Safe Opponent Exploitation

Size: px
Start display at page:

Download "Safe Opponent Exploitation"

Transcription

1 Safe Opponent Explotaton SAM GANZFRIED and TUOMAS SANDHOLM, Carnege Mellon Unversty We consder the problem of playng a repeated two-player zero-sum game safety: that s, guaranteeng at least the value of the game per perod n expectaton regardless of the strategy used by the opponent. Playng a stage-game equlbrum strategy at each tme step clearly guarantees safety, and pror work has (ncorrectly) stated that t s mpossble to smultaneously devate from a stage-game equlbrum (n hope of explotng a suboptmal opponent) and to guarantee safety. We show that such proftable devatons are ndeed possble specfcally n games where certan types of gft strateges exst, whch we defne formally. We show that the set of strateges consttutng such gfts can be strctly larger than the set of teratvely weakly-domnated strateges; ths dsproves another recent asserton whch states that all nonteratvely weakly domnated strateges are best responses to each equlbrum strategy of the other player. We present a full characterzaton of safe strateges, and develop effcent algorthms for explotng suboptmal opponents whle guaranteeng safety. We also provde analogous results for extensve-form games of perfect and mperfect nformaton, and present safe explotaton algorthms and full characterzatons of safe strateges for those settngs as well. We present expermental results n Kuhn poker, a canoncal test problem for game-theoretc algorthms. Our experments show that (1) aggressve safe explotaton strateges sgnfcantly outperform adjustng the explotaton wthn stage-game equlbrum strateges only and (2) all the safe explotaton strateges sgnfcantly outperform a (nonsafe) best response strategy aganst strong dynamc opponents. Categores and Subject Descrptors: I.2.11 [Artfcal Intellgence]: Dstrbuted Artfcal Intellgence Multagent Systems; J.4[Socal and Behavoral Scences]: Economcs General Terms: Algorthms, Economcs, Theory Addtonal Key Words and Phrases: Game theory, opponent explotaton, multagent learnng ACM Reference Format: Ganzfred, S. and Sandholm, T Safe opponent explotaton. ACM Trans. Econ. Comp. 3, 2, Artcle 8 (Aprl 2015), 28 pages. DOI: INTRODUCTION In repeated nteractons aganst an opponent, an agent must determne how to balance between explotaton (maxmally takng advantage of weak opponents) and explotablty (makng sure that he hmself does not perform too poorly aganst strong opponents). In two-player zero-sum games, an agent can play a mnmax strategy, whch guarantees at least the value of the game n expectaton aganst any opponent. However, dong so could potentally forgo sgnfcant profts aganst suboptmal opponents. Thus, an equlbrum strategy has low (zero) explotablty, but acheves low explotaton. On the A shorter early verson of ths artcle appeared n Proceedngs of the ACM Conference on Electronc Commerce (EC 12). Ths materal s based on work supported by the Natonal Scence Foundaton under grant IIS , as well as XSEDE computng resources provded by the Pttsburgh Supercomputng Center. Authors addresses: S. Ganzfred and T. Sandholm, Computer Scence Department, Carnege Mellon Unversty, 5000 Forbes Avenue, Pttsburgh, PA 15213; emal: sganzfr@cs.smu.edu. Permsson to make dgtal or hard copes of all or part of ths work for personal or classroom use s granted wthout fee provded that copes are not made or dstrbuted for proft or commercal advantage and that copes bear ths notce and the full ctaton on the frst page. Copyrghts for components of ths work owned by others than ACM must be honored. Abstractng wth credt s permtted. To copy otherwse, or republsh, to post on servers or to redstrbute to lsts, requres pror specfc permsson and/or a fee. Request permssons from permssons@acm.org. c 2015 ACM /2015/04-ART8 $15.00 DOI:

2 8:2 S. Ganzfred and T. Sandholm other end of the spectrum, agents could attempt to learn the opponent s strategy and maxmally explot t; however, dong so runs the rsk of beng exploted n turn by a deceptve opponent. Ths s known as the get taught and exploted problem [Sandholm 2007]. Such decepton s common n games such as poker; for example, a player may play very aggressvely ntally, then suddenly swtch to a more conservatve strategy to captalze on the fact that the opponent tres to take advantage of hs aggressve mage, whch he now leaves behnd. Thus, pure opponent explotaton potentally leads to a hgh level of explotaton, but at the expense of explotablty. Respectvely, the game-solvng communty has, by and large, taken two radcally dfferent approaches: fndng game-theoretc solutons and opponent explotaton. In ths artcle, we are nterested n answerng a fundamental queston that helps shed some lght on ths trade-off. Is t possble to explot the opponent more than any equlbrum strategy of a stage game would, whle smultaneously guaranteeng at least the value of the full game n expectaton n the worst case? If the answer s no, then fully safe explotaton s not possble, and we must be wllng to accept some ncrease n worst-case explotablty f we wsh to devate from equlbrum n order to explot suboptmal opponents. However, f the answer s yes, then safe opponent explotaton would ndeed be possble. Recently t was stated that safe opponent explotaton s not possble [Ganzfred and Sandholm 2011]. The ntuton for that argument was that the opponent could have been playng an equlbrum all along, and when we devate from equlbrum to attempt to explot hm, then we run the rsk of beng explotable ourselves. However, that argument s ncorrect. It does not take nto account the fact that our opponent may gve us a gft by playng an dentfably suboptmal strategy, such as one that s strctly domnated. 1 If such gft strateges are present n a game, then t turns out that safe explotaton can be acheved; specfcally, we can devate from equlbrum to explot the opponent provded that our worst-case explotablty remans below the total amount of proft won through gfts (n expectaton). Is t possble to obtan such gfts that do not correspond to strctly domnated strateges? What about other forms of domnance, such as weak, terated, and domnance by mxed strateges? Recently t was clamed that all nonteratvely weakly domnated strateges are best responses to each equlbrum strategy of the other player [Waugh 2009]. Ths would suggest that such undomnated strateges cannot be gfts, and that gft strateges must therefore be domnated accordng to some form of domnance. We dsprove ths clam and present a game n whch a nonteratvely weakly domnated strategy s not a best response to an equlbrum strategy of the other player. Safe explotaton s possble n the game by takng advantage of that partcular strategy. We defne a formal noton of gfts, whch s more general than teratvely weakly domnated strateges, and show that safe opponent explotaton s possble specfcally n games n whch such gfts exst. Next, we provde a full characterzaton of the set of safe explotaton strateges, and we present several effcent algorthms for convertng any opponent explotaton archtecture (that s arbtrarly explotable) nto a fully safe opponent explotaton procedure. One of our algorthms s smlar to a procedure that guarantees safety n the lmt as the number of teratons goes to nfnty [McCracken and Bowlng 2004]; however, the algorthms n that paper can be arbtrarly explotable n the fntely repeated game settng, whch s what we are nterested n. The man dea of our algorthm s 1 We thank Vnce Contzer for pontng ths out to us.

