Results 11 to 20 of about 685,240 (295)

Evolutionary Games and Dynamics in Public Goods Supply with Repetitive Actions

open access: yesMathematics, 2021
Based on a tripartite game model among suppliers of public goods, consumers, and the government, a tripartite repeated game model is constructed to analyze the evolution mechanism of which suppliers supply at low prices, consumers purchase, and the ...
Simo Sun   +3 more
doaj   +1 more source

Renegotiation in repeated games [PDF]

open access: yesGames and Economic Behavior, 1989
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Farrell, Joseph, Maskin, Eric
openaire   +3 more sources

Research on Repeated Quantum Games with Public Goods under Strong Reciprocity

open access: yesAxioms, 2023
We developed a repeated quantum game of public goods by using quantum entanglement and strong reciprocity mechanisms. Utilizing the framework of quantum game analysis, a comparative investigation incorporating both entangled and non-entangled states ...
Simo Sun   +3 more
doaj   +1 more source

Repeated Games with Bonuses [PDF]

open access: yesJournal of Optimization Theory and Applications, 2008
The authors discuss a model of learning and unlearning in infinitely repeated games, in which player 1 receives a bonus, if he plays the same action as in the previous stage. The expected average reward is used as a performance (criterion) measure. The authors show that the game has a value and give conditions for the existence of the so-called simple ...
Schoenmakers, G.   +3 more
openaire   +3 more sources

A Secure Trust Method for Multi-Agent System in Smart Grids Using Blockchain

open access: yesIEEE Access, 2021
This paper proposes a blockchain based trust management method for agents in a multi-agent system (MAS). In this work, three objectives are achieved: trust, cooperation and privacy.
Rabiya Khalid   +5 more
doaj   +1 more source

Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems

open access: yesIEEE Open Journal of the Computer Society, 2020
Honeypots have been widely used in the security community to understand the cyber threat landscape, for example to study unauthorized penetration attempts targeting industrial cyber-physical systems (ICPS) and observing the behaviors in such activities ...
Beibei Li   +5 more
doaj   +1 more source

Bayesian Repeated Games and Reputation [PDF]

open access: yesSSRN Electronic Journal, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Salomon, Antoine, Forges, Françoise
openaire   +5 more sources

WRFMR: A Multi-Agent Reinforcement Learning Method for Cooperative Tasks

open access: yesIEEE Access, 2020
Multi-agent reinforcement learning (MARL) for cooperative tasks has been extensively studied in recent years. The balance of exploration and exploitation is crucial to MARL algorithms' performance in terms of the learning speed and the quality of the ...
Hui Liu, Zhen Zhang, Dongqing Wang
doaj   +1 more source

Repeated signaling games [PDF]

open access: yesGames and Economic Behavior, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Large Nonanonymous Repeated Games [PDF]

open access: yesGames and Economic Behavior, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Nabil I. Al-Najjar, Rann Smorodinsky
openaire   +2 more sources

Home - About - Disclaimer - Privacy