Sciweavers

DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
14 years 4 months ago
Equilibria in topology control games for ad hoc networks
We study topology control problems in ad hoc networks, where network nodes get to choose their power levels in order to ensure desired connectivity properties. Unlike most other w...
Stephan Eidenbenz, V. S. Anil Kumar, Sibylle Zust
INFOCOM
2003
IEEE
14 years 4 months ago
Nash equilibria of a generic networking game with applications to circuit-switched networks
— A generic mechanism for end-user transmission rate control into a differentiated services Internet is formulated and basic results of corresponding Nash equilibria are proved. ...
Youngmi Jin, George Kesidis
INFOCOM
2003
IEEE
14 years 4 months ago
Oblivious AQM and Nash Equilibria
—An oblivious Active Queue Management scheme is one which does not differentiate between packets belonging to different flows. In this paper, we study the existence and the qual...
Debojyoti Dutta, Ashish Goel, John S. Heidemann
FMCO
2004
Springer
14 years 4 months ago
Games with Secure Equilibria
In 2-player non-zero-sum games, Nash equilibria capture the options for rational behavior if each player attempts to maximize her payoff. In contrast to classical game theory, we ...
Krishnendu Chatterjee, Thomas A. Henzinger, Marcin...
ATAL
2004
Springer
14 years 4 months ago
Multi-Agent Simulation of Collaborative Strategies in a Supply Chain
The bullwhip effect is the amplification of the order variability in a supply chain. This phenomenon causes important financial cost due to higher inventory levels and agility r...
Thierry Moyaux, Brahim Chaib-draa, Sophie D'Amours
MOBIHOC
2004
ACM
14 years 4 months ago
Market sharing games applied to content distribution in ad-hoc networks
In third generation (3G) wireless data networks, repeated requests for popular data items can exacerbate the already scarce wireless spectrum. In this paper we propose an architec...
Michel X. Goemans, Erran L. Li, Vahab S. Mirrokni,...
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 4 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 4 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISAAC
2005
Springer
127views Algorithms» more  ISAAC 2005»
14 years 4 months ago
Counting Stable Strategies in Random Evolutionary Games
In this paper we study the notion of the Evolutionary Stable Strategies (ESS) in evolutionary games and we demonstrate their qualitative difference from the Nash Equilibria, by sh...
Spyros C. Kontogiannis, Paul G. Spirakis
SIGECOM
2005
ACM
134views ECommerce» more  SIGECOM 2005»
14 years 4 months ago
Congestion games with failures
We introduce a new class of games, congestion games with failures (CGFs), which extends the class of congestion games to allow for facility failures. In a basic CGF (BCGF) agents ...
Michal Penn, Maria Polukarov, Moshe Tennenholtz