3 Safe Opponent Explotaton 8:3 to play an ɛ-safe best response (a best response subject to the constrant of havng explotablty at most ɛ) at each tme step rather than a full best response, where ɛ s determned by the total amount of gfts obtaned thus far from the opponent. Safe best responses have also been studed n the context of Texas Hold em poker [Johanson et al. 2007], though that work dd not use them for onlne opponent explotaton. We also present several other safe algorthms whch alternate between playng an equlbrum and a best response dependng on how much has been won so far n expectaton. Algorthms have been developed whch guarantee ɛ-safety aganst specfc classes of opponents (statonary opponents and opponents wth bounded memory) [Powers et al. 2007]; by contrast, our algorthms acheve full safety aganst all opponents. It turns out that safe opponent explotaton s also possble n extensve-form games, though we must redefne what strateges consttute gfts and must make pessmstc assumptons about the opponent s play n game states off the path of play. We present effcent algorthms for safe explotaton n games of both perfect and mperfect nformaton, and fully characterze the space of safe strateges n these game models. We also show when safe explotaton can be performed n the mddle of a sngle teraton of an extensve-form game. Ths may be useful when a mstake s observed early on. We compare our algorthms expermentally on Kuhn poker [Kuhn 1950], a smplfed form of poker whch s a canoncal problem for testng game-solvng algorthms and has been used as a test problem for opponent-explotaton algorthms [Hoehn et al. 2005]. We observe that our algorthms obtan a sgnfcant mprovement over the best equlbrum strategy, whle also guaranteeng safety n the worst case. Thus, n addton to provdng theoretcal advantages over both mnmax and fully explotatve strateges, safe opponent explotaton can be effectve n practce. The rest of the artcle s organzed as follows. In Secton 2, we descrbe several alternatve uses of the approach, and ts applcablty to more general game classes, such as nfntely repeated, general-sum, and multplayer games. In Secton 3, we present game theory background. In Secton 4, we defne safety and present an example of a game where safe explotaton s not possble, as well as a game where t s possble. In Secton 5, we gve a full characterzaton of when safe explotaton s possble, whch turns out to concde wth games for whch a gft strategy (whch we defne) exsts for the opponent. In Secton 6, we present several new algorthms for safely explotng opponents, and show that pror algorthms are ether unsafe or unexplotatve. In Sectons 7 and 8, we provde a full characterzaton of safe strateges n strategc-form and extensve-form games (of both perfect and mperfect nformaton), respectvely. In Secton 9, we present experments n an extensve-form game of mperfect-nformaton that demonstrate that our algorthms safely explot suboptmal opponents sgnfcantly more than repeatedly playng the best stage-game Nash equlbrum. Fnally, we conclude and present future research drectons n Secton USES, APPLICABILITY, AND GENERALITY OF THE APPROACH In ths secton we suggest two alternatve uses of the approach, as well as dscuss ts applcablty and generalty Two Alternatve Uses of the Methodology We can vew safe explotaton as a meta-algorthm that enforces the safety of any opponent explotaton procedure by ensurng that t does not rsk too much at any pont. An opponent explotaton archtecture conssts of two components: 1) an opponent modelng algorthm, whch takes as nput the observatons of both players actons (to the extent that they are observable) and constructs a model of the opponent s strategy, and 2) a strategy selecton algorthm, whch takes the opponent model and the

4 8:4 S. Ganzfred and T. Sandholm Fg. 1. Our safe explotaton methodology used as a meta-algorthm whch makes any opponent explotaton archtecture safe. An opponent explotaton archtecture conssts of two components: an opponent modelng algorthm and a strategy selecton algorthm. Fg. 2. Our safe explotaton methodology used to replace the strategy selecton component whle retanng the opponent modelng component of any opponent explotaton archtecture. observatons as nput and outputs an explotatve strategy. Ths strategy may not be safe n general. The frst way to use our safe explotaton methodology s to obtan safety by curtalng the strateges that the archtecture may propose. Ths s depcted n Fgure 1. The second way to use the methodology s to vew our safe explotaton algorthms as alternatves to standard explotaton algorthms wthn the opponent explotaton paradgm. Our safe algorthms stll work wth any opponent modelng algorthm to construct an opponent model, but replace a potentally unsafe strategy selecton algorthm wth a new algorthm that guarantees safety. Ths s depcted n Fgure Bounds Suffce for Usng the Methodology We expect our algorthms to be useful n practce n many real-world domans, for example, n (cyber)securty games. It has been observed that human adversares n such domans often behave rratonally, and there can be sgnfcant benefts to explotng

5 Safe Opponent Explotaton 8:5 ther mstakes [Blythe et al. 2011; Pta et al. 2010, 2012]. However, the cost of makng a mstake ourselves s extremely hgh n such domans, for example, snce human lves could be at stake. Algorthms that can explot rratonal opponents whle stll guaranteeng safety would be very desrable. Furthermore, perhaps the man crtcsm of securty games to date s that the numerc payoffs for the attacker and defender are questonable. Our approach does not requre an exact model of the game. We only need a lower bound on the gfts (mstakes) that the opponent has gven us and an upper bound on the loss from our explotaton. Ths would be especally useful n securty games, snce t guarantees robustness even when the game models are not accurate. (Another advantage s that our approach apples also to mult-step games, whch are a rcher, more powerful framework than the securty game models used to date Stackelberg games where the defender moves once and then the attacker moves once.) 2.3. The Methodology Also Apples to Infntely Repeated, General-Sum, and Multplayer Games Our methodology also apples straghtforwardly to two-player zero-sum nfntely repeated games. Whle some of our algorthms specfcally depend on the fnte tme horzon and wll not extend to the nfnte settng, several of them do not, and wll apply straghtforwardly. In partcular, the algorthm that s most aggressve (among safe algorthms) and performed best n the experments does not rely on a fnte horzon. For general-sum and multplayer games, our methodology apples straghtforwardly f we replace the mnmax value wth the maxmn value (.e., maxmzng our expected payoff mnmzed over the other s strateges) n our algorthms. In two-player zero-sum games, these two values concde, and any equlbrum strategy guarantees at least ths value n expectaton n the worst case. In general-sum and multplayer games, these propertes do not hold; however, n many settngs t could be very desrable to explot opponents mstakes whle stll guaranteeng the maxmn value. For example, ths could be extremely useful n securty domans, whch are often modeled as nonzero-sum games [Korzhyk et al. 2011] snce safety s of hgh mportance Safe Explotaton Can Be Vewed as Selecton Among Equlbra of The Repeated Game As we dscuss n Secton 4, n repeated games, the set of safe strateges s the same as the set of maxmn strateges n the repeated game (and therefore, the set of Nash equlbra n the case where the repeated game s a two-player zero-sum game). Thus, one can vew our safe explotaton algorthms as procedures for selectng among equlbra of the repeated game. In the context of nonrepeated games, our work can be vewed as equlbrum selecton n the nonrepeated game. However, n both repeated and nonrepeated games, as we wll dscuss n Secton 8.3, our equlbrum refnement dffers from subgame perfecton [Selten 1965], and thus also from all the usual equlbrum refnements, whch are further refnements of subgame perfecton. 3. GAME THEORY BACKGROUND In ths secton, we brefly revew relevant defntons and pror results from game theory and game solvng Strategc-Form games The most basc game representaton, and the standard representaton for smultaneous-move games, s the strategc form. A strategc-form game (aka matrx game aka normal-form game) conssts of a fnte set of players N, a space of pure strateges S for each player, and a utlty functon u : S R for each player. Here S denotes the space of strategy profles vectors of pure strateges, one for each player.

