SlideShare une entreprise Scribd logo
1  sur  51
Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong Kong Daniel R. Figueiredo School of Computer and Communication Sciences  Swiss Federal Institute of Technology – Lausanne (EPFL) ACM SIGMETRICS / IFIP Performance June 2006
Tutorial Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Game Theory About? ,[object Object],[object Object],[object Object],[object Object],[object Object],2 2
Applications of Game Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations of Game Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Game? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification of Games ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Matrix Game (Normal form) ,[object Object],[object Object],[object Object],Player 1 Player 2 Strategy set  for Player 1 Strategy set  for Player 2 Payoff to Player 1 Payoff to Player 2 ,[object Object],(3, 4) (0, 0) B (3, -1) (-5, 1) B (-2, -1) (2, 2) A C A
More Formal Game Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two-person Zero-sum Games ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyzing the Game ,[object Object],Player 1 Player 2 Strictly  dominated strategy (dominated by C) Strictly  dominated strategy  (dominated by B) -1 2 1 -16 D 3 4 2 5 C -18 3 1 3 B 0 1 -1 12 A D C B A
Dominance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Solving the Game Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 2 3 B 4 -1 -2 T R M L
Solving the Game Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],-1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Analyzing the Game Player 1 Player 2 ,[object Object],[object Object],-1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Saddle Points ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why Play Saddle Points? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 -1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Why Play Saddle Points? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 -1 0 -16 D 3 2 5 C 0 -1 12 A D B A Powerful arguments to play saddle point!
Solving the Game (min-max algorithm) ,[object Object],[object Object],[object Object],Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],-5 -4 8 0 D 3 1 5 7 C -1 0 2 -10 B 5 2 3 4 A D C B A -5 1 -10 2 5 2 8 7
Multiple Saddle Points Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-5 -4 0 8 D 3 2 2 5 C -1 0 -10 2 B 5 2 2 3 A D C B A -5 2 -10 2 5 2 2 8
Games With no Saddle Points ,[object Object],[object Object],Player 1 Player 2 3 0 B 1 -5 B -1 2 A C A
Mixed Strategies ,[object Object],[object Object],[object Object],Player 1 Payoff to P1 when playing A = 1/3(4) + 2/3(0) = 4/3 Payoff to P1 when playing B = 1/3(-5) + 2/3(3) = 1/3 ,[object Object],3 0 D -5 B 4 A C 2/3 1/3
Mixed Strategies ,[object Object],[object Object],[object Object],Player 1 Payoff to P1 when playing A = x(4) + (1-x)(0) = 4x Payoff to P1 when playing B = x(-5) + (1-x)(3) = 3 – 8x 4x = 3 – 8x, thus x = 1/4 ,[object Object],3 0 D -5 B 4 A C (1-x) x
Mixed Strategies ,[object Object],[object Object],[object Object],[object Object],Player 1 Payoff to P2 when playing C = x(-4) + (1-x)(5) = 5 - 9x Payoff to P2 when playing D = x(0) + (1-x)(-3) = -3 + 3x 5 – 9x = -3 + 3x, thus x = 2/3 Player 2 Payoff to P2 = -1 3 0 D -5 B 4 A C (1-x) x
Minimax Theorem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two-person Non-zero Sum Games ,[object Object],[object Object],Player 1 Player 2 ,[object Object],[object Object],-1, 2 2, 0 B 5, 1 B 3, 4 A A
What is the Solution? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 Player 1 Player 2 2, 1 -1, 4 B 3, 2 B 5, 0 A A -1, 2 2, 0 B 3, 1 B 5, 4 A A
Multiple Solution Problem ,[object Object],[object Object],[object Object],Player 1 Player 2 equilibria 2, 2 1, 1 B 0, 1 B 1, 4 A A
The Good News: Nash’s Theorem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Prisoner’s Dilemma ,[object Object],[object Object],[object Object],[object Object],Suspect 1 Suspect 2 payoff is years in jail ( smaller is better ) single NEP better  outcome 5, 5 10, 1 C 1, 10 C 2, 2 S S
Pareto Optimal ,[object Object],Suspect 1 Suspect 2 ,[object Object],[object Object],[object Object],Pareto Optimal 5, 5 10, 1 C 1, 10 C 2, 2 S S
Game of Chicken Revisited ,[object Object],[object Object],Driver 1 Driver 2 Drivers want to do opposite of one another Will prior communication help? 2 2 -10, -10 -1, 5 stay 5, -1 stay 0, 0 swerve swerve
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How much should firm  i  produce?
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],value chosen by firm 2 value chosen by firm 1
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],and and
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],less quantity produced higher price Competition can be good!
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],NEP : strategies are mutual best responses ,[object Object]
Game Trees (Extensive form) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Game Trees Example ,[object Object],Player 1 Player 2 Player 2 L L R R R L 3, 1 1, 2 -2, 1 0, -1 ,[object Object],what to do when P1 plays L  what to do when P1 plays R  ,[object Object],Payoff to Player 2 Payoff to Player 1
More Formal Extensive Game Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Game Tree Example ,[object Object],[object Object],[object Object],[object Object],Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Converting to Matrix Game ,[object Object],[object Object],Microsoft Mozilla 0, 0 1, 0 java, .net 2, 2 3, 1 .net, java 2, 2 0, 0 java 1, 0 3, 1 .net java, java .net, .net .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
NEP and Incredible Threats Microsoft Mozilla NEP incredible threat ,[object Object],[object Object],.net .net java java java .net 3, 1 1, 0 0, 0 2, 2 0, 0 1, 0 java, .net 2, 2 3, 1 .net, java 2, 2 0, 0 java 1, 0 3, 1 .net java, java .net, .net
Solving the Game (backward induction) ,[object Object],[object Object],Best strategy for Mozilla: .net, java (follow Microsoft) Best strategy for Microsoft: .net ,[object Object],[object Object],Equilibrium outcome .net java 3, 1 2, 2 .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Backward Induction on Game Trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Leaders and Followers ,[object Object],[object Object],Mozilla: java Microsoft: .net, java ,[object Object],[object Object],[object Object],[object Object],Mozilla Microsoft Microsoft .net .net java java java .net 1, 3 0, 1 0, 0 2, 2
The Subgame Concept ,[object Object],[object Object],[object Object],[object Object],Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Subgame Perfect Nash Equilibrium ,[object Object],[object Object],[object Object],[object Object],[object Object]
Subgame Perfect Nash Equilibrium ,[object Object],[object Object],[object Object],MS Mozilla J N Subgame Perfect NEP Not subgame Perfect NEP Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2 0,0 1,0 JN 2,2 3,1 NJ 2,2 0,0 J 1,0 3,1 N JJ NN
Title

Contenu connexe

Tendances (20)

Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
gt_2007
gt_2007gt_2007
gt_2007
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory in Economics
Game theory in EconomicsGame theory in Economics
Game theory in Economics
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Lecture 1 - Game Theory
Lecture 1 - Game TheoryLecture 1 - Game Theory
Lecture 1 - Game Theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game
Game Game
Game
 
Game theory
Game theoryGame theory
Game theory
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory Presentation
 
Game theory ppt
Game theory pptGame theory ppt
Game theory ppt
 
Game theory ppt
Game theory pptGame theory ppt
Game theory ppt
 
Game theory
Game theoryGame theory
Game theory
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
Game Theory
Game TheoryGame Theory
Game Theory
 

Similaire à file1 (20)

Game Theory SV.docx
Game Theory SV.docxGame Theory SV.docx
Game Theory SV.docx
 
Unit II A - Game Theory
Unit II A - Game TheoryUnit II A - Game Theory
Unit II A - Game Theory
 
Newgame (2)
Newgame (2)Newgame (2)
Newgame (2)
 
Game theory 2011
Game theory 2011Game theory 2011
Game theory 2011
 
Gt brno
Gt brnoGt brno
Gt brno
 
Game theory
Game theoryGame theory
Game theory
 
Seminar_3.pptx
Seminar_3.pptxSeminar_3.pptx
Seminar_3.pptx
 
OR 14 15-unit_4
OR 14 15-unit_4OR 14 15-unit_4
OR 14 15-unit_4
 
Bba 3274 qm week 5 game theory
Bba 3274 qm week 5 game theoryBba 3274 qm week 5 game theory
Bba 3274 qm week 5 game theory
 
