Alok Gupta. Dmitry Zhdanov
|
|
|
- Robert Holt
- 10 years ago
- Views:
Transcription
1 RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University of Minnesota, Minneapolis, MN U.S.A. Dmitry Zhdanov Department of Operations & Information Management, School of Business, University of Connecticut, Storrs, CT U.S.A. Appendix A MSSP Simulation Design Based on KDD Cup Data Set The original dataset consists of data on over four million connections each described by 42 attributes (e.g., duration, protocol, etc.) and identified either as normal traffic or one of 24 attack types. Our simulation is designed as follows: 1. A total of 20,000 connections were randomly selected from the original dataset to form the simulation training set; 16 attack types were represented in the simulation set. 2. The simulation training set was duplicated to represent the simulation test set with the same distribution of attacks as in the training set. 3. The 20,000 connections in the training set were randomly split into 20 groups of 1,000. These groups represent firms. It is assumed that each firm can independently observe 1,000 connections. 4. One firm was chosen to start the network (network size = 1, pool of connections = 1,000). 5. The proportion of attack connections in the connection pool was computed and provided the probability of attack, P a. 6. Based on the pool of connections, the decision tree was built to classify the attacks using the C4.5 algorithm (Quinlan 1993). 7. The output of C4.5 algorithm was tested against a random subset of attacks from the testing set. The testing subset is half the size of the training subset. The proportion of misclassified attacks in the testing subset was computed and provided the probability of attack success, P s (on the assumption that if the attack was not identified correctly, then no appropriate defense would be activated). 8. Network size was incremented by 1 (until it reached 20; for example, after first iteration, network size = 2, pool of connections = 2,000). Return to step 5. The data was averaged over 10 simulation runs. Reference Quinlan, J. R C4.5: Programs for Machine Learning, San Mateo, CA: Morgan Kauffman. A1
2 Appendix B Comparative Dynamics of Hiding and Knowledge Effects Let us define the hiding effect in the network of size N as H(N) and the knowledge effect as K(N). Recall from equation (1) that damage on the network of size N is defined as D(N) = P a (N) P s (N) N where N is network size, and P a and P s are probability of attack taking place and attack success, respectively. By definition, the hiding effect captures the difference in exposure between being a part of an MSSP network and providing security alone for any particular firm. H(N) = D(N) / N D(1) / 1 Similarly, the knowledge effect captures the improvement in security state due to the addition of a new node to the network. K(N) = P a (N) P s (N) P a (N 1) P s (N 1) To explore the relative magnitude of these two effects, consider a network of size N + 1. H(N + 1) K(N + 1) = [P a (N + 1) P s (N + 1) P a (1) P s (1)] [P a (N + 1) P s (N + 1) (P a (N) P s (N)] = P a (N) P s (N) P a (1) P s (1) = H(N) We see that for a network of any size, addition of a new node produces an incremental change in the magnitude of hiding effect that is equal to the magnitude of the current knowledge effect. This result may be formulated as a lemma. Lemma 1. Given the definitions of the hiding and knowledge effects, for any network size N, the following relationship holds: H(N + 1) K(N + 1) = H(N) The implications of this result are twofold. First, it means that, in general, the hiding effect dominates the knowledge effect. Second, the extent of this dominance grows with the size of the network, if both effects are present and monotonic (these conditions hold in our formulation). A2
3 Appendix C Correspondence of MSSP Growth Model with the Constructs of the Cooperative Game Theory 1. General properties of cooperative games 1.1 In general, cooperative game theory models assume that there is a finite number of players (N). The MSSP model allows for an unlimited number of potential clients. However, the solution area for the MSSP problem includes a finite number of clients N max. Growing the network beyond this size is going to lead to the loss of efficiency since the gross costs of this approach outweigh gross benefits. Thus, we can consider a game which has N max players. 1.2 A coalition game with transferrable utility is a pair G = (N, v) where N is a coalition and v is a function that associates a real number v(s) with each subset S of N. In our case, the set of players is N max, and the coalition function v(s) is defined based on the consortium rules. 1.3 A game (N, v) is superadditive if (S, T f N and S 1 T = i) v(s c T) > v(s) + v(t). Clearly, this condition holds in our case, since any two subsets of firms cannot achieve a better outcome than a larger consortium. 