6 8:6 S. Ganzfred and T. Sandholm The set of mxed strateges of player s the space of probablty dstrbutons over hs pure strategy space S. We wll denote ths space by. Defne the support of a mxed strategy to be the set of pure strateges played wth nonzero probablty. If the sum of the payoffs of all players equals zero at every strategy profle, then the game s called zero sum. In ths artcle, we wll be prmarly concerned wth two-player zerosum games. If the players are followng strategy profle σ,weletσ denote the strategy taken by player s opponent, and we let denote the opponent s entre mxed strategy space. Two-player zero-sum strategc-form games are often represented as a matrx, where the element n row m column n corresponds to player 1 s payoff when he plays hs m-th pure strategy and player 2 plays hs n-th pure strategy Extensve-Form games An extensve-form game s a general model of multagent decson makng wth potentally sequental and smultaneous actons and mperfect nformaton. As wth perfectnformaton games, extensve-form games consst prmarly of a game tree; each non-termnal node has an assocated player (possbly chance) that makes the decson at that node, and each termnal node has assocated utltes for the players. Addtonally, game states are parttoned nto nformaton sets, where the player whose turn t s to move cannot dstngush among the states n the same nformaton set. Therefore, n any gven nformaton set, a player must choose actons wth the same dstrbuton at each state contaned n the nformaton set. If no player forgets nformaton that he prevously knew, we say that the game has perfect recall. A (behavoral) strategy for player, σ, s a functon that assgns a probablty dstrbuton over all actons at each nformaton set belongng to Nash Equlbra Player s best response to σ s any strategy n arg max u (σ σ, σ ). A Nash equlbrum s a strategy profle σ such that σ s a best response to σ for all. An ɛ-equlbrum s a strategy profle n whch each player acheves a payoff of wthn ɛ of hs best response. In two player zero-sum games, we have the followng result, whch s known as the mnmax theorem [von Neumann 1928; Osborne and Rubnsten 1994]: v = max mn u 1 (σ 1, σ 2 ) = mn max u 1 (σ 1, σ 2 ). σ 1 1 σ 2 2 σ 2 2 σ 1 1 We refer to v as the value of the game to player 1. Sometmes we wll wrte v as the value of the game to player. Any equlbrum strategy for a player wll guarantee an expected payoff of at least the value of the game to that player. Defne the explotablty of σ to be the dfference between the value of the game and the performance of σ aganst ts nemess, formally: expl(σ ) = v mn u (σ, σ σ ). Snce there always exsts a nemess that s a pure strategy, ths expresson s equal to v mn s S u (σ, s ). For any ɛ 0, defne SAFE(ɛ) to be the set of strateges wth explotablty at most ɛ. The set SAFE(ɛ) s defned by lnear constrants: σ SAFE(ɛ) f and only f u (σ, s ) v ɛ for all s S. Defne an ɛ-safe best response of player to σ to be any strategy n argmax σ SAFE(ɛ)u (σ, σ ).

7 Safe Opponent Explotaton 8:7 Fg. 3. Payoff matrx of Rock-Paper-Scssors. All fnte games have at least one Nash equlbrum [Nash 1951]. In two-player zerosum strategc-form games, a Nash equlbrum can be found effcently by lnear programmng. In the case of zero-sum extensve-form games wth perfect recall, there are effcent technques for fndng an equlbrum, such as lnear programmng [Koller et al. 1994]. An ɛ-equlbrum can be found n even larger games va algorthms such as generalzatons of the excessve gap technque [Hoda et al. 2010] and counterfactual regret mnmzaton [Znkevch et al. 2007]. The latter two algorthms scale to games wth approxmately game tree states, whle the most scalable current generalpurpose lnear programmng technque (CPLEX s barrer method) scales to games wth around 10 8 states. By contrast, full best responses can be computed n tme lnear n the sze of the game tree, whle the best known technques for computng ɛ-safe best responses have runnng tmes roughly smlar to an equlbrum computaton [Johanson et al. 2007] Repeated games In repeated games, the stage game s repeated for a fnte number T of teratons. At each teraton, players can condton ther strateges on everythng that has been observed so far. In strategc-form games, ths generally ncludes the full mxed strategy of the agent n all prevous teratons, as well as all actons of the opponent (though not hs full strategy). In extensve-form games, generally only the actons of the opponent along the path of play are observed; n games wth mperfect nformaton, the opponent s prvate nformaton may also be observed n some stuatons. 4. SAFETY One desrable property of a strategy for a repeated game s that t s safe. Defnton 4.1. A safe strategy for a repeated game s a strategy that guarantees a worst-case payoff of at least v per perod n expectaton. The set of safe strateges s the same as the set of mnmax strateges n the full repeated game. Clearly playng a (stage-game) mnmax strategy at each teraton s safe, snce t guarantees at least v n each teraton. However, a mnmax strategy may fal to maxmally explot a suboptmal opponent. On the other hand, devatng from stage-game equlbrum n an attempt to explot a suboptmal opponent could lose the guarantee of safety and may result n an expected payoff below the value of the game aganst a deceptve opponent (or f the opponent model s ncorrect). Thus, a natural queston to consder s whether there exst strateges that are safe, yet devate from stage-game equlbrum strateges (n order to explot an opponent s mstakes) A Game n Whch Safe Explotaton s Not Possble Consder the classc game of Rock-Paper-Scssors (RPS), whose payoff matrx s depcted n Fgure 3. The unque equlbrum σ s for each player to randomze equally among all three pure strateges. Now suppose that our opponent has played Rock n each of the frst 10 teratons (whle we have played accordng to σ ). We may be tempted to try to explot hm by playng the pure strategy Paper at the 11th teraton. However, ths would not be safe;

8 8:8 S. Ganzfred and T. Sandholm Fg. 4. Payoff matrx of RPST. t s possble that he has n fact been playng hs equlbrum strategy all along, and that he just played Rock each tme by chance (ths wll happen wth probablty 1 ) It s also possble that he wll play Scssors n the next round (perhaps to explot the fact that he thnks we are more lkely to play Paper havng observed hs actons). Aganst such a strategy, we would actually have a negatve expected total proft 0 n the frst 10 rounds and -1 n the 11th. Thus, our strategy would not be safe. By smlar reasonng, t s easy to see that any devaton from σ wll not be safe, and that safe explotaton s not possble n RPS A Game n Whch Safe Explotaton s Possble Now consder a varant of RPS n whch player 2 has an addtonal pure strategy T. If he plays T, then we get a payoff of 4 f we play R, and 3 f we play P or S. The payoff matrx of ths new game RPST s gven n Fgure 4. Clearly the unque equlbrum s stll for both players to randomze equally between R, P, and S. Now suppose we play our equlbrum strategy n the frst game teraton, and the opponent plays T; no matter what acton we played, we receve a payoff of at least 3. Suppose we play the pure strategy R n the second round n an attempt to explot hm (snce R s our best response to T). In the worst case, our opponent wll explot us n the second round by playng P, and we wll obtan payoff 1. But combned over both tme steps, our payoff wll be postve no matter what the opponent does at the second teraton. Thus, our strategy consttuted a safe devaton from equlbrum. Ths was possble because of the exstence of a gft strategy for the opponent; no such gft strategy s present n standard RPS. 5. CHARACTERIZING GIFTS What exactly consttutes a gft? Does t have to be a strctly domnated pure strategy, lke T n the precedng example? What about weakly domnated strateges? What about terated domnance, or domnated mxed strateges? In ths secton we frst provde some negatve results whch show that several natural canddate defntons of gfts strateges are not approprate. Then we provde a formal defnton of gfts and show that safe explotaton s possble f and only f such gft strateges exst. Recent work has asserted the followng. 2 Asserton 1. [Waugh 2009]. An equlbrum strategy makes an opponent ndfferent to all non-[weakly]-teratvely-domnated strateges. That s, to te an equlbrum strategy n expectaton, all one must do s play a non-[weakly]-teratvely-domnated strategy. Ths asserton would seem to mply that gfts correspond to strateges that put weght on pure strateges that are weakly teratvely domnated. However, consder the game shown n Fgure 5. It can easly be shown that ths game has a unque equlbrum, n whch P1 plays U and D wth probablty 1 2, and P2 plays L and M wth probablty 1 2. The value 2 Ths s made as a statement of fact n pror work [Waugh 2009], and not n the form of an asserton.

