Repeated Games and Reputations
|
|
|
- Ashley May
- 9 years ago
- Views:
Transcription
1 1 / 1 Repeated Games and Reputations George J Mailath UPenn June 26, th Tinbergen Institute Conference: 70 Years of Theory of Games and Economic Behaviour The slides and associated bibliography are on my webpage gmailath
2 2 / 1 Introduction Games and Economic Behavior does not mention repeated games. Yet we find in Luce and Raiffa (1957, page 457): The relevant literature which dates back, even if we are generous; only to 1949, is already extensive. Two basic themes emerged early: intertemporal incentives discourage opportunistic behavior, and actions can convey information. Work originally focused on repeated zero sum games, and their applications (though the repeated prisoners dilemma makes a significant appearance in L&R). Fruitful applications to economics and other social sciences required understanding repeated non-zero sum games and discounting.
3 3 / 1 I will argue that: Theme While the current theory of repeated games shows that the long relationships can discourage opportunistic behavior, it does not show that long run relationships will discourage opportunistic behavior.
4 4 / 1 I will argue that: Theme While the current theory of repeated games shows that the long relationships can discourage opportunistic behavior, it does not show that long run relationships will discourage opportunistic behavior. The current set of tools are well suited to proving folk theorems, but do not to provide a positive theory of behavior in long run relationships. In particular, the tools typically focus on continuation values and patient players. They do not focus on behavior directly.
5 5 / 1 I will argue that: Theme While the current theory of repeated games shows that the long relationships can discourage opportunistic behavior, it does not show that long run relationships will discourage opportunistic behavior. The current set of tools are well suited to proving folk theorems, but do not to provide a positive theory of behavior in long run relationships. In particular, the tools typically focus on continuation values and patient players. They do not focus on behavior directly. There are some suggestive results with bounded recall. The reputations literature has a larger positive content, but has serious limitations.
6 6 / 1 Examples of Long-Run Relationships Buyer-seller. Traders selling goods on consignment. Employer and employees. Partners in a firm. A government/leader of a community interacting with its members. Firm selling to a population of small customers.
7 7 / 1 Games with Perfect Monitoring The prisoners dilemma u 2 E S E 1, 1 1, 2 F S 2, 1 0, 0 u 1 each player has minmax payoff of 0. F is the set of feasible and individually rational payoffs. action spaces A i := {E, S} and A := A 1 A 2.
8 8 / 1 The Repeated Game Γ(δ) set of histories, H := t 0 A t. pure strategy for player i, σ i : H A i. outcome induced by σ = (σ 1, σ 2 ), a(σ) := (a 0 (σ), a 1 (σ), a 2 (σ),...), where a 0 (σ) := σ( ) and a t (σ) := σ(a t 1 (σ)). payoffs in the repeated game, U i (σ) = t 0 (1 δ)δt u i (a t (σ)) Definition The profile σ is a Nash eq of Γ(δ) if U i (σ ) U i (σ i, σ i ) σ i. The profile σ is a subgame perfect eq of Γ(δ) if σ h t is a Nash eq for all histories h t H, where σ h t is the continuation profile induced by h t.
9 9 / 1 Characterizing Equilibria Let E p (δ) F be the set of (pure strategy) subgame perfect equilibria of Γ(δ). Difficult problem: many possible deviations in many possible subgames. But repeated games are recursive, and the one shot deviation principle (from dynamic programming) holds. Simple penal codes (Abreu, 1988): use i s worst eq to punish any (and all) deviation by i.
10 10 / 1 EE Example I Grim Trigger w 0 w EE EE w SS This is an eq if 1 (1 δ) 2 + δ 0 δ 1 2. [Automata representation of strategy profiles is due to Osborne and Rubinstein 1994.]
11 11 / 1 A Folk Theorem A Folk Theorem (Fudenberg and Maskin 1986) For every feasible and strictly individually rational v F, with F having full dimension, there exists δ (0, 1) such that v E p (δ) for all δ (δ, 1). For our prisoners dilemma, for δ 3/4, E p = F. In general, order of quantifiers matters, and there are games with weakly IR payoffs that are not in E p (δ) for any δ. Restriction to pure minmax is not necessary (though then need to use mixed strategies). Original proof used simple penal codes to explicitly construct eq.
12 12 / 1 Interpretation While efficient payoffs are consistent with eq, so are many other payoffs, and associated eq behaviors. (Consistent with experimental evidence: Dal Bo and Fréchette 2011, Dreber, Fudenberg, and Rand 2014.) Moreover, multiple eq are consistent with the same payoff. The theorem does not justify restricting attention to efficient payoffs.
13 13 / 1 Interpretation While efficient payoffs are consistent with eq, so are many other payoffs, and associated eq behaviors. (Consistent with experimental evidence: Dal Bo and Fréchette 2011, Dreber, Fudenberg, and Rand 2014.) Moreover, multiple eq are consistent with the same payoff. The theorem does not justify restricting attention to efficient payoffs. Nontheless: In many situations, understanding the potential scope of equilibrium incentives helps us to understand possible plausible behaviors. Understanding what it takes to achieve efficiency gives us important insights into the nature of equilibrium incentives.
