Exploring Information Asymmetry in Two-Stage Security Games

Size: px
Start display at page:

Download "Exploring Information Asymmetry in Two-Stage Security Games"

Transcription

1 Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher

2 Security Games Background Stackelberg Games Defender/Attacker players Protect a set of targets using limited resources Flights Roads Ports Wildlife Strong Stackelberg Equilibrium 2 /54

3 What is Defense? (Randomly) allocate resources to protect targets Shape the attacker s belief on the protection of targets. E.g., manipulate the information regarding the game to bias the attacker s belief Protected? Probably! 3 /54

4 Information & Beliefs Attacker s belief depends on the information he has Information asymmetry gives rise to manipulation Widely studied in economics [2001 Nobel Prize] In security: defender usually has more information How should defender make use of additional information for strategic gain? 4 /54

5 Contributions Initiate the study of strategic information in security Show when (always?) and how (optimally?) can information help? 5 /54

6 Outline An Example Domain Information Revelation Scheme General Modeling and Results 6 /54

7 Outline An Example Domain Information Revelation Scheme General Modeling and Results 7 /54

8 Example Domain: Fare Evasion Fare Evasion in LA Metro System [Yin et al. 2012] Proof-of-payment Estimated annual loss: $5.6 million 300,000 rider daily ( 2.5% evader) 8 /54

9 Example Domain: Fare Evasion Traditionally: /54

10 Example Domain: Fare Evasion Traditionally: p:0.2 1 Another option is to buy a ticket; both get 0. 1 p:0.2 2 defu = evau = 0.4 p: /54

11 Zoom in: Example Domain: Fare Evasion Protected? Yes! Protected? p=0.2 Station announces a message -- an inspector is inside! Unfortunately, such lucky chance happens with p=0.2 Is there a smarter way? 11 /54

12 Outline An Example Domain Information Revelation Scheme General Modeling and Results 12 /54

13 A Strategic Way Twomessages m c or m 0.2 u : covered 0.2 Persuasion m c P(cover m evau 0; 0.8 c ) 1/ 4; P(uncover m defu 1 Buy defu =0 c ) 3/ uncovered m u evau = 2 defu = -2 In expectation, defu = -0.4 ( > -1.2 ); evau = 0.4 (no change) 13 /54

14 Persuasion in a Nutshell 0.2 P(cover m evau 0; c ) 1/ 4; P(uncover defu 1 m c ) 3/ covered m c uncovered m u A posterior, which is bad for both players Persuasion Scheme identifies such a posterior, and signal it to the evader 14 /54

15 Outline An Example Domain Information Revelation Scheme General Modeling and Results 15 /54

16 Modeling A natural two-stage security game model Phase 1: scheduling (as regular security games) Phase 2 : strategically reveal information at each target (persuasion) 16 /54

17 Assumption Questions Why should the attacker follow the persuasion scheme? His best response, given the information Why should the defender honestly send signals? Signaling scheme should be trustful Why breaks tie in favor of the defender? Without loss of generality 17 /54

18 Theoretical Results When would the defender strictly benefit by information (notice that the defender is never worse off)? provide a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 18 /54

19 Theoretical Results When would the defender strictly benefit by information (notice that the defender is never worse off)? The paper provides a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 19 /54

20 Theoretical Results When would the defender strictly benefit by information? (notice that the defender is never worse off) The paper provides a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 20 /54

21 Simulations Measures proximity to zero-sum 21 /54

22 Open Problems General extensive form games? Other type of information? Defender s knowledge about resources, targets, environments. Human behavior models (irrational attacker) Information asymmetry in general strategic interactions 22 /54

23 Thanks Q&A 23 /54

Game Theory for Safety and Security. Arunesh Sinha

Game Theory for Safety and Security. Arunesh Sinha Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work

More information

Anavilhanas Natural Reserve (about 4000 Km 2 )