9 Safe Opponent Explotaton 8:9 Fg. 5. A game wth a gft strategy that s not weakly teratvely domnated. of the game to player 1 s 2.5. If player 1 plays hs equlbrum strategy and player 2 plays R, player 1 gets expected payoff of 5, whch exceeds hs equlbrum payoff; thus R consttutes a gft, and player 1 can safely devate from equlbrum to try to explot hm. But R s not domnated under any form of domnance. Ths dsproves the asserton, and causes us to rethnk our noton of gfts. PROPOSITION 5.1. It s possble for a strategy that survves terated weak domnance to obtan expected payoff worse than the value of the game aganst an equlbrum strategy. We mght now be tempted to defne a gft as a strategy that s not n the support of any equlbrum strategy. However, the game n Fgure 6 shows that t s possble for a strategy to not be n the support of an equlbrum and also not be a gft (snce f P1 plays hs only equlbrum strategy U, he obtans 0 aganst R, whch s the value of the game). Now that we have ruled out several canddate defntons of gft strateges, we now present our new defnton, whch we relate formally to safe explotaton n Proposton 5.3. Defnton 5.2. A strategy σ s a gft strategy f there exsts an equlbrum strategy σ for the other player such that σ s not a best response to σ.3 3 Ths defnton of gft strateges concdes wth the strateges for the opponent specfed by the thrd step of a procedure for selectng a partcular equlbrum of a (one-shot) two-player zero-sum game, known as Dresher s procedure [Dresher 1961; van Damme 1987]. The procedure assumes the opponent wll make a mstake (.e., by playng a gft strategy), then selects a strategy that maxmzes the mnmum gan resultng from a possble mstake of the opponent. It has been shown that the strateges selected by ths procedure concde wth the proper equlbra of the game [van Damme 1987], an equlbrum refnement concept defned by Myerson [1978]. Thus, proper equlbrum strateges explot all gft strateges, and one could equvalently defne gft strateges as strateges that are not a best response to a proper equlbrum strategy of the opponent. One could vew proper equlbra, as well as some other equlbrum refnement concepts (e.g., tremblng-hand perfect equlbrum) as approaches for explotng mstakes of the opponent n (nonrepeated) games although they are typcally thought of as means to prescrbe acton probabltes for nformaton sets that are reached wth zero probablty n equlbrum. In contrast, our man focus s on repeated games, although our technques apply to sngle-shot games as well. Furthermore, we wll show n Secton 8.3 that even n sngle-shot games, our safe explotatve strateges dffer from the strateges prescrbed by subgame perfecton [Selten 1965], and thus our approach dffers from all pror refnements that are further refnements of subgame perfecton. So, our work can be vewed as provdng novel equlbrum selecton concepts and procedures. In broad strokes, at every pont n the game, pror refnements try to play as well as possble aganst an (almost) ratonal opponent (e.g., one who trembles wth small probablty), whle ours explots an opponent model (whch does not have to be ratonal n any way) as much as possble subject to safety. So, our approach can explot the opponent sgnfcantly more than pror equlbrum refnements. (Some of the pror refnements also assume that we wll tremble wth small probablty ourselves; ths s not motvated by explotaton, but rather so that we know how to respond to actons further down the tree at nformaton sets that would otherwse be reached wth probablty zero.) Another dfference s that n our technque, a safe, maxmally explotatve strategy can be computed n polynomal tme both n theory and practce. In contrast, whle proper equlbrum strateges can be computed n polynomal tme n theory for both strategc-form and extensve-form games, those polynomal-tme algorthms are numercally unstable n practce [Mltersen and Sørensen 2006, 2008].

10 8:10 S. Ganzfred and T. Sandholm Fg. 6. Strategy R s not n the support of an equlbrum for player 2, but s also not a gft. When such a strategy σ exsts, player can wn an mmedate proft beyond v aganst an opponent who plays σ by smply playng the safe strategy σ ; then he can play a potentally unsafe strategy (that has explotablty below some lmt) n future teratons n an attempt to explot perceved weaknesses of the opponent. Usng ths defnton, RPS and the game depcted n Fgure 6 have no gft strateges for ether player, whle T s a gft for player 2 n RPST, and R s a gft for player 2 n the game depcted n Fgure 5. PROPOSITION 5.3. Assumng we are not n a trval game n whch all of player s strateges are mnmax strateges, then non-stage-game-equlbrum safe strateges exst f and only f there exsts at least one gft strategy for the opponent. PROOF. Suppose some gft strategy σ exsts for the opponent. Then there exsts an equlbrum strategy σ such that u (σ, σ ) >v.letɛ = u (σ, σ ) v.lets be a nonequlbrum strategy for player. Suppose player plays σ n the frst round, and n the second round does the followng: f the opponent dd not play σ n the frst round, he plays σ n all subsequent rounds. If the opponent dd play σ n the frst round, then n the second round he plays ˆσ, where ˆσ s a mxture between s and σ that has explotablty n (0, ɛ) (we can always obtan such a mxture by puttng suffcently much weght on σ ), and he plays σ n all subsequent rounds. Such a strategy consttutes a safe strategy that devates from stage-game equlbrum. Now suppose no gft strategy exsts for the opponent, and suppose we devate from equlbrum for the frst tme n some teraton t. Suppose the opponent plays a nemess strategy at tme step t (to the strategy we are playng at tme step t ), and plays an equlbrum strategy at all future tme steps. Then we wll wn less than v n expectaton aganst hs strategy. Therefore, we cannot safely devate from equlbrum. The followng procedure gves an effcent algorthm, consstng of solvng two lnear programs (LPs), to determne whether a gft strategy for the opponent exsts n a two-player zero-sum strategc-form game (and therefore whether safe explotaton s possble). (1) Compute an equlbrum by solvng the LP; ths determnes the value of the game to player, v. (2) Solve the LP that maxmzes the expected payoff of player aganst the unform random strategy of the opponent, subject to the constrants that player s strategy s an equlbrum (these constrants wll use v ). Let ˆv denote the optmal objectve value of ths LP. (3) If ˆv > v, then at least one gft strategy for the opponent exsts; otherwse no gft strateges exst. PROPOSITION 5.4. The above procedure determnes n polynomal tme whether a gft strategy for the opponent exsts n a gven two-player zero-sum game.

11 Safe Opponent Explotaton 8:11 PROOF. Suppose a gft strategy s for the opponent exsts. Then there exsts an equlbrum strategy σ such that u (σ, s ) >v. For every other strategy t for the opponent, we have u (σ, t ) v. Thus, player s expected payoff of playng σ aganst the unform random strategy wll strctly exceed v,andˆv > v. Now suppose no gft strateges exst. Then for all equlbrum strateges σ and all strateges s for the opponent, we have u (σ, s ) = v. Thus, all equlbrum strateges wll obtan expected payoff v aganst the unform random strategy, and we have ˆv = v. The procedure s polynomal tme snce t conssts of solvng LPs of polynomal sze (the LP formulatons for computng a best response as well as the equlbrum constrants are descrbed by, for example, Koller et al. [1994]). 6. SAFETY ANALYSIS OF SOME NATURAL EXPLOITATION ALGORITHMS Now that we know t s possble to safely devate from equlbrum n certan games, can we construct effcent procedures for mplementng such safe explotatve strateges? In ths secton we analyze the safety of several natural explotaton algorthms. In short, we wll show that all pror algorthms and natural other canddate algorthms are ether unsafe or unexplotatve. We ntroduce algorthms that are safe and explotatve Rsk What You ve Won (RWYW) The Rsk What You ve Won algorthm (RWYW) s qute smple and natural; essentally, at each teraton t rsks only the amount of proft won so far. More specfcally, at each teraton t, RWYW plays an ɛ-safe best response to a model of the opponent s strategy (accordng to some opponent modelng algorthm M), where ɛ s our current cumulatve payoff mnus (t 1)v. Pseudocode s gven n Algorthm 1. Algorthm 1 Rsk What You ve Won (RWYW) v value of the game to player k 1 0 for t = 1toT do π t argmax π SAFE(max{k t,0}) M(π) Play acton a t accordng to πt Update M wth opponent s actons, a t k t+1 k t + u (a t, at ) v end for PROPOSITION 6.1. RWYW s not safe. PROOF. Consder RPS, and assume our opponent modelng algorthm M says that the opponent wll play accordng to hs dstrbuton of actons observed so far. Snce ntally k 1 = 0, we must play our equlbrum strategy σ at the frst teraton, snce t s the only strategy wth explotablty of 0. Wthout loss of generalty, assume the opponent plays R n the frst teraton. Our expected payoff n the frst teraton s 0, snce σ has expected payoff of 0 aganst R (or any strategy). Suppose we had played R ourselves n the frst teraton. Then we would have obtaned an actual payoff of 0, and would set k 2 = 0. Thus we wll be forced to play σ at the second teraton as well. If we had played P n the frst round, we would have obtaned a payoff of 1, and set k 2 = 1. We would then set π 2 to be the pure strategy P, snce our opponent model dctates the