1.4 A game is weakly superadditive if v(s c {i} > v(s) + v({i}) for all S f N and i ó S. This condition holds in our formulation, since addition of each new member for a consortium increases total consortium benefits by the amount which exceeds an individual value of being alone. 1.5 A game is monotonic if S f T f N v(s) < v(t). In our setting, smaller consortia have a smaller amount of total benefit, thus the monotonicity property holds. 2. Solution concepts of cooperative games 2.1 For a game (N, v), a feasible payoff vector is defined as X * (N, v) = {x 0 R N x(n) < v(n)}. Basically, feasible payoff should not exceed the total worth of the game. Let Γ be a set of games. Then, a solution on Γ is defined as a function σ that associates with each game (N, v) 0 Γ a subset σ(n, v) of X * (N, v). Intuitively, a solution is a system of reasonable restrictions on X *. 2.2 One possible solution for a cooperative game is known as the core. The core C (N,v) is defined as C(N,v) = {x 0 X * (N, v) x(s) > v(s)œs f N}. In the case of the MSSP game, the winning coalition (members of the consortium) get a payoff equal to the worth of the consortium, so the concept of the core is valid in our case. 2.3 The core as a solution to the cooperative game is anonymous (independent of the names of players) and Pareto optimal. Clearly, in our case, any firm can be a member of an MSSP and their particular identities are not relevant. Our solution is also Pareto optimal, since in the formed consortium, no member may be made better off without making another member worse off. 2.4 A solution must be reasonable from above and below. Let b i represent the i th member incremental contribution to the coalition. Then, the solution is reasonable from above if ((N, v) 0 Γ, x 0 σ(n, v)) x i < b i max(n, v)œi 0 N i. It is reasonable from below if ((N, v) 0 Γ, x 0 σ(n, v)) x i > b i max(n, v)œi 0 N i. This means that each member of the coalition must be paid an amount that does not exceed the maximum individual contribution to the coalition, while also providing individual incentives to join the coalition. The core is reasonable from above and below. In the MSSP case, there is individual rationality for each member to join (reasonable from below), and none of the members are paid more than the maximum possible individual contribution (reasonable from above). Thus, our solution achieves the same results as the core with respect to the reasonableness requirement. 2.5 Another solution concept is known as the Shapley value. It is based on the a priori evaluation of the coalition game by each of its players. Besides Pareto optimality, it also satisfies the null player property and the equal treatment property. The null player property A3
4 states that each player without an impact on the solution should get a payoff of zero. The equal treatment property states that players with equal contributions to the coalition should get the same payoffs. In our case, the players are identical and they get equal payoffs. There are no dummy players in our formulation. The Shapley value is defined as () v = ( vs ( {} i vs ( )) According to Shapley (1953, p. 316), φ i S N S!( n S 1)! n! The players in N agree to play the game v in a grand coalition, formed in the following way: 1. Starting with a single member, the coalition adds one player at a time until everybody has been admitted. 2. The order in which the players are to join is determined by chance, with all arrangements equally probable. 3. Each player, on his admission, demands and is promised the amount which his adherence contributes to the value of the coalition (as determined by the function v). The grand coalition then plays the game efficiently so as to obtain v(n) exactly enough to meet all the promises. It is clear from this description that our formulation implements the Shapley value mechanism. In addition, we provide a description of the revenue sharing mechanism that implements the equal treatment property, and we prove the optimality of that mechanism. Therefore, the formulation of the MSSP dynamic growth process has all of the important properties of cooperative games, such as monotonicity and superadditivity. It also corresponds in properties to the common solution concepts such as the core and Shapley value. However, our approach makes fewer assumptions and provides additional results such as the implementation of an optimal, equal treatment-based consortium value distribution mechanism. References Peleg, B., and, Sudhölter, P Introduction to the Theory of Cooperative Games, Boston: Springer. Shapley, L. S A Value for n-person Games, in Contributions to the Theory of Games (Volume 2), H. Kuhn and A. W. Tucker (eds.), Princeton, NJ: Princeton University Press, pp Appendix