variations in a missile’s speed. The guidance law is designed with two subsystems: the direction of line-of-sight (LOS) and the direction of normal to LOS. In the direction of LOS, by applying the algebraic graph theory and the consensus theory, the guidance command is designed to make the system convergent in a finite time to satisfy the goal of cooperative interception. In the direction of normal to LOS, the impact angle is constrained to transform into the LOS angle at the time of interception. In view of the difficulty of measuring unknown target acceleration information in real scenarios, the guidance command is designed by utilising a super-twisting algorithm based on a nonsingular fast-terminal sliding mode (NFTSM) surface. Numerical simulation results manifest that the proposed guidance law performs efficiently and the guidance commands are free of chattering. In addition, the overall performance of this guidance law is assessed with Monte Carlo runs in the presence of measurement errors. The simulation results demonstrate that the robustness can be guaranteed, and that overall efficiency and accuracy in intercepting the hypersonic target are achieved.
Users in a social network are usually confronted with decision-making under uncertain network states. While there are some works in the social learning literature on how to construct belief in an uncertain network state, few studies have focused on integrating learning with decision-making for the scenario in which users are uncertain about the network state and their decisions influence each other. Moreover, the population in a social network can be dynamic since users may arrive at or leave the network at any time, which makes the problem even more challenging. In this chapter, we introduce a dynamic Chinese restaurant game to study how a user in a dynamic social network learns about the uncertain network state and makes optimal decisions by taking into account not only the immediate utility, but also subsequent users’ influence. We introduce a Bayesian learning-based method for users to learn the network state and discuss a multidimensional Markov decision process-based approach for users to make optimal decisions. Finally, we apply the dynamic Chinese restaurant game to cognitive radio networks and use simulations to verify the effectiveness of the scheme.
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, leading to substantial network inefficiency. To address this problem, we discuss how to enable cooperation among “group peers,” which are geographically neighboring peers with large intragroup upload and download bandwidths. Considering the peers’ selfish nature, we formulate the cooperative streaming problem as an evolutionary game and introduce, for every peer, the evolutionarily stable strategy (ESS). Moreover, we discuss a simple and distributed learning algorithm for the peers to converge to the ESSs. With the discussed algorithm, each peer decides whether to be an agent who downloads data from the peers outside the group or a free-rider who downloads data from the agents by simply tossing a coin, where the probability of the coin showing a head is learned from the peer’s own past payoff history. Simulation results show that compared to the traditional noncooperative P2P schemes, the discussed cooperative scheme achieves much better performance in terms of social welfare, probability of real-time streaming, and video quality.
In cognitive networks, how to stimulate cooperation among nodes is very important. However, most existing game-theoretic cooperation stimulation approaches rely on the assumption that the interactions between any pair of players are long-lasting. When this assumption is not true, such as in the well-known Prisoner’s dilemma and the backward induction principle, the unique Nash equilibrium is to always play noncooperatively. In this chapter, we discuss a cooperation stimulation scheme for the scenario in which the number of interactions is finite. This scheme is based on indirect reciprocity game modeling where the key concept is “I help you not because you have helped me but because you have helped others.” The problem of finding the optimal action rule is formulated as a Markov decision process, and a modified value-iteration algorithm is utilized to find the optimal action rule. Using the packet forwarding game as an example, it is shown that with an appropriate cost-to-gain ratio, the strategy of forwarding the number of packets that is equal to the reputation level of the receiver is an evolutionarily stable strategy.
In the third part of this book, the third branch of modern game theory – sequential decision-making – is presented. The important components in sequential decision-making, such as network externality, information asymmetry, and user rationality, are presented and defined. The limitations of the existing approaches, such as social learning and multiarm bandit problems, are also presented.
The viability of cooperative communications depends on the willingness of users to help. Therefore, it is important to study incentive issues when designing such systems. In this chapter, we discuss a cooperation stimulation scheme for multiuser cooperative communications using an indirect reciprocity game. By introducing the notion of reputation and social norms, rational users who care about their future utility are incentivized to cooperate with others. Differently from existing works on reputation-based schemes that mainly rely on experimental verification, the effectiveness of the scheme is demonstrated in two steps. First, we conduct a steady-state analysis of the game and show that cooperating with users who have a good reputation can be sustained as an equilibrium when the cost-to-gain ratio is below a certain threshold. Then, by modeling the action spreading at transient states as an evolutionary game, we show that the equilibria we found in the steady-state analysis are stable and can be reached with proper initial conditions. Moreover, we introduce energy detection to handle the possible cheating behaviors of users and study its impact on the indirect reciprocity game.
A huge amount of information, created and forwarded by millions of people with various characteristics, propagates through online social networks every day. Understanding the mechanisms of information diffusion over social networks is critical to various applications, including online advertisements and website management. Differently from most existing works in this area, we investigate information diffusion from an evolutionary game-theoretic perspective and try to reveal the underlying principles dominating the complex information diffusion process over heterogeneous social networks. Modeling the interactions among the heterogeneous users as a graphical evolutionary game, we derive the evolutionary dynamics and the evolutionarily stable states (ESSs) of the diffusion. The different payoffs of the heterogeneous users lead to different diffusion dynamics and ESSs among them, in accordance with the heterogeneity observed in real-world data sets. The theoretical results are confirmed by simulations. We also test the theory on the Twitter hashtag data set. We observe that the evolutionary dynamics fit the data well and can predict future diffusion data.