12 8:12 S. Ganzfred and T. Sandholm opponent wll play R agan, and P s the unque k 2 -safe best response to R. Fnally, f we had played S n the frst round, we would have obtaned an actual payoff of -1, and would set k 2 = 1; ths would requre us to set π 2 equal to σ. Now, suppose the opponent had actually played accordng to hs equlbrum strategy n teraton 1, plays the pure strategy S n the second round, then plays the equlbrum n all subsequent rounds. As dscussed above, our expected payoff at the frst teraton s zero. Aganst ths strategy, we wll actually obtan an expected payoff of -1 n the second teraton f the opponent happened to play R n the frst round, whle we wll obtan an expected of 0 n the second round otherwse. So our expected payoff n the second round wll be 1 3 ( 1) = 1 3. In all subsequent rounds our expected payoff wll be zero. Thus our overall expected payoff wll be 1 3, whch s less than the value of the game; so RWYW s not safe. RWYW s not safe because t does not adequately dfferentate between whether profts were due to skll (.e., from gfts) or to luck Rsk What You ve Won n Expectaton (RWYWE) A better approach than RWYW would be to rsk the amount won so far n expectaton. Ideally we would lke to do the expectaton over both our randomzaton and our opponent s, but ths s not possble n general snce we only observe the opponent s acton, not hs full strategy. However, t would be possble to do the expectaton only over our randomzaton. For example, suppose we play accordng to the equlbrum σ at one teraton of RPS, and end up selectng acton R, whle the opponent selects acton P; then our actual payoff s -1, but our expected payoff (over our own randomzaton) s 0. It turns out that we can ndeed acheve safety usng ths procedure, whch we call RWYWE. Pseudocode s gven n Algorthm 2. Here u (π t, at ) denotes our expected payoff of playng our mxed strategy π t aganst the opponent s observed acton a t. The dfference between RWYWE and RWYW s n the step for updatng k t :RWYW uses u (a t, at ) whle RWYWE uses u (π t, at ). Algorthm 2 Rsk What You ve Won n Expectaton (RWYWE) v value of the game to player k 1 0 for t = 1toT do π t argmax π SAFE(k t ) M(π) Play acton a t accordng to πt The opponent plays acton a t accordng to unobserved dstrbuton πt Update M wth opponent s actons, a t k t+1 k t + u (π t, at ) v end for LEMMA 6.2. Let π be updated accordng to RWYWE, and suppose the opponent plays accordng to π. Then for all n 0, n E[ k n+1 ] = u (π t, π t ) nv.

13 Safe Opponent Explotaton 8:13 PROOF. Snce k 1 = 0, the statement holds for n = 0. Now suppose the statement holds for all t n, forsomen 0. Then E[ k n+2 ] = E[ k n+1 + u (π n+1, a n+1 ) v ] = E[ k n+1 ] +E[ u (π n+1, a n+1 )] E[ v ] [ n ] = u (π t, π t ) nv + E[ u (π n+1, a n+1 )] v = = [ n ] u (π t, π t ) nv + u (π n+1, π n+1 ) v n+1 u (π t, π t ) (n + 1)v. LEMMA 6.3. Let π be updated accordng to RWYWE. Then for all t 1, k t 0. PROOF. By defnton, k 1 = 0. Now suppose k t 0forsomet 1. By constructon, π t has explotablty at most k t. Thus, we must have Thus k t+1 0 and we are done. PROPOSITION 6.4. RWYWE s safe. PROOF. By Lemma 6.2, u (π t, at ) v k t. T u (π t, π t ) = E[ kt+1 ] +Tv. By Lemma 6.3, k T+1 0, and therefore E[ k T+1 ] 0. So and RWYWE s safe. T u (π t, π t ) Tv, RWYWE s smlar to the Safe Polcy Selecton Algorthm (SPS) [McCracken and Bowlng 2004]. The man dfference s that SPS uses an addtonal decay functon f : N R settng k 1 f (1) and usng the update step k t+1 k t + f (t + 1) + u (π t, a t ) v. They requre f to satsfy the followng propertes (1) f (t) >0 for all t (2) lm T T f (t) T = 0.

14 8:14 S. Ganzfred and T. Sandholm In partcular, they obtaned good expermental results usng f (t) = β t. They are able to show that SPS s safe n the lmt as T ; 4 however SPS s arbtrarly explotable n fntely repeated games. Furthermore, even n nfntely repeated games, SPS can lose a sgnfcant amount; t s merely the average loss that approaches zero. We can thnk of RWYWE as SPS but usng f (t) = 0 for all t Best Equlbrum Strategy Gven an opponent modelng algorthm M, we could play the best Nash equlbrum accordng to M at each tme step: π t = argmax π SAFE(0) M(π). Ths would clearly be safe, but can only explot the opponent as much as the best equlbrum can, and potentally leaves a lot of explotaton on the table Regret Mnmzaton between an Equlbrum and an Opponent Explotaton Algorthm We could use a no-regret algorthm (e.g., Exp3 [Auer et al. 2002]) to select between an equlbrum and an (unsafe) opponent explotaton algorthm at each teraton. As pror work has ponted out [McCracken and Bowlng 2004], ths would be safe n the lmt as T. However, ths would not be safe n fntely repeated games. Even n the nfntely repeated case, no-regret algorthms only guarantee that average regret goes to 0 n the lmt; n fact, total regret can stll grow arbtrarly large Regret Mnmzaton n the Space of Equlbra Regret mnmzaton n the space of equlbra s safe, but agan would potentally mss out on a lot of explotaton aganst suboptmal opponents. Ths procedure was prevously used to explot opponents n Kuhn poker [Hoehn et al. 2005] Best Equlbrum Followed by Full Explotaton (BEFFE) The BEFFE algorthm works as follows. We start off playng the best equlbrum strategy accordng to some opponent model M. Then we swtch to playng a full best response for all future teratons f we know that dong so wll keep our strategy safe n the full game (n other words, f we know we have accrued enough gfts to support full explotaton n the remanng teratons). Specfcally, we play a full best response at tme step t f the amount of gfts we have accumulated, k t, s at least (T t + 1)(v ɛ), where ɛ s the explotablty of a full best response. Otherwse, we play the best equlbrum. Pseudocode s gven n Algorthm 3. Ths algorthm s smlar to the DBBR algorthm [Ganzfred and Sandholm 2011], whch plays an equlbrum for some fxed number of teratons, then swtches to full explotaton. However, BEFFE automatcally detects when ths swtch should occur, whch has several advantages. Frst, t s one fewer parameter requred by the algorthm. More mportantly, t enables the algorthm to guarantee safety. PROPOSITION 6.5. BEFFE s safe. 4 We recently dscovered a mstake n ther proof of safety n the lmt; however, the result s stll correct. A corrected proof s avalable at bowlng/papers/04aaa-fallsymp-errata.pdf.

15 Safe Opponent Explotaton 8:15 Algorthm 3 Best Equlbrum Followed by Full Explotaton (BEFFE) v value of the game to player k 1 0 for t = 1toT do π BR t argmax π M(π) ɛ v mn π u (π BR t, π ) f k t >= (T t + 1)(v ɛ) then π t π BR t else π t argmax π SAFE(0) M(π) end f Play acton a t accordng to πt The opponent plays acton a t accordng to unobserved dstrbuton πt Update M wth opponent s actons, a t k t+1 k t + u (π t, at ) v end for PROOF. Follows by same reasonng as proof of safety of RWYWE, snce we are playng a strategy wth explotablty at most k t at each teraton. One possble advantage of BEFFE over RWYWE s that t potentally saves up explotablty untl the end of the game, when t has the most accurate nformaton on the opponent s strategy (whle RWYWE does explotaton from the start when the opponent model has noser data). On the other hand, BEFFE possbly msses out on addtonal rounds of explotaton by watng untl the end, snce t may accumulate addtonal gfts n the explotaton phase that t dd not take nto account. Furthermore, by watng longer before turnng on explotaton, one s experence of the opponent can be from the wrong part of the space; that s, the space that s reached when playng equlbrum but not when explotng. Consequently, the explotaton mght not be as effectve because t may be based on less data about the opponent n the pertnent part of the space. Ths ssue has been observed n opponent explotaton n Heads-Up Texas Hold em poker [Ganzfred and Sandholm 2011] Best Equlbrum and Full Explotaton when Possble (BEFEWP) BEFEWP s smlar to BEFFE, but rather than watng untl the end of the game, we play a full best response at each teraton where ts explotablty s below k t ; otherwse we play the best equlbrum. Pseudocode s gven n Algorthm 4. Lke RWYWE, BEFEWP wll contnue to explot a suboptmal opponent throughout the match provded the opponent keeps gvng us gfts. It also guarantees safety, snce we are stll playng a strategy wth explotablty at most k t at each teraton. However, playng a full best response rather than a safe best response early n the match may not be the greatest dea, snce our data on the opponent s stll qute nosy. PROPOSITION 6.6. BEFEWP s safe. 7. A FULL CHARACTERIZATION OF SAFE STRATEGIES IN STRATEGIC-FORM GAMES In the prevous secton we saw a varety of opponent explotaton algorthms, some whch are safe and some whch are unsafe. In ths secton, we fully characterze the space of safe algorthms. Informally, t turns out that an algorthm wll be safe f at each tme step t selects a strategy wth explotablty at most k t, where k s updated accordng to the RWYWE procedure. Ths does not mean that RWYWE s the only safe

16 8:16 S. Ganzfred and T. Sandholm Algorthm 4 Best Equlbrum and Full Explotaton When Possble (BEFEWP) v value of the game to player k 1 0 for t = 1toT do π BR t argmax π M(π) ɛ v mn π u (π BR t, π ) f ɛ<= k t then π t π BR t else π t argmax π SAFE(0) M(π) end f Play acton a t accordng to πt The opponent plays acton a t accordng to unobserved dstrbuton πt Update M wth opponent s actons, a t k t+1 k t + u (π t, at ) v end for algorthm, or that safe algorthms must explctly use the gven update rule for k t ;t just means that the explotablty at each tme step must be bounded by the partcular value k t, assumng that k had hypothetcally been updated accordng to the RWYWE rule. 5 Defnton 7.1. An algorthm for selectng strateges s expected-proft-safe f t satsfes the rule π t SAFE(k t ) at each tme step t from 1 to T, where ntally k 1 = 0andk s updated usng the rule k t+1 k t + u (π t, a t ) v. PROPOSITION 7.2. A strategy π (for the full game, not the stage game) s safe f and only f t s expected-proft-safe. PROOF. If π s expected-proft-safe, then t follows that π s safe by smlar reasonng to the proof of Proposton 6.4. Now suppose π s safe, but at some teraton t selects π t wth explotablty exceedng k t, as defned n Defnton 7.1 (assume t s the frst such teraton); let e denote the explotablty of π t. Suppose the opponent had been playng the pure strategy that selects acton a t wth probablty 1 at each teraton t for all t < t, and suppose he 5 We could generalze the approaches to play strateges n SAFE(f (k t )) at each tme step rather than SAFE(k t ),wheref (k t ) k t s an arbtrary functon that s a potentally lower upper bound on the explotablty. Ths would result n a larger worst-case payoff guarantee when f (k t )<k t, but potentally at the expense of explotaton (snce we are now restrctng our space of strateges to a smaller set). In the opposte drecton, we could also select strateges n SAFE(k t + δ) for δ>0; ths would lead to strateges that are approxmately safe (wthn an addtve factor δ), and potentally acheve hgher levels of explotaton.

17 Safe Opponent Explotaton 8:17 plays hs nemess strategy to π t at tme step t (and follows a mnmax strategy at all future teratons). Then our expected payoff n the frst t teratons s < = t 1 u (π t, a t ) + v e t 1 u (π t, a t ) + v k t t 1 t u (π t, a t ) + 1 v u (π t, a t ) (t 1)v (1) = t v. In Equaton 1, we use Lemma 6.2 and the fact that E[ k t ] = k t, snce the opponent played a determnstc strategy n the frst t 1 rounds. We wll obtan payoff at most v at each future teraton, snce the opponent s playng a mnmax strategy. So π s not safe and we have a contradcton; therefore π must be expected-proft-safe, and we are done. 8. SAFE EXPLOITATION IN EXTENSIVE-FORM GAMES In extensve-form games, we cannot mmedately apply RWYWE (or the other safe algorthms that devate from equlbrum), snce we do not know what the opponent would have done at game states off the path of play (and thus cannot evaluate the expected payoff of our mxed strategy) Extensve-Form Games of Perfect Informaton In extensve-form games of perfect nformaton, t turns out that to guarantee safety we must assume pessmstcally that the opponent s playng a nemess off the path of play (whle playng hs observed acton on the path of play). Ths pessmsm potentally lmts our amount of explotaton when the opponent s not playng a nemess, but s needed to guarantee safety. We present an extensve-form verson of RWYWE below as Algorthm 5. As n the strategc-form case, the tme step t refers to the teraton of the repeated game (not to the depth of the tree wthn a sngle teraton); the strateges refer to behavoral strateges for a sngle teraton of the full extensve-form game. Algorthm 5 Extensve-Form RWYWE v value of the game to player k 1 0 for t = 1toT do π t argmax π SAFE(k t ) M(π) Play acton a t accordng to πt The opponent plays acton a t accordng to unobserved dstrbuton πt Update M wth opponent s actons, a t τ t strategy for the opponent that plays at on the path of play, and plays a best response to π t offthepathofplay k t+1 k t + u (π t, τ t ) v. end for

