Results 221 to 230 of about 26,202 (266)
Approximation of arbitration games by finite subgames [PDF]
Tijs, S.H., Jansen, M.J.M.
openaire +4 more sources
Persistent Unemployment as Subgame Perfect Equilibrium
Jörgen W. Weibull
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Subgame Perfect Farsighted Stability
SSRN Electronic Journal, 2022Farsighted game theoretic solution concepts have been shown to provide insightful results in many applications. However, we provide simple examples demonstrating that the existing solution concepts may fail to incorporate some important aspects of ...
D. Granot, Eran Hanany
semanticscholar +2 more sources
Subgame Perfect Coalition Formation
Dynamic Games and Applications, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Greg Leo +2 more
openaire +2 more sources
Strongly Subgame-Consistent Core in Stochastic Games
Automation and Remote Control, 2018Summary: Stochastic games defined on finite tree graphs are investigated in the paper. Each node of the graph is defined by a given \(n\)-person normal form game. Transition to the next vertex of the tree is random and depends on the strategy profile realised in the current game.
Elena M. Parilina, L. Petrosyan
semanticscholar +2 more sources
Subgame Perfect Implementation
Econometrica, 1988Let f be a choice function on a set of feasible alternatives A, with state space \(\Theta\) and a finite number of players. f is implementable in subgame perfect equilibria if there exists an extensive form game whose unique subgame perfect equilibrium is f(\(\theta)\) for every \(\theta\in \Theta\).
Moore, John, Repullo, Rafael
openaire +2 more sources
Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs
American Control Conference, 2019A cyber security problem is considered in a networked system formulated as a resilient graph problem based on a game theoretic approach. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the ...
Yurid E. Nugraha +4 more
semanticscholar +1 more source