D Proofs of Propositions Proposition 1 (The Optimal Size of Consortium without Investment). The optimal size of a consortium-based MSSP with no initial investment, N * cn, will be less than or equal to the welfare maximizing MSSP network size N * s (i.e., N * cn < N * s). Proof: Suppose that value function V(N) is concave and the damage function R(N) is convex. Then, the difference between the partial derivates of a concave, V'(j), and a convex function R'(j) of a variable, j, is non-increasing as j increases. Therefore, since the R.H.S. in equation V'(j) R'(j) = [V(j) R(j)] / j is a positive number, j < k where V'(k) R'(k) = 0 the optimality condition for a welfare maximizing solution. Q.E.D. Proposition 2 (Equal Sharing and MSSP Network Viability). Let there exist a network size n that allows investment recovery and network viability with the equal sharing rule. Then, it is a minimum viable network size and the equal sharing rule is optimal. Proof (By Contradiction): We will show that there is no other sharing rule that results in a smaller network size than the equal sharing rule. Let the investment be recovered at a minimum network size of n using the equal sharing rule [V(n) R(n)] / n > [R(i) V(i)] / n œ n members (D4) A4
5 Now let there exist a rule such that the initial investment is not equally shared and the investment is recovered at size m < n. [V(m) R(M)] / m > L j œ j = 1,, m (D5) where L j is the share of investment shared by member j. However, note that since m < n, and the investment is not equally shared, L j > [R(i) V(i)] / m for at least some member j. [V(m) R(m)] / m > [R(i)] / m (D6) However, equation (D6) implies that investment should have been recovered using the equal sharing rule at size m < n a contradiction since by assumption n was the minimum network size to recover the investment using the equal sharing rule. Q.E.D. Proposition 3 (Optimal Size of MSSP Consortium with Investment). The optimal size of an MSSP consortium that requires the initial investment to the overcome critical mass problem, N * c, is equal to or greater than the optimal MSSP network size without investment (i.e., N * c > N * cn). Proof: Suppose that value function V(N) is concave and the requirement resource function R(N) is convex. Then, the optimal consortium size without investment is a solution to equation (D7): N * cn = j: V'(j) R'(j) = [V(j) R(j)] / j (D7) Further, optimal consortium size with investment is a solution to equation (D8): N * c = j: V'(j) R'(j) = [V(j) R(j) C] / j (D8) Since C is a positive number, the R.H.S. of equation (D8) is smaller than the R.H.S. of equation (D7). Since the difference V'(j) R'(D)(j)) is decreasing in j, it follows that the solution to equation (14), N * cn, is smaller than the solution to equation (20) (i.e., N * c > N * cn). Q.E.D. Lemma 4 (Minimum Viable Initial MSSP Consortium). The minimum starting network size is given by I * = min{i: V(N * s) R(N * s) > R(i) V(i)}. Proof: Since R(i) V(i) is decreasing in i < N 0 and maximum recoverable investment is V(N * s) R(N * s), the smallest viable initial network size is given by I * = min{i: V(N * s) R(N * s) > R(i) V(i)}. Q.E.D. Proposition 5 (Monopolist MSSP Versus Social Net Benefit Size): The monopolist MSSP may have a larger network size than the social net benefit maximizing size if it can provide sufficient compensation for all current members of the consortia who lose value due to the addition m of another member beyond the social benefit optimal (i.e., P > m P x, where x is the number of firms whose benefits are N j j ( + 1) s * Ω reduced below the price charged to them due to the introduction of the new customer and Ω is the set of individual firms so affected). Proof: Suppose that the net benefit maximizing network size is N * s and the monopolist MSSP is viable. (1) Note that the profits of a monopolist MSSP cannot be maximized on a network size that is smaller than the social net benefit maximizing size; that is, N * m cannot be less than N * s. Assume the contrary, that profits are maximized at N m < N * s. Then, there are one or more potential customers in interval (N m ; N * s] who will get positive benefit from joining the network, since N * s is the socially optimal size. Charging these customers any positive price up to their willingness to pay and letting them join the network will increase the monopolist s profit. But, N m was a profit-maximizing point for the monopolist a contradiction. Thus, N * m is at least equal to N * s. (2) We now just need to prove that under certain circumstances N * m > N * s. Consider a case when a monopolist provider attracts one more customer than at the optimal net benefit maximizing network size N * s. Then, by definition, A5
6 V(N * s) R(N * s) > V(N * s + 1) R(N * s + 1) (D9) However, there may be other firms k < N * s such that V(k) R(k) > V(N * s + 1) R(N * s + 1) (D10) Let the set of these customers be defined as Ω = {k : V(k) R(k) > V(N * s +1) R(N * s + 1)}. Each of these customers will require compensation defined by Comp k = [V(k) R(k)] / k [V(N * s + 1) R(N * s + 1)] / (N * s + 1) (D11) Since [V(k) R(D(k))] / k = P m k and [V(N * s + 1) R(N * s + 1)] / (N * s + 1) = P N m s * +1 and, we can rewrite (D11) as The total compensation then is Compk = P m k P + Comp P m m k = k xp * + 1 Ns N * s 1 where x = Ω, cardinality set of Ω (D12) (D13) Since the price charged to this (N * s + 1) st customer should be enough to cover the total compensation, we have m m m m m P P ( 1) 1 k xp P P 1 1 k x * * * s s s N N N Q.E.D. (D14) Corollary 5.1 (Monopolist MSSP Versus Consortium MSSP Size): The monopolist MSSP, if viable, will have a network not smaller than a consortium MSSP. Proof: From Proposition 5, the monopolist MSSP size is greater than the social benefit, N * m > N * s. However, the consortium provider will not grow its network beyond N * s, as it decreases total and average benefits to its members: œ N > N * s, W(N) < W(N * s) W(N) / (N) < W(N * s) / N * s). Thus, N * m > N * s > N c. Q.E.D. Corollary 5.2 (Monopolist MSSP Versus Consortium MSSP Viability): There may be instances when a consortium MSSP is viable, while a monopolist MSSP is not viable. Proof: Recall that the viability condition for a MSSP network is given by the need to recover the initial investment: I * = min{i : V(N * s) R(N * s) > R(i) V(i)}. In the worst case scenario, the monopolist will start with a network of size 1, while a consortium may have more founding members. Since R(i) V(i) is decreasing in i < N 0, there is a chance that the monopolist will have to make a larger investment. Even if this investment is equal to that of the consortium, the monopolist is following zero-price strategy for the initial few clients, while the consortium begins the cost recovery immediately via its pricing and reallocation scheme. Finally, in some cases the monopolist needs to collect the compensatory payments (if any) in the amount of m m. Compk = Pk xp * + 1 Ns Since the consortium is not facing any of these costs, it may survive on a network with a smaller total potential value than the monopolist. Therefore, there may be cases when, all things being equal, the consortium is profitable and will start, while the monopolist is not profitable and will not start. The reverse is not the case. Q.E.D. A6
7 Appendix E Pseudocode for Profit Maximizing Provider s Pricing and Allocation If (k < N 0 ) Set P k = 0 End If Else If (k >= N 0 and k <=N * s) Set P k = [V(k) R(k)] / k End Else If Else If (k >= N * s) Set P k = [V(k) R(k)] / k For (n = N 0 to N * s) do If (P n > [V(k) R(k)] / k) Total refund = 0 For (m = n to k 1) do Refund firm m amount (R m ) = P m [V(k) R(k)] / k Total refund = total refund + P m [V(k) R(k)] / k End For If (Total refund > [V(k) R(k)] / k) Reject entry to firm k Else For (m = n to k 1) do Commit R m P m = [V(k) R(k)] / k End For End Else End If End For End Else If A7
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Mechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
CPC/CPA Hybrid Bidding in a Second Price Auction
CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Two-Sided Matching Theory
Two-Sided Matching Theory M. Utku Ünver Boston College Introduction to the Theory of Two-Sided Matching To see which results are robust, we will look at some increasingly general models. Even before we
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
How To Solve The Stable Roommates Problem
THE ROOMMATES PROBLEM DISCUSSED NATHAN SCHULZ Abstract. The stable roommates problem as originally posed by Gale and Shapley [1] in 1962 involves a single set of even cardinality 2n, each member of which
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
Cournot s model of oligopoly
Cournot s model of oligopoly Single good produced by n firms Cost to firm i of producing q i units: C i (q i ), where C i is nonnegative and increasing If firms total output is Q then market price is P(Q),
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency
Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine
Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
Chapter 2 The Core of a Cooperative Game
Chapter 2 The Core of a Cooperative Game The main fundamental question in cooperative game theory is the question how to allocate the total generated wealth by the collective of all players the player
17.6.1 Introduction to Auction Design
CS787: Advanced Algorithms Topic: Sponsored Search Auction Design Presenter(s): Nilay, Srikrishna, Taedong 17.6.1 Introduction to Auction Design The Internet, which started of as a research project in
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
.4 120 +.1 80 +.5 100 = 48 + 8 + 50 = 106.
