Evolutionary game theoretic model and end-to-end flow control in the Internet

Author(s):  
Youquan Zheng ◽  
Zhenming Feng
Mathematics ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 199 ◽  
Author(s):  
David M. Ramsey

The Internet gives access to a huge amount of data at the click of a mouse. This is very helpful when consumers are making decisions about which product to buy. However, the final decision to purchase is still generally made by humans who have limited memory and perception. The short list heuristic is often used when there are many offers on the market. Searchers first find information about offers via the Internet and on this basis choose a relatively small number of offers to view in real life. Although such rules are often used in practice, little research has been carried out on determining, for example, what the size of the short list should be depending on the parameters of the problem or modelling how the short list heuristic can be implemented when there are multiple decision makers. This article presents a game theoretic model of such a search procedure with two players. These two players can be interpreted, for example, as a couple searching for a flat or a second-hand car. The model indicates that under such a search procedure the roles of searchers should only be divided when the preferences of the players are coherent or there is a high level of goodwill between them. In other cases, dividing the roles leads to a high level of conflict.


2017 ◽  
Vol 18 (4) ◽  
pp. 585-598 ◽  
Author(s):  
Jon REIERSEN

In his book Trust. The Evolutionary Game of Mind and Society, social psychologist Toshio Yamagishi (2011) states that trust can be viewed as a “booster rocket” that provides the necessary push for the take-off from the secure ground of committed relations. This article formalizes this idea with the help of a simple game theoretic model. The article looks at a situation where networks of personalized exchange relationships provide assurance against untrustworthy behaviour but reduce the opportunity to profit from trade in larger markets. Assuming that the anonymous market contains both trustworthy and untrustworthy types, it is demonstrated that mutual trust relations can emerge, even when there is a clear danger of opportunism and the possibility of repeated interaction is ruled out. From a more practical perspective, the model provides an insight into the role trust plays for the decision to transact in networks or markets. It is also demonstrated that networks appear as mixed blessings. Networks reduce the problems arising from incomplete contracts and behavioural risk, but they also restrict individuals’ possibility to reap potential gains produced in larger markets.


2014 ◽  
Vol 4 (4) ◽  
pp. 20140014 ◽  
Author(s):  
Ardeshir Kianercy ◽  
Robert Veltri ◽  
Kenneth J. Pienta

Tumour proliferation is promoted by an intratumoral metabolic symbiosis in which lactate from stromal cells fuels energy generation in the oxygenated domain of the tumour. Furthermore, empirical data show that tumour cells adopt an intermediate metabolic state between lactate respiration and glycolysis. This study models the metabolic symbiosis in the tumour through the formalism of evolutionary game theory. Our game model of metabolic symbiosis in cancer considers two types of tumour cells, hypoxic and oxygenated, while glucose and lactate are considered as the two main sources of energy within the tumour. The model confirms the presence of multiple intermediate stable states and hybrid energy strategies in the tumour. It predicts that nonlinear interaction between two subpopulations leads to tumour metabolic critical transitions and that tumours can obtain different intermediate states between glycolysis and respiration which can be regulated by the genomic mutation rate. The model can apply in the epithelial–stromal metabolic decoupling therapy.


2015 ◽  
Vol 28 (4) ◽  
pp. 497-521 ◽  
Author(s):  
J. M. CUSHING ◽  
SHANDELLE M. HENSON ◽  
JAMES L. HAYWARD

Author(s):  
M. O. Oladejo ◽  
I. J. Udoh ◽  
A. O. Abam

A terrorist group’s (TG) ability to withstand attacks and recovered from sudden high strength depreciation after a major counterterrorism operation, as well as the Security Agencies’ (SA) ability to execute successful credible counter-terrorism operation is a function of both their individual bureaucratic structures and the level of community’s supports each organization is able to optimize within the period of operation. To study the security implications of undermining a given community’s optimal supports, we present and analysed a two-person two-periods evolutionary game theoretic model for an interaction between the SA and the TG; each playing either the “Sticks” or the “Carrots” or mixed strategies to win the community’s optimal supports. In the symmetric game variant, the result of the analysis shows that if the operational cost drops by 80%, then the SA playing the “Stick” may enjoy 50:50 chance of winning the community’s optimal supports. But if the cost rises by at least 30%, then SA playing the “Sticks” would be at-most 33.3% advantageous, while the “Carrots” approach would yield at-least 66.7% advantage. In the asymmetric variant, if the operational cost drops by 80%, then SA playing the “Sticks” would enjoy 100% chance of winning the community’s optimal supports, while the “Carrots” would yield at most 20% advantage. But if the cost rises by at least 30%, then SA playing the “Sticks” would enjoy 50:50 advantage. Comparatively, the TG would enjoy 50:50 chance of winning the community’s optimal supports by playing the “Sticks” if the cost of operation drops by 90%. But if the cost rises by at least 20%, then TG playing the “Sticks” would enjoy at most 33.3% while the “Carrots” would yield at least 66.7% advantage. Thus, the cost of operation is the major determinant of either player’s strategic approach. Under the mixed strategy, if the benefit of operation exceeds its cost, then SA playing the “Sticks” is an evolutionary stable strategy (ESS), otherwise, combining the “Sticks and Carrots” simultaneously would yield an ESS. Summarily, the SAs’ stake in terrorism prevention and control using the “Sticks” approach is proportional to its operational cost and vice versa. Therefore, considering the capital intensive as well as the intelligence deficient characteristics of the “Sticks” approach, the SA cannot prevent/control terrorism using the “Stick” instruments only. Rather a viable “Carrots” approach or its combination with credible “Sticks” instruments would be necessary and sufficient to win the community’s optimal supports for effective terrorism prevention and control.


Sign in / Sign up

Export Citation Format

Share Document