Gametheory 110125221603-phpapp02
Gametheory 110125221603-phpapp02Gametheory 110125221603-phpapp02
Gametheory 110125221603-phpapp02
 
Module 3 Game Theory (1).pptx
Module 3 Game Theory (1).pptxModule 3 Game Theory (1).pptx
Module 3 Game Theory (1).pptx
 
Gametheoryofeconomicsformanagersmba.pptx
Gametheoryofeconomicsformanagersmba.pptxGametheoryofeconomicsformanagersmba.pptx
Gametheoryofeconomicsformanagersmba.pptx
 
The Minority Game: Individual and Social Learning
The Minority Game: Individual and Social LearningThe Minority Game: Individual and Social Learning
The Minority Game: Individual and Social Learning
 
Game theory
Game theoryGame theory
Game theory
 
AI Strategies for Solving Poker Texas Hold'em
AI Strategies for Solving Poker Texas Hold'emAI Strategies for Solving Poker Texas Hold'em
AI Strategies for Solving Poker Texas Hold'em
 
Game theory2
 Game theory2 Game theory2
Game theory2
 
Game theory
Game theoryGame theory
Game theory
 
Game Theory Operation Research
Game Theory Operation ResearchGame Theory Operation Research
Game Theory Operation Research
 
Game throy
Game throyGame throy
Game throy
 
Game Theory Economics
Game Theory EconomicsGame Theory Economics
Game Theory Economics
 

Plus de webuploader

Michael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_NetworkingMichael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_Networkingwebuploader
 
cyberSecurity_Milliron
cyberSecurity_MillironcyberSecurity_Milliron
cyberSecurity_Millironwebuploader
 
LiveseyMotleyPresentation
LiveseyMotleyPresentationLiveseyMotleyPresentation
LiveseyMotleyPresentationwebuploader
 
FairShare_Morningstar_022607
FairShare_Morningstar_022607FairShare_Morningstar_022607
FairShare_Morningstar_022607webuploader
 
3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling3_System_Requirements_and_Scaling
3_System_Requirements_and_Scalingwebuploader
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailabilitywebuploader
 
scale_perf_best_practices
scale_perf_best_practicesscale_perf_best_practices
scale_perf_best_practiceswebuploader
 
7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summitwebuploader
 
FreeBSD - LinuxExpo
FreeBSD - LinuxExpoFreeBSD - LinuxExpo
FreeBSD - LinuxExpowebuploader
 

Plus de webuploader (20)

Michael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_NetworkingMichael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_Networking
 
socialpref
socialprefsocialpref
socialpref
 
cyberSecurity_Milliron
cyberSecurity_MillironcyberSecurity_Milliron
cyberSecurity_Milliron
 
PJO-3B
PJO-3BPJO-3B
PJO-3B
 
LiveseyMotleyPresentation
LiveseyMotleyPresentationLiveseyMotleyPresentation
LiveseyMotleyPresentation
 
FairShare_Morningstar_022607
FairShare_Morningstar_022607FairShare_Morningstar_022607
FairShare_Morningstar_022607
 
saito_porcupine
saito_porcupinesaito_porcupine
saito_porcupine
 
3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailability
 
scale_perf_best_practices
scale_perf_best_practicesscale_perf_best_practices
scale_perf_best_practices
 
7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit
 
Chapter5
Chapter5Chapter5
Chapter5
 
Mak3
Mak3Mak3
Mak3
 
visagie_freebsd
visagie_freebsdvisagie_freebsd
visagie_freebsd
 
freebsd-watitis
freebsd-watitisfreebsd-watitis
freebsd-watitis
 
BPotter-L1-05
BPotter-L1-05BPotter-L1-05
BPotter-L1-05
 
FreeBSD - LinuxExpo
FreeBSD - LinuxExpoFreeBSD - LinuxExpo
FreeBSD - LinuxExpo
 
CLI313
CLI313CLI313
CLI313
 
CFInterop
CFInteropCFInterop
CFInterop
 
WCE031_WH06
WCE031_WH06WCE031_WH06
WCE031_WH06
 

Dernier

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

file1

  • 1. Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong Kong Daniel R. Figueiredo School of Computer and Communication Sciences Swiss Federal Institute of Technology – Lausanne (EPFL) ACM SIGMETRICS / IFIP Performance June 2006
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Title