Chapter 16. Risk and Uncertainty Part A 2009, Kwan Choi Expected Value X i = outcome i, p i = probability of X i EV = pix For instance, suppose a person has an idle fund, $100, for one month, and is considering
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Investigación Operativa. The uniform rule in the division problem
Boletín de Estadística e Investigación Operativa Vol. 27, No. 2, Junio 2011, pp. 102-112 Investigación Operativa The uniform rule in the division problem Gustavo Bergantiños Cid Dept. de Estadística e
Working Paper Series
RGEA Universidade de Vigo http://webs.uvigo.es/rgea Working Paper Series A Market Game Approach to Differential Information Economies Guadalupe Fugarolas, Carlos Hervés-Beloso, Emma Moreno- García and
each college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
About the inverse football pool problem for 9 games 1
Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Optimal Auctions Continued
Lecture 6 Optimal Auctions Continued 1 Recap Last week, we... Set up the Myerson auction environment: n risk-neutral bidders independent types t i F i with support [, b i ] residual valuation of t 0 for
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
Using Generalized Forecasts for Online Currency Conversion
Using Generalized Forecasts for Online Currency Conversion Kazuo Iwama and Kouki Yonezawa School of Informatics Kyoto University Kyoto 606-8501, Japan {iwama,yonezawa}@kuis.kyoto-u.ac.jp Abstract. El-Yaniv
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
Application of Game Theory in Inventory Management
Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile [email protected] Abstract. Game theory has been successfully applied
Gains from Trade. Christopher P. Chambers and Takashi Hayashi. March 25, 2013. Abstract
Gains from Trade Christopher P. Chambers Takashi Hayashi March 25, 2013 Abstract In a market design context, we ask whether there exists a system of transfers regulations whereby gains from trade can always
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
Pricing Transmission
1 / 37 Pricing Transmission Quantitative Energy Economics Anthony Papavasiliou 2 / 37 Pricing Transmission 1 Equilibrium Model of Power Flow Locational Marginal Pricing Congestion Rent and Congestion Cost
Single-Period Balancing of Pay Per-Click and Pay-Per-View Online Display Advertisements
Single-Period Balancing of Pay Per-Click and Pay-Per-View Online Display Advertisements Changhyun Kwon Department of Industrial and Systems Engineering University at Buffalo, the State University of New
Online Appendix (not for publication) College Admissions as Non-Price Competition: The Case of South Korea Index
Online Appendix (not for publication) College Admissions as Non-Price Competition: The Case of South Korea By Christopher Avery, Soohyung Lee, and Alvin E. Roth Index 1. Additional Background on the Korean
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
How To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
Linear Programming: Chapter 11 Game Theory
Linear Programming: Chapter 11 Game Theory Robert J. Vanderbei October 17, 2007 Operations Research and Financial Engineering Princeton University Princeton, NJ 08544 http://www.princeton.edu/ rvdb Rock-Paper-Scissors
Getting Even More Out of Ensemble Selection
Getting Even More Out of Ensemble Selection Quan Sun Department of Computer Science The University of Waikato Hamilton, New Zealand [email protected] ABSTRACT Ensemble Selection uses forward stepwise
How To Check For Differences In The One Way Anova
MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. One-Way
2. Information Economics
2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many
Efficient Recovery of Secrets
Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,
Betting with the Kelly Criterion
Betting with the Kelly Criterion Jane June 2, 2010 Contents 1 Introduction 2 2 Kelly Criterion 2 3 The Stock Market 3 4 Simulations 5 5 Conclusion 8 1 Page 2 of 9 1 Introduction Gambling in all forms,
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
An On-Line Algorithm for Checkpoint Placement
An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel [email protected] Jehoshua Bruck California Institute
Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
ECON9 (Spring 0) & 350 (Tutorial ) Chapter Monopolistic Competition and Oligopoly (Part ) Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]
Economics of Insurance
Economics of Insurance In this last lecture, we cover most topics of Economics of Information within a single application. Through this, you will see how the differential informational assumptions allow
Intellectual Property Right Protection in the Software Market
Intellectual Property Right Protection in the Software Market Yasuhiro Arai Aomori Public College 153-4, Yamazaki, Goushizawa, Aomori-city, Aomori 030-0196, Japan March 01 Abstract We discuss the software
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage
Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Alex Edmans LBS, NBER, CEPR, and ECGI Itay Goldstein Wharton Wei Jiang Columbia May 8, 05 A Proofs of Propositions and
LECTURE 15: AMERICAN OPTIONS
LECTURE 15: AMERICAN OPTIONS 1. Introduction All of the options that we have considered thus far have been of the European variety: exercise is permitted only at the termination of the contract. These
Using Shapley Value To Allocate Savings in a Supply Chain
Using Shapley Value To Allocate Savings in a Supply Chain John J. Bartholdi, III and Eda Kemahlıoğlu-Ziya School of Industrial and Systems Engineering Georgia Institute of Technology 765 Ferst Drive, Atlanta,
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Cheap Talk : Multiple Senders and Multiple Receivers
Corso di Laurea in Economia indirizzo Models and Methods of Quantitative Economics Prova finale di Laurea Cheap Talk : Multiple Senders and Multiple Receivers Relatore Prof. Piero Gottardi Laureando Arya
TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION
TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the
Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information
Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information By: Michael Rothschild and Joseph Stiglitz Presented by Benjamin S. Barber IV, Xiaoshu Bei, Zhi Chen, Shaiobi
Biform Games: Additional Online Material
Biform Games: Additional Online Material Adam Brandenburger Harborne Stuart July 2006 These appendices supplement Brandenburger and Stuart [1, 2006], [2, 2006] ( Biform Games ). Appendix C uses the efficiency
Game Theory 1. Introduction
Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each
Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2
Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are
Find-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
Duality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao [email protected]
Integer Polynomials June 9, 007 Yufei Zhao [email protected] We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing
Price of Anarchy in Non-Cooperative Load Balancing
Price of Anarchy in Non-Cooperative Load Balancing Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu To cite this version: Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu. Price of Anarchy in Non-Cooperative
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
The Student-Project Allocation Problem
The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.
Follow links for Class Use and other Permissions. For more information send email to: [email protected]
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model
Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model Allan Collard-Wexler April 19, 2012 Co-Written with John Asker and Vasiliki Skreta 1 Reading for next week: Make Versus Buy in
GENERALIZED BANKRUPTCY PROBLEM
Alexander Karpov, Semyon Yurkov GENERALIZED BANKRUPTCY PROBLEM BASIC RESEARCH PROGRAM WORKING PAPERS SERIES: FINANCIAL ECONOMICS WP BRP 08/FE/2012 This Working Paper is an output of a research project
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
Online Appendix for Student Portfolios and the College Admissions Problem
Online Appendix for Student Portfolios and the College Admissions Problem Hector Chade Gregory Lewis Lones Smith November 25, 2013 In this online appendix we explore a number of different topics that were
LOAD BALANCING MECHANISMS IN DATA CENTER NETWORKS
LOAD BALANCING Load Balancing Mechanisms in Data Center Networks Load balancing vs. distributed rate limiting: an unifying framework for cloud control Load Balancing for Internet Distributed Services using
Phantom bonuses. November 22, 2004
Phantom bonuses November 22, 2004 1 Introduction The game is defined by a list of payouts u 1, u 2,..., u l, and a list of probabilities p 1, p 2,..., p l, p i = 1. We allow u i to be rational numbers,
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
IMPLEMENTING ARROW-DEBREU EQUILIBRIA BY TRADING INFINITELY-LIVED SECURITIES
IMPLEMENTING ARROW-DEBREU EQUILIBRIA BY TRADING INFINITELY-LIVED SECURITIES Kevin X.D. Huang and Jan Werner DECEMBER 2002 RWP 02-08 Research Division Federal Reserve Bank of Kansas City Kevin X.D. Huang
Making Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University [email protected] [email protected] I. Introduction III. Model The goal of our research
No-Betting Pareto Dominance
No-Betting Pareto Dominance Itzhak Gilboa, Larry Samuelson and David Schmeidler HEC Paris/Tel Aviv Yale Interdisciplinary Center Herzlyia/Tel Aviv/Ohio State May, 2014 I. Introduction I.1 Trade Suppose
Online Appendix. A2 : Description of New York City High School Admissions
Online Appendix This appendix provides supplementary material for Strategy-proofness versus Efficiency in Matching with Indifferences: Redesigning the NYC High School Match. The numbering of sections parallels
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