Anavilhanas Natural Reserve (about 4000 Km 2 ) Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,

More information

Modeling Security Decisions as Games

Modeling Security Decisions as Games Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent

More information

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information

More information

Lecture #3: Networks. Kyumars Sheykh Esmaili

Lecture #3: Networks. Kyumars Sheykh Esmaili Lecture #3: Game Theory and Social Networks Kyumars Sheykh Esmaili Outline Games Modeling Network Traffic Using Game Theory Games Exam or Presentation Game You need to choose between exam or presentation:

More information

Scalable Randomized Patrolling for Securing Rapid Transit Networks

Scalable Randomized Patrolling for Securing Rapid Transit Networks Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg

More information

Reciprocating Trust or Kindness

Reciprocating Trust or Kindness Reciprocating Trust or Kindness Ilana Ritov Hebrew University Belief Based Utility Conference, CMU 2017 Trust and Kindness Trusting a person typically involves giving some of one's resources to that person,

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility

Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility theorem (consistent decisions under uncertainty should

More information

Belief-based rational decisions. Sergei Artemov

Belief-based rational decisions. Sergei Artemov Belief-based rational decisions Sergei Artemov September 22, 2009 1 Game Theory John von Neumann was an Hungarian American mathematician who made major contributions to mathematics, quantum mechanics,

More information

Game Theory. Wolfgang Frimmel. Dominance

Game Theory. Wolfgang Frimmel. Dominance Game Theory Wolfgang Frimmel Dominance 1 / 13 Example: Prisoners dilemma Consider the following game in normal-form: There are two players who both have the options cooperate (C) and defect (D) Both players

More information

1 Game Theory and Strategic Analysis

1 Game Theory and Strategic Analysis Page 1 1 Game Theory and Strategic Analysis 11. 12. 13. 14. Static Games and Nash Equilibrium Imperfect Competition Explicit and Implicit Cooperation Strategic Commitment (a) Sequential games and backward

More information

0.1 Battle of the Sexes. 0.2 Chicken. 0.3 Coordination Game

0.1 Battle of the Sexes. 0.2 Chicken. 0.3 Coordination Game This is a record of most of the different games we have tested with RSRS. In all cases, the prediction algorithm used is fictitious play, and games are repeated times. In each figure the top graph shows

More information

Randomizing Regression Tests Using Game Theory

Randomizing Regression Tests Using Game Theory Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu

More information

Details of Play Each player counts out a number of his/her armies for initial deployment, according to the number of players in the game.

Details of Play Each player counts out a number of his/her armies for initial deployment, according to the number of players in the game. RISK Risk is a fascinating game of strategy in which a player can conquer the world. Once you are familiar with the rules, it is not a difficult game to play, but there are a number of unusual features

More information

A short introduction to Security Games

A short introduction to Security Games Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science

More information

Instructions [CT+PT Treatment]

Instructions [CT+PT Treatment] Instructions [CT+PT Treatment] 1. Overview Welcome to this experiment in the economics of decision-making. Please read these instructions carefully as they explain how you earn money from the decisions

More information

U strictly dominates D for player A, and L strictly dominates R for player B. This leaves (U, L) as a Strict Dominant Strategy Equilibrium.

U strictly dominates D for player A, and L strictly dominates R for player B. This leaves (U, L) as a Strict Dominant Strategy Equilibrium. Problem Set 3 (Game Theory) Do five of nine. 1. Games in Strategic Form Underline all best responses, then perform iterated deletion of strictly dominated strategies. In each case, do you get a unique

More information

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,

More information

Game Theoretic Analysis of Security and Sustainability

Game Theoretic Analysis of Security and Sustainability Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight

More information

TUESDAYS & FRIDAYS NOW WITH DRAWS PLUS BIGGER JACKPOTS DREAM TO THE MAX HOSPITALITY NETWORK. Retailer Information

TUESDAYS & FRIDAYS NOW WITH DRAWS PLUS BIGGER JACKPOTS DREAM TO THE MAX HOSPITALITY NETWORK. Retailer Information NOW WITH DRAWS TUESDAYS & FRIDAYS PLUS BIGGER JACKPOTS Retailer Information HOSPITALITY NETWORK DREAM TO THE MAX For more information, please contact your BCLC Territory Manager or Lottery Support Hotline

More information

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one

More information

INTRODUCTION OBJECT OF THE GAME. Classic Bingo. Pattern Bingo

INTRODUCTION OBJECT OF THE GAME. Classic Bingo. Pattern Bingo INTRODUCTION Bingo offers players a choice of several Bingo Rooms, each with its own variations and twists. Some Bingo Rooms are for players from the province of Quebec only, while others welcome players

More information

The topic for the third and final major portion of the course is Probability. We will aim to make sense of statements such as the following:

The topic for the third and final major portion of the course is Probability. We will aim to make sense of statements such as the following: CS 70 Discrete Mathematics for CS Spring 2006 Vazirani Lecture 17 Introduction to Probability The topic for the third and final major portion of the course is Probability. We will aim to make sense of

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 01 Rationalizable Strategies Note: This is a only a draft version,

More information

Milind Tambe on game theory in security applications Machine...

Milind Tambe on game theory in security applications Machine... Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke

More information

SUPPOSE that we are planning to send a convoy through

SUPPOSE that we are planning to send a convoy through IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 40, NO. 3, JUNE 2010 623 The Environment Value of an Opponent Model Brett J. Borghetti Abstract We develop an upper bound for

More information

Tech the Halls is back again this year and we ve made it even better!

Tech the Halls is back again this year and we ve made it even better! Consumer Promotion All Retail Networks Tech The Halls Contest is back! Thanks to your support, last year s contest was a great success! We received over 6 million unique entries into the contest and 1.4

More information

Tech the Halls is back again this year and we ve made it even better!

Tech the Halls is back again this year and we ve made it even better! Consumer Promotion All Retail Networks Tech The Halls Contest is back! Thanks to your support, last year s contest was a great success! We received over 5 million unique entries into the contest and 1.6

More information

Asynchronous Best-Reply Dynamics

Asynchronous Best-Reply Dynamics Asynchronous Best-Reply Dynamics Noam Nisan 1, Michael Schapira 2, and Aviv Zohar 2 1 Google Tel-Aviv and The School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel. 2 The

More information

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,

More information

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists

More information

GAMES BEGIN JULY 25 TH! RETAIL PRODUCT PLAN JULY AUGUST calottery.com

GAMES BEGIN JULY 25 TH! RETAIL PRODUCT PLAN JULY AUGUST calottery.com GAMES BEGIN JULY 25 TH! RETAIL PRODUCT PLAN JULY AUGUST 2016 calottery.com COMING SOON AUGUST 2016 SUPERLOTTO PLUS RAFFLE PROMOTION Make Sure Your Players Know! The SuperLotto Plus Raffle Promotion is

More information

Minmax and Dominance

Minmax and Dominance Minmax and Dominance CPSC 532A Lecture 6 September 28, 2006 Minmax and Dominance CPSC 532A Lecture 6, Slide 1 Lecture Overview Recap Maxmin and Minmax Linear Programming Computing Fun Game Domination Minmax

More information

10. Because the order of selection doesn t matter: selecting 3, then 5 is the same as selecting 5, then 3. 25! 24 = 300

10. Because the order of selection doesn t matter: selecting 3, then 5 is the same as selecting 5, then 3. 25! 24 = 300 Chapter 6 Answers Lesson 6.1 1. li, lo, ln, ls, il, io, in, is, ol, oi, on, os, nl, ni, no, ns, sl, si, so, sn 2. 5, 4, 5 4 = 20, 6 5 = 30 3. (1,2) (1,3) (1,4) (1,5) (1,6) (1,7) (1,8) (1,9) (2,3) (2,4)