14 14 / 1 What if δ < 3/4? Impatient Players δ < 1/2, only subgame perfect equilibrium payoff is (0, 0). Difficult to characterize the equilibrium set in general for intermediate δ. Mailath, Obara, and Sekiguchi (2002) ask: What is player 1 s maximum efficient equilibrium payoff? u 2 F ( 3 2, 0), 1 s max eff payoff u 1
15 15 / 1 [ If δ 1 2, 1 payoff is 2 ), then 1 s maximum efficient equilibrium 2 δ. This is decreasing in the discount factor (same eq payoff: SE, EE ). If δ = 1 2, then SE, SE, EE is an eq outcome, yielding a payoff of 3 2 to player 1. ( ) Let W 2 1, 3 4 be the set of discount factors for which 1 s max eff eq payoff is 3 2. Then, W is uncountable, but its complement is open and dense in ( 1 2, 3 4 ). Moreover, for some δ, there is an inefficient eq payoff yielding 1 a higher payoff. Thus, the associated eq behaviors are not robust to small changes in δ.
16 16 / 1 Reputations The product-choice game c s H 2, 3 0, 2 L 3, 0 1, 1 Row player is a long-lived firm choosing High or Low quality. Column player is a short-lived customer choosing the customized or standard product. In the game with perfect monitoring, grim trigger (play Hc till 1 plays L, then revert to perpetual Ls) is an eq if δ 1 2. The set of eq payoffs for Row player: [1, 2].
17 17 / 1 Reputations Suppose the customers are uncertain about the characteristics of the firm. In particular, suppose they assign prior prob ρ > 0 that the firm is a behavioral type that chooses H after any history. Then, for sufficiently patient firms, every Nash eq must give the firm a payoff close to 2 (Fudenberg and Levine, 1989). This is a natural way to reduce the set of eq payoffs and behaviors in some settings.
18 18 / 1 Reputations Suppose the customers are uncertain about the characteristics of the firm. In particular, suppose they assign prior prob ρ > 0 that the firm is a behavioral type that chooses H after any history. Then, for sufficiently patient firms, every Nash eq must give the firm a payoff close to 2 (Fudenberg and Levine, 1989). This is a natural way to reduce the set of eq payoffs and behaviors in some settings. But is it always natural? Tit-for-tat in finitely repeated PD or overly aggressive firms (as done in the original reputation papers of KWMR)? Or mixed Stackelberg types? There are no good general results for two long-lived players (and counterexamples indicating that under perfect monitoring, there can t be).
19 19 / 1 What do we learn from perfect monitoring Multiplicity of equilibria. This is necessary for repeated game to serve as a building block for any theory of institutions. Selection of eq can (should) be part of modelling. It is sometimes argued that the punishments imposed are too severe. But often weaker punishments will work. Histories coordinate behavior. But intertermporal incentives require deviations to be punished, which requires monitoring, and a future (so end game effects can be important). Noisy monitoring. Overlapping generations. Random matching (assumptions on observability of histories).
20 20 / 1 Games with Public Monitoring Continuing with prisoners dilemma example Actions are not observed. There is a noisy signal of actions (output), y {y, y} =: Y, p, if a = EE, Pr(y a) := ρ(ȳ a) = q, if a = SE or SE, and r, if a = SS. Realized payoffs, u i (a i, y), and ex ante payoffs, u i (a i, y) := y u i (a i, y)ρ(y a). Player i s histories, H i := t 0 (A i Y ) t. Public histories, H := t 0 Y t. Pure strategy for player i, σ i : H i A i.
21 21 / 1 Equilibrium Notion Game has no proper subgames, so how to usefully capture sequential rationality? Public strategy for player i, σ i : H A i. Definition The profile of public strategies σ is a perfect public eq if σ h t a Nash eq for all histories h t H, where σ h t is the continuation public profile induced by h t. is
22 22 / 1 Characterizing PPE The Role of Continuation Values Let E p (δ) F be the set of (pure strategy) PPE. If v E p (δ), then there exists a A and γ : Y E p (δ) so that, for all i, v i = (1 δ)u i (a ) + δ y γ i(y)ρ(y a ) (1 δ)u i (a i, a i ) + δ y γ i(y)ρ(y a i, a i ) a i A i.
23 23 / 1 Characterizing PPE The Role of Continuation Values Let E p (δ) F be the set of (pure strategy) PPE. If v E p (δ), then there exists a A and γ : Y E p (δ) so that, for all i, v i = (1 δ)u i (a ) + δ y γ i(y)ρ(y a ) (1 δ)u i (a i, a i ) + δ y γ i(y)ρ(y a i, a i ) a i A i. (Self-generation, Abreu, Pearce and Stacchetti 1990) B E p (δ) if and only if for all v B, there exists a A and γ : Y B so that, for all i, v i = (1 δ)u i (a ) + δ y γ i(y)ρ(y a ) (1 δ)u i (a i, a i ) + δ y γ i(y)ρ(y a i, a i ) a i A i.
24 y Example II Grim Trigger w 0 w EE y w SS This is an eq if V = (1 δ) + δ[pv + (1 p) 0] (1 δ)2 + δ[qv + (1 q) 0] δ(p q) (1 δp) 1 δ 1 2p q. Note that V = (1 δ) (1 δp). 24 / 1
25 Example III The value of forgiveness y w 0 w EE y (β) w SS (1 β) This is an eq if V = (1 δ) + δ(p + (1 p)β)v (1 δ)2 + δ(q + (1 q)β)v In the most efficient eq (requires p > q and δ(2p q) > 1), β = δ(2p q)1 δ(2p q 1) and V = 1 1 p p q < / 1
26 26 / 1 Implications Providing intertemporal incