Designing Cost-Sharing Methods for Bayesian Games
نویسندگان
چکیده
منابع مشابه
Optimal Cost Sharing for Resource Selection Games
Joint use of resources with usage-dependent cost raises the question: who pays how much? We study cost sharing in resource selection games where the strategy spaces are either singletons or bases of a matroid defined on the ground set of resources. Our goal is to design cost sharing protocols so as to minimize the resulting price of anarchy and price of stability. We investigate three classes o...
متن کاملCost Sharing Mechanisms for Network Games
The report encompasses an overview of recent developments concerning cross-monotonic cost sharing methods, a subject that has received a lot of attention from computer scientists, mathematicians and economists recently. In particular, the results of Moulin and Shenker [12], who established the connection between group-strategyproofness and cross-monotonicity, and those of Könemann, Leonardi, an...
متن کاملPseudonyms in Cost-Sharing Games
This work initiates the study of cost-sharing mechanisms that, in addition to the usual incentive compatibility conditions, make it disadvantageous for the users to employ pseudonyms. We show that this is possible only if all serviced users pay the same price, which implies that such mechanisms do not exist even for certain subadditive cost functions. In practice, a user can increase her utilit...
متن کاملStrategic Knowledge Sharing in Bayesian Games: Applications
This paper studies the properties of endogenous information structures in some classes of Bayesian games in which a first stage of strategic information revelation is added. Sufficient conditions for the existence of perfectly revealing or non-revealing equilibria are characterized. In particular, the existence of a perfectly revealing equilibrium is demonstrated for linear Bayesian games with ...
متن کاملRobust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis of these domains is based on input from domain experts intended to capture the best available intelligence information about potential terrorist activities and possible security countermeasures. Nevertheless, these mod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theory of Computing Systems
سال: 2017
ISSN: 1432-4350,1433-0490
DOI: 10.1007/s00224-017-9832-3