More information

Introduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue

Introduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue Introduction to Industrial Organization Professor: Caixia Shen Fall 014 Lecture Note 6 Games and Strategy (ch.4)-continue Outline: Modeling by means of games Normal form games Dominant strategies; dominated

More information

Adversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017

Adversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017 Adversarial Search and Game Theory CS 510 Lecture 5 October 26, 2017 Reminders Proposals due today Midterm next week past midterms online Midterm online BBLearn Available Thurs-Sun, ~2 hours Overview Game

More information

Lecture 6: Basics of Game Theory

Lecture 6: Basics of Game Theory 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 6: Basics of Game Theory 25 November 2009 Fall 2009 Scribes: D. Teshler Lecture Overview 1. What is a Game? 2. Solution Concepts:

More information

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what

More information

Chapter 13. Game Theory

Chapter 13. Game Theory Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don

More information

Game theory Computational Models of Cognition

Game theory Computational Models of Cognition Game theory Taxonomy Rational behavior Definitions Common games Nash equilibria Mixed strategies Properties of Nash equilibria What do NE mean? Mutually Assured Destruction 6 rik@cogsci.ucsd.edu Taxonomy

More information

ICONIP 2009 Intelligent Liar Competition: Liar Dice (Individual Hand)

ICONIP 2009 Intelligent Liar Competition: Liar Dice (Individual Hand) ICONIP 2009 Intelligent Liar Competition: Liar Dice (Individual Hand) Organizer: John SUM Institute of Technology & Innovation Management National Chung Hsing University Taichung 40227, Taiwan. Email:

More information

COMPSCI 223: Computational Microeconomics - Practice Final

COMPSCI 223: Computational Microeconomics - Practice Final COMPSCI 223: Computational Microeconomics - Practice Final 1 Problem 1: True or False (24 points). Label each of the following statements as true or false. You are not required to give any explanation.

More information

Computational Game Theory for Security: Progress and Challenges

Computational Game Theory for Security: Progress and Challenges Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu

More information

Two Perspectives on Logic

Two Perspectives on Logic LOGIC IN PLAY Two Perspectives on Logic World description: tracing the structure of reality. Structured social activity: conversation, argumentation,...!!! Compatible and Interacting Views Process Product

More information

ECO 5341 Strategic Behavior Lecture Notes 3

ECO 5341 Strategic Behavior Lecture Notes 3 ECO 5341 Strategic Behavior Lecture Notes 3 Saltuk Ozerturk SMU Spring 2016 (SMU) Lecture Notes 3 Spring 2016 1 / 20 Lecture Outline Review: Dominance and Iterated Elimination of Strictly Dominated Strategies

More information

The next several lectures will be concerned with probability theory. We will aim to make sense of statements such as the following:

The next several lectures will be concerned with probability theory. We will aim to make sense of statements such as the following: CS 70 Discrete Mathematics for CS Fall 2004 Rao Lecture 14 Introduction to Probability The next several lectures will be concerned with probability theory. We will aim to make sense of statements such

More information

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University

More information

Game playing. Chapter 6. Chapter 6 1

Game playing. Chapter 6. Chapter 6 1 Game playing Chapter 6 Chapter 6 1 Outline Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information Chapter 6 2 Games vs.

More information

Lotto! Online Product Guide

Lotto! Online Product Guide BCLC Lotto! Online Product Guide Resource Manual for Lottery Retailers October 18, 2016 The focus of this document is to provide retailers the tools needed in order to feel knowledgeable when selling and

More information

A Game Theoretic Approach on Addressing Collusion among Human Adversaries

A Game Theoretic Approach on Addressing Collusion among Human Adversaries A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,

More information

Session Outline. Application of Game Theory in Economics. Prof. Trupti Mishra, School of Management, IIT Bombay

Session Outline. Application of Game Theory in Economics. Prof. Trupti Mishra, School of Management, IIT Bombay 36 : Game Theory 1 Session Outline Application of Game Theory in Economics Nash Equilibrium It proposes a strategy for each player such that no player has the incentive to change its action unilaterally,

More information

California State Lottery Commission. Susan S. Kossack, Deputy Director, Marketing

California State Lottery Commission. Susan S. Kossack, Deputy Director, Marketing Date: To: California State Lottery Commission From: Joan M. Borucki Director Prepared By: Susan S. Kossack, Deputy Director, Marketing Subject: Item 9(b) Scratchers Game Profiles for Games 597, 598, 599,

More information

Backward Induction and Stackelberg Competition

Backward Induction and Stackelberg Competition Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction

More information

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results

More information

ebay in the Sky: StrategyProof Wireless Spectrum Auctions

ebay in the Sky: StrategyProof Wireless Spectrum Auctions ebay in the Sky: StrategyProof Wireless Spectrum Auctions Xia Zhou, Sorabh Gandhi, Subhash Suri, Heather Zheng Department of Computer Science University of California, Santa Barbara IUSTITIA (Goddess of

More information

ADVERSARIAL SEARCH. Chapter 5

ADVERSARIAL SEARCH. Chapter 5 ADVERSARIAL SEARCH Chapter 5... every game of skill is susceptible of being played by an automaton. from Charles Babbage, The Life of a Philosopher, 1832. Outline Games Perfect play minimax decisions α

More information

Student Name. Student ID

Student Name. Student ID Final Exam CMPT 882: Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte Student Name Student ID Instructions. This exam is worth 30% of your final mark in this course.

More information

Lecture 3: Nash Equilibrium

Lecture 3: Nash Equilibrium Microeconomics I: Game Theory Lecture 3: Nash Equilibrium (see Osborne, 2009, Sect 2.1-2.7) Dr. Michael Trost Department of Applied Microeconomics November 8, 2013 Dr. Michael Trost Microeconomics I: Game

More information

Zolt-Gilburne Imagination Seminar. Knowledge and Games. Sergei Artemov

Zolt-Gilburne Imagination Seminar. Knowledge and Games. Sergei Artemov Zolt-Gilburne Imagination Seminar Knowledge and Games Sergei Artemov October 1, 2009 1 Plato (5-4 Century B.C.) One of the world's best known and most widely read and studied philosophers, a student of

More information

n-person Games in Normal Form

n-person Games in Normal Form Chapter 5 n-person Games in rmal Form 1 Fundamental Differences with 3 Players: the Spoilers Counterexamples The theorem for games like Chess does not generalize The solution theorem for 0-sum, 2-player

More information

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent

More information

Using Fictitious Play to Find Pseudo-Optimal Solutions for Full-Scale Poker

Using Fictitious Play to Find Pseudo-Optimal Solutions for Full-Scale Poker Using Fictitious Play to Find Pseudo-Optimal Solutions for Full-Scale Poker William Dudziak Department of Computer Science, University of Akron Akron, Ohio 44325-4003 Abstract A pseudo-optimal solution

More information

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent

More information

GAMES BEGIN MAY 21 ST! RETAIL PRODUCT PLAN MAY JUNE calottery.com

GAMES BEGIN MAY 21 ST! RETAIL PRODUCT PLAN MAY JUNE calottery.com GAMES BEGIN MAY 21 ST! RETAIL PRODUCT PLAN MAY JUNE 2018 calottery.com LOTTERY S JUNE 2018 0 BONUS PLAY MILLIONS The 0 Bonus Play Millions POS kit is coming to your store this month! POS display dates:

More information

Games vs. search problems. Game playing Chapter 6. Outline. Game tree (2-player, deterministic, turns) Types of games. Minimax

Games vs. search problems. Game playing Chapter 6. Outline. Game tree (2-player, deterministic, turns) Types of games. Minimax Game playing Chapter 6 perfect information imperfect information Types of games deterministic chess, checkers, go, othello battleships, blind tictactoe chance backgammon monopoly bridge, poker, scrabble

More information

Game playing. Chapter 6. Chapter 6 1

Game playing. Chapter 6. Chapter 6 1 Game playing Chapter 6 Chapter 6 1 Outline Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information Chapter 6 2 Games vs.