18 8:18 S. Ganzfred and T. Sandholm LEMMA 8.1. Let π be updated accordng to Extensve-Form RWYWE, and suppose the opponent plays accordng to π. Then for all n 0, n E[ k n+1 ] u (π t, π t ) nv. PROOF. Snce k 1 = 0, the statement holds for t = 0. Now suppose the statement holds for all t n, forsomen 0. Then E[ k n+2 ] = E[ k n+1 + u (π n+1, τ n+1 ) v ] = E[ k n+1 ] +E[ u (π n+1, τ n+1 )] E[ v ] [ n ] u (π t, π t ) nv + E[ u (π n+1, τ n+1 )] v = [ n ] u (π t, π t ) nv + u (π n+1, π n+1 ) v n+1 u (π t, π t ) (n + 1)v. LEMMA 8.2. Let π be updated accordng to Extensve-Form RWYWE. Then for all t 1, k t 0. PROOF. By defnton, k 1 = 0. Now suppose k t 0forsomet 1. By constructon, π t has explotablty at most k t. Thus, we must have u (π t, τ t ) v k t. Thus k t+1 0 and we are done. PROPOSITION 8.3. Extensve-Form RWYWE s safe. PROOF. By Lemma 8.1, T u (π t, π t ) E[ kt+1 ] +Tv. By Lemma 8.2, k T+1 0, and therefore E[ k T+1 ] 0. So T u (π t, π t ) Tv, and Extensve-Form RWYWE s safe. We now provde a full characterzaton of safe explotaton algorthms n extensveform games smlarly to what we dd for strategc-form games earler n the artcle. Defnton 8.4. An algorthm for selectng strateges n extensve-form games of perfect nformaton s expected-proft-safe f t satsfes the rule π t SAFE(k t ) at each tme step t from 1 to T, where ntally k 1 = 0andk s updated usng the same rule as Extensve-Form RWYWE.

19 Safe Opponent Explotaton 8:19 LEMMA 8.5. Let π be updated accordng to Extensve-Form RWYWE, and suppose the opponent plays accordng to π = τ, where τ s defned n Algorthm 5. Then for all n 0, n E[ k n+1 ] = u (π t, π t ) nv. PROOF. Snce k 1 = 0, the statement holds for t = 0. Now suppose the statement holds for all t n, forsomen 0. Then E[ k n+2 ] = E[ k n+1 + u (π n+1, τ n+1 ) v ] = E[ k n+1 ] +E[ u (π n+1, τ n+1 )] E[ v ] [ n ] = u (π t, π t ) nv + E[ u (π n+1, τ n+1 )] v = = [ n ] u (π t, π t ) nv + u (π n+1, π n+1 ) v n+1 u (π t, π t ) (n + 1)v. PROPOSITION 8.6. A strategy π n an extensve-form game of perfect nformaton s safe f and only f t s expected-proft-safe. PROOF. Ifπ s expected-proft-safe, then t follows that π s safe by smlar reasonng to the proof of Proposton 8.3. Now suppose π s safe, but at some teraton t selects π t wth explotablty exceedng k t, as defned n Defnton 8.4; let e denote the explotablty of π t. Suppose the opponent had been playng the pure strategy that selects acton a t wth probablty 1 at each teraton t for all t < t, and suppose he plays hs nemess strategy at tme step t (and follows a mnmax strategy at all future teratons). Then our expected payoff s < = t 1 u (π t, a t ) + v e t 1 u (π t, a t ) + v k t t 1 t u (π t, a t ) + 1 v u (π t, a t ) (t 1)v = t v. In Equaton (2), we use Lemma 8.5 and the fact that E[ k t ] = k t, snce the opponent played a determnstc strategy n the frst t 1 rounds. We wll obtan payoff at most v at each future teraton, snce the opponent s playng a mnmax strategy. So π s not safe and we have a contradcton; therefore π must be proft-safe, and we are done.

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

Double-oracle Algorithm for Computing an Exact Nash Equilibrium in Zero-sum Extensive-form Games

Double-oracle Algorithm for Computing an Exact Nash Equilibrium in Zero-sum Extensive-form Games Double-oracle Algorthm for Computng an Exact Nash Equlbrum n Zero-sum Extensve-form Games Branslav Bošanský 1, Chrstopher Kekntveld 2, Vlam Lsý 1, Jří Čermák 1, Mchal Pěchouček 1 1 Agent Technology Center,

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

A Game-Theoretic Analysis of Strictly Competitive Multiagent Scenarios

A Game-Theoretic Analysis of Strictly Competitive Multiagent Scenarios A Game-Theoretc Analyss of Strctly Compettve Multagent Scenaros Felx Brandt Felx Fscher Paul Harrensten Computer Scence Department Unversty of Munch 80538 Munch, Germany {brandtf,fscherf,harrenst}@tcs.f.lmu.de

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Microeconomics 2 Game Theory Lecture notes. 1. Simultaneous-move games: Solution in (iterated) strict dominance and rationalizable strategies

Microeconomics 2 Game Theory Lecture notes. 1. Simultaneous-move games: Solution in (iterated) strict dominance and rationalizable strategies Sapenza Unversty of Rome. Ph.D. Program n Economcs a.y. 202-204 Mcroeconomcs 2 Game Theory Lecture notes. Smultaneous-move games: Soluton n (terated) strct domnance and ratonalzable strateges. Smultaneous-move

More information

Available online at ScienceDirect. IFAC-PapersOnLine (2016)

Available online at   ScienceDirect. IFAC-PapersOnLine (2016) Avalable onlne at www.scencedrect.com ScenceDrect IFACPapersOnLne 49 (06) 09 0 Addng Informatonal Belefs to the Players Strategc Thnkng Model 06, IFAC (Internatonal Federaton of Automatc Control) Hostng

More information

Computing Optimal Strategies to Commit to in Stochastic Games

Computing Optimal Strategies to Commit to in Stochastic Games Computng Optmal trateges to Commt to n tochastc Games Joshua Letchford 1 and Lam MacDermed and Vncent Contzer 1 and Ronald Parr 1 and Charles L. Isbell 1 Duke Unversty, Department of Computer cence, Durham,

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Lossless Abstraction of Imperfect Information Games

Lossless Abstraction of Imperfect Information Games Lossless Abstracton of Imperfect Informaton Games ANDREW GILPIN AND TUOMAS SANDHOLM Carnege Mellon Unversty, Pttsburgh, Pennsylvana Abstract. Fndng an equlbrum of an extensve form game of mperfect nformaton

More information

Weighted Penalty Model for Content Balancing in CATS

Weighted Penalty Model for Content Balancing in CATS Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Ultimate X Bonus Streak Analysis

Ultimate X Bonus Streak Analysis Ultmate X Bonus Streak Analyss Gary J. Koehler John B. Hgdon Emnent Scholar, Emertus Department of Informaton Systems and Operatons Management, 35 BUS, The Warrngton College of Busness, Unversty of Florda,

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented

More information

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( ) Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

It can be smart to be dumb

It can be smart to be dumb It can be smart to be dumb Davd H. Wolpert, Mchael Harre 2 MS 269-, NASA Ames Research Center, Moffett Feld, CA, 94035, USA 2 The Centre for the Mnd and The School of Informaton Technologes, Sydney Unversty,

More information

4.3- Modeling the Diode Forward Characteristic

4.3- Modeling the Diode Forward Characteristic 2/8/2012 3_3 Modelng the ode Forward Characterstcs 1/3 4.3- Modelng the ode Forward Characterstc Readng Assgnment: pp. 179-188 How do we analyze crcuts wth juncton dodes? 2 ways: Exact Solutons ffcult!