Network service acquisition in a wireless environment requires the selection of a wireless access network. A key problem in wireless access network selection is studying rational strategies that consider negative network externality. In this chapter, we formulate the wireless network selection problem as a stochastic game with negative network externality and show that finding the optimal decision rule can be modeled as a multidimensional Markov decision process. A modified value-iteration algorithm is utilized to efficiently obtain the optimal decision rule with a simple threshold structure. We further investigate the mechanism design problem with incentive compatibility constraints, which force the networks to reveal truthful state information. The formulated problem is a mixed-integer programming problem that, in general, lacks an efficient solution. Exploiting the optimality of substructures, we introduce a dynamic programming algorithm that can optimally solve the problem in the two-network scenario. For the multinetwork scenario, the dynamic programming algorithm can outperform the heuristic greedy approach in polynomial-time complexity.
In a social network, agents are intelligent and have the capacity to make decisions so as to maximize their utility. They can either make wise decisions by taking advantages of other agents’ experiences through learning or make decisions earlier to avoid competition from huge crowds. Both of these effects – social learning and negative network externality – play important roles in the decision-making process of an agent. In this chapter, a new game called the Chinese restaurant game is introduced to formulate the social learning problem with negative network externality. Through analyzing the Chinese restaurant game, we derive the optimal strategy of each agent and provide a recursive method to achieve the optimal strategy. How social learning and negative network externality influence each other under various settings is studied through simulations. We also illustrate the spectrum access problem in cognitive radio networks as one application of the Chinese restaurant game. We find that the Chinese restaurant game-theoretic approach indeed helps users make better decisions and improves overall system performance.
Many spectrum sensing methods and dynamic access algorithms have been proposed to improve secondary users’ access opportunities. However, few of them have considered integrating the design of spectrum sensing and access algorithms together by taking into account the mutual influence between them. In this chapter, we focus on jointly analyzing the spectrum sensing and access problem. Due to their selfish nature, secondary users tend to act selfishly to access the channel without contributing to spectrum sensing. Moreover, they may employ out-of-equilibrium strategies because of the uncertainty of others’ strategies. To model the complicated interactions among secondary users, the joint spectrum sensing and access problem is formulated as an evolutionary game and the evolutionarily stable strategy (ESS) that no one will deviate from is studied. Furthermore, a distributed learning algorithm for the secondary users to converge to the ESS is introduced. Simulation results shows that the system can quickly converge to the ESS and such an ESS is robust to the sudden unfavorable deviations of the selfish secondary users.
Cooperation is a promising approach to simultaneously achieving efficient spectrum resource use and improving the quality of service of primary users in dynamic spectrum access networks. However, due to their selfish nature, how to stimulate secondary users to play cooperatively is an important issue. In this chapter, we discuss a reputation-based spectrum access framework where the cooperation stimulation problem is modeled as an indirect reciprocity game. In this game, secondary users choose how to help primary users relay information and gain reputation, based on which they can access a certain amount of vacant licensed channels in the future. By formulating a secondary user's decision-making as a Markov decision process, the optimal action rule can be obtained, according to which the secondary user will use maximal power to help the primary user relay data and thus greatly improve the primary user's quality of service as well as the spectrum utilization efficiency. Moreover, the uniqueness of the stationary reputation distribution is proved, and the conditions under which the optimal action rule is evolutionarily stable are theoretically derived.
The motivation of this book and necessary background knowledge of this book are provided. First, a brief introduction to competition and cooperation in wireless and social networks is provided, along with examples and a literature review. Then, the limitations of traditional game theory in this area are presented. Finally, the three branches of modern game theory – indirect reciprocity, evolutionary games, and sequential decision-making – will be briefly mentioned to illustrate their strengths for overcoming the highlighted limitations.
Deal selection on Groupon represents a typical social learning and decision-making process, where the quality of a deal is usually unknown to the customers. The customers must acquire this knowledge through social learning from other social media, such as reviews on Yelp. Additionally, the quality of a deal depends on both the state of the vendor and the decisions of other customers on Groupon. How social learning and network externality affect the decisions of customers in deal selection on Groupon is the main focus of this chapter. We develop a data-driven game-theoretic framework to understand rational deal selection behaviors across social media. The sufficient condition of the Nash equilibrium is identified. A value-iteration algorithm is utilized to find the optimal deal selection strategy. We utilize the Groupon–Yelp data set to analyze the deal selection game in a realistic setting. Finally, the performance of the social learning framework is evaluated using real data. The results suggest that customers make decisions in a rational way instead of following naive strategies, and there is still room to improve their decisions with assistance from a game-theoretic framework.
How information diffuses over social networks has attracted much attention from both industry and academics. Most of the existing works in this area are based on machine learning methods focusing on social network structure analysis and empirical data mining. However, the network users’ decisions, actions, and socioeconomic interactions are generally ignored in most existing works. In this chapter, we discuss an evolutionary game-theoretic framework to model the dynamic information diffusion process in social networks. Specifically, we derive the information diffusion dynamics in complete networks and uniform-degree and nonuniform-degree networks. We find that the dynamics of information diffusion over these three kinds of networks are scale-free and the same as each other when the network scale is sufficiently large. To verify the theoretical analysis, we perform simulations of the information diffusion over synthetic networks and real-world Facebook networks. Moreover, we conduct an experiment on the Twitter hashtag data set, which shows that the game-theoretic model well fits and predicts information diffusion over real social networks.