More information

GAMES BEGIN OCTOBER 22 ND! RETAIL PRODUCT PLAN

GAMES BEGIN OCTOBER 22 ND! RETAIL PRODUCT PLAN GAMES BEGIN OCTOBER 22 ND! RETAIL PRODUCT PLAN OCTOBER NOVEMBER 2018 calottery.com LOTTERY RESOURCES NOVEMBER 2018 RESPONSIBLE GAMING Holiday Season Reminder: Lottery tickets are not appropriate gifts

More information

1. The chance of getting a flush in a 5-card poker hand is about 2 in 1000.

1. The chance of getting a flush in a 5-card poker hand is about 2 in 1000. CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Note 15 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice, roulette wheels. Today

More information

Copyright 2008, Yan Chen

Copyright 2008, Yan Chen Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution Non-Commercial 3.0 License. http://creativecommons.org/licenses/by-nc/3.0/ Copyright 2008, Yan

More information

GET READY! MARCH GAMES FEBRUARY 18! MONOPOLY TM SCRATCHERS ARE COMING COMING SOON FEBRUARY 2019

GET READY! MARCH GAMES FEBRUARY 18! MONOPOLY TM SCRATCHERS ARE COMING COMING SOON FEBRUARY 2019 8.75 GAMES BEGIN JANUARY 21ST! 8.5 RETAIL PRODUCT PLAN JANUARY FEBRUARY 2019 calottery.com COMING SOON FEBRUARY 2019 MARCH GAMES GET READY! MONOPOLY TM SCRATCHERS ARE COMING FEBRUARY 18! 2 MONOPOLY 1935,

More information

GAMES BEGIN AUGUST 24 TH! RETAIL PRODUCT PLAN AUGUST SEPTEMBER calottery.com

GAMES BEGIN AUGUST 24 TH! RETAIL PRODUCT PLAN AUGUST SEPTEMBER calottery.com GAMES BEGIN AUGUST 24 TH! RETAIL PRODUCT PLAN AUGUST SEPTEMBER 2016 calottery.com LOTTERY S SEPTEMBER 2016 SUPERLOTTO PLUS RAFFLE PROMOTION Make Sure Your Players Know! The SuperLotto Plus Raffle Promotion

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence

Multiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent

More information

Student Seminars: Kickoff

Student Seminars: Kickoff Wireless@VT Seminars Wireless@VT Student Seminars: Kickoff Walid Saad Wireless@VT, Durham 447 walids@vt.edu Wireless@VT Seminars Fall Logistics Weekly meetings in SEB 135 SEB 125 used 10/24, 11/07, and

More information

Game Playing. Philipp Koehn. 29 September 2015

Game Playing. Philipp Koehn. 29 September 2015 Game Playing Philipp Koehn 29 September 2015 Outline 1 Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information 2 games

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

CPS 570: Artificial Intelligence Game Theory

CPS 570: Artificial Intelligence Game Theory CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),

More information

Version 1.9 Page 1 of 15

Version 1.9 Page 1 of 15 BINGO GAME GUIDE For more information about these games please see the OLG Rules for Bingo Games, site Game Guides, House Rules, Odds of Winning, Refund Policy, and the individual Session Programs. Version

More information

CMU Lecture 22: Game Theory I. Teachers: Gianni A. Di Caro

CMU Lecture 22: Game Theory I. Teachers: Gianni A. Di Caro CMU 15-781 Lecture 22: Game Theory I Teachers: Gianni A. Di Caro GAME THEORY Game theory is the formal study of conflict and cooperation in (rational) multi-agent systems Decision-making where several