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem EE 508 Lecture 6 Degrees of Freedom The Approxmaton Problem Revew from Last Tme Desgn Strategy Theorem: A crcut wth transfer functon T(s) can be obtaned from a crcut wth normalzed transfer functon T n

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Multiband Jamming Strategies with Minimum Rate Constraints

Multiband Jamming Strategies with Minimum Rate Constraints Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE36L, Power Electroncs, DC-DC Boost Converter Verson Feb. 8, 9 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

Opportunistic Beamforming for Finite Horizon Multicast

Opportunistic Beamforming for Finite Horizon Multicast Opportunstc Beamformng for Fnte Horzon Multcast Gek Hong Sm, Joerg Wdmer, and Balaj Rengarajan allyson.sm@mdea.org, joerg.wdmer@mdea.org, and balaj.rengarajan@gmal.com Insttute IMDEA Networks, Madrd, Span

More information

Unit 1. Current and Voltage U 1 VOLTAGE AND CURRENT. Circuit Basics KVL, KCL, Ohm's Law LED Outputs Buttons/Switch Inputs. Current / Voltage Analogy

Unit 1. Current and Voltage U 1 VOLTAGE AND CURRENT. Circuit Basics KVL, KCL, Ohm's Law LED Outputs Buttons/Switch Inputs. Current / Voltage Analogy ..2 nt Crcut Bascs KVL, KCL, Ohm's Law LED Outputs Buttons/Swtch Inputs VOLTAGE AND CRRENT..4 Current and Voltage Current / Voltage Analogy Charge s measured n unts of Coulombs Current Amount of charge

More information

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001 GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS by Ismet Sahn B.S., Cukurova Unversty, 996 M.S., Unversty of Florda, 00 Submtted to the Graduate Faculty of School of Engneerng n partal

More information

Introduction to Coalescent Models. Biostatistics 666 Lecture 4

Introduction to Coalescent Models. Biostatistics 666 Lecture 4 Introducton to Coalescent Models Bostatstcs 666 Lecture 4 Last Lecture Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles Expected to decrease wth dstance

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Interdependent Relationships in Game Theory: A Generalized Model

Interdependent Relationships in Game Theory: A Generalized Model Interdependent elatonshps n Game Theory: A Generalzed Model Jawe L Independent researcher, Nottngham, UK Emal: Jawemchaell@gmalcom Abstract: A generalzed model of games s proposed, wth whch both cooperatve

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Introduction to Coalescent Models. Biostatistics 666

Introduction to Coalescent Models. Biostatistics 666 Introducton to Coalescent Models Bostatstcs 666 Prevously Allele frequences Hardy Wenberg Equlbrum Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles

More information

EE301 AC Source Transformation and Nodal Analysis

EE301 AC Source Transformation and Nodal Analysis EE0 AC Source Transformaton and Nodal Analyss Learnng Ojectves. Construct equvalent crcuts y convertng an AC voltage source and a resstor to an AC current source and a resstor. Apply Nodal Analyss to an

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Optimal Sizing and Allocation of Residential Photovoltaic Panels in a Distribution Network for Ancillary Services Application

Optimal Sizing and Allocation of Residential Photovoltaic Panels in a Distribution Network for Ancillary Services Application Optmal Szng and Allocaton of Resdental Photovoltac Panels n a Dstrbuton Networ for Ancllary Servces Applcaton Reza Ahmad Kordhel, Student Member, IEEE, S. Al Pourmousav, Student Member, IEEE, Jayarshnan

More information

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks Southern Illnos Unversty Carbondale OpenSIUC Conference Proceedngs Department of Electrcal and Computer Engneerng 11-2006 Dstrbuted Resource Allocaton and Schedulng n OFDMA Wreless Networks Xangpng Qn

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

Webinar Series TMIP VISION

Webinar Series TMIP VISION Webnar Seres TMIP VISION TMIP provdes techncal support and promotes knowledge and nformaton exchange n the transportaton plannng and modelng communty. DISCLAIMER The vews and opnons expressed durng ths

More information

Fiber length of pulp and paper by automated optical analyzer using polarized light (Five-year review of T 271 om-12) (no changes since Draft 1)

Fiber length of pulp and paper by automated optical analyzer using polarized light (Five-year review of T 271 om-12) (no changes since Draft 1) OTICE: Ths s a DRAFT of a TAPPI Standard n ballot. Although avalable for publc vewng, t s stll under TAPPI s copyrght and may not be reproduced or dstrbuted wthout permsson of TAPPI. Ths draft s OT a currently

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 11, DECEMBER

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 11, DECEMBER IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 30, NO. 11, DECEMBER 2012 2105 Local Publc Good Provsonng n Networks: A Nash Implementaton Mechansm Shrutvandana Sharma and Demosthens Teneketzs,

More information

CDMA Uplink Power Control as a Noncooperative Game

CDMA Uplink Power Control as a Noncooperative Game Wreless Networks 8, 659 670, 2002 2002 Kluwer Academc Publshers. Manufactured n The Netherlands. CDMA Uplnk Power Control as a Noncooperatve Game TANSU APCAN, TAMER BAŞAR and R. SRIKANT Coordnated Scence

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

NETWORK 2001 Transportation Planning Under Multiple Objectives

NETWORK 2001 Transportation Planning Under Multiple Objectives NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)

More information

Distributed Algorithms for the Operator Placement Problem

Distributed Algorithms for the Operator Placement Problem TZIRITAS ET AL.: DISTRIBUTED ALGORITHMS FOR THE OPERATOR PLACEMET PROBLEM Dstrbuted Algorthms for the Operator Placement Problem kos Tzrtas, Thanass Loukopoulos, Samee U. Khan, Senor Member, IEEE, Cheng-Zhong

More information

Modelling Information Warfare as a Game

Modelling Information Warfare as a Game Modellng Informaton Warfare as a ame Jorma Jormakka and Jarmo V. E. Mölsä Department of echnology Natonal Defence College P.O. ox 7 FI-0086 Helsnk Fnland E-mal: orma.ormakka@ml.f Communcatons Laboratory

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Techncal Report Decomposton Prncples and Onlne Learnng n Cross-Layer Optmzaton for Delay-Senstve Applcatons Abstract In ths report, we propose a general cross-layer optmzaton framework n whch we explctly

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

The Byzantine Generals Problem

The Byzantine Generals Problem The Byzantne Generals Problem A paper by: Lesle Lamport, Robert Shostak, and Marshall Pease. Summary by: Roman Kaplan. Every computer system must cope wth computer malfunctons, whereas a malfuncton does

More information

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Network Architecture and Traffic Flows: Experiments on the Pigou-Knight-Downs and Braess Paradoxes

Network Architecture and Traffic Flows: Experiments on the Pigou-Knight-Downs and Braess Paradoxes Network Archtecture and Traffc Flows: Experments on the Pgou-Knght-Downs and Braess Paradoxes by John Morgan a, Henrk Orzen b and Martn Sefton c July 2007 Abstract Ths paper presents theory and experments

More information

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling Explotng Dynamc Worload Varaton n Low Energy Preemptve Tas Schedulng Lap-Fa Leung, Ch-Yng Tsu Department of Electrcal and Electronc Engneerng Hong Kong Unversty of Scence and Technology Clear Water Bay,

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2)

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2) PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58495-1 408-9819 Wth De Assembly 58495-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

PRO- CRIMPER* III Hand Crimping

PRO- CRIMPER* III Hand Crimping PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58641-1 wth 408-4379 De Assembly 58641-2 18 JUN 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Depth of Reasoning and Incentives

Depth of Reasoning and Incentives Depth of Reasonng and Incentves Larb Alaou Antono Penta March 5, 2013 Abstract We ntroduce a model of strategc thnkng n games of ntal response. Unlke standard levelk models, n ths framework the player

More information

Total Power Minimization in Glitch-Free CMOS Circuits Considering Process Variation

Total Power Minimization in Glitch-Free CMOS Circuits Considering Process Variation 21st Internatonal Conference on VLSI Desgn Total Power Mnmzaton n Gltch-Free CMOS Crcuts Consderng Process Varaton Yuanln Lu * Intel Corporaton Folsom, CA 95630, USA yuanln.lu@ntel.com Abstract Compared

More information