More information

The Complexity of Playing Durak

The Complexity of Playing Durak The Complexity of Playing Durak Édouard Bonnet Institute for Computer Science and Control, Hungarian Academy of Sciences, Budapest, Hungary (MTA SZTAKI) IJCAI 2016, July 15 Few results 2-handed Whist with

More information

Game Theory. 4: Nash equilibrium in different games and mixed strategies

Game Theory. 4: Nash equilibrium in different games and mixed strategies Game Theory 4: Nash equilibrium in different games and mixed strategies Review of lecture three A game with no dominated strategy: The battle of the sexes The concept of Nash equilibrium The formal definition

More information

CS 261 Notes: Zerocash

CS 261 Notes: Zerocash CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties

More information

Distributed Optimization and Games

Distributed Optimization and Games Distributed Optimization and Games Introduction to Game Theory Giovanni Neglia INRIA EPI Maestro 18 January 2017 What is Game Theory About? Mathematical/Logical analysis of situations of conflict and cooperation

More information

Resource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Game Theory

Resource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Game Theory Resource Allocation and Decision Analysis (ECON 8) Spring 4 Foundations of Game Theory Reading: Game Theory (ECON 8 Coursepak, Page 95) Definitions and Concepts: Game Theory study of decision making settings

More information

17.5 DECISIONS WITH MULTIPLE AGENTS: GAME THEORY

17.5 DECISIONS WITH MULTIPLE AGENTS: GAME THEORY 666 Chapter 17. Making Complex Decisions plans generated by value iteration.) For problems in which the discount factor γ is not too close to 1, a shallow search is often good enough to give near-optimal

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS

A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS While working together on a project, effective communication between subcontractors and

More information

California Orthopaedic Association May 30, 2014 Monterey, California

California Orthopaedic Association May 30, 2014 Monterey, California Sponsored by: California Orthopaedic Association May 30, 2014 Monterey, California Presented by: Karen Zupko, President Karen Zupko Investor in Modernizing Medicine, Inc., on the Board of Directors for

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

6. Bargaining. Ryan Oprea. Economics 176. University of California, Santa Barbara. 6. Bargaining. Economics 176. Extensive Form Games

6. Bargaining. Ryan Oprea. Economics 176. University of California, Santa Barbara. 6. Bargaining. Economics 176. Extensive Form Games 6. 6. Ryan Oprea University of California, Santa Barbara 6. Individual choice experiments Test assumptions about Homo Economicus Strategic interaction experiments Test game theory Market experiments Test

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game

More information

final examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include:

final examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include: The final examination on May 31 may test topics from any part of the course, but the emphasis will be on topic after the first three homework assignments, which were covered in the midterm. Topics from

More information

Game Theory for Security:

Game Theory for Security: Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco

More information

Introduction: What is Game Theory?

Introduction: What is Game Theory? Microeconomics I: Game Theory Introduction: What is Game Theory? (see Osborne, 2009, Sect 1.1) Dr. Michael Trost Department of Applied Microeconomics October 25, 2013 Dr. Michael Trost Microeconomics I:

More information

Underleague Game Rules

Underleague Game Rules Underleague Game Rules Players: 2-5 Game Time: Approx. 45 minutes (+15 minutes per extra player above 2) Helgarten, a once quiet port town, has become the industrial hub of a vast empire. Ramshackle towers

More information

KUNG CHI. By Stone Mage Games RULES. Sample file

KUNG CHI. By Stone Mage Games RULES. Sample file KUNG CHI By Stone Mage Games RULES There are 15 Chi Markers per player, a 4 sided die, 15 Scroll Skrypt cards, 15 Sword Skrypt cards, and 15 Army cards. GAME COMPONENTS GAME SETUP The object of Kung Chi

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011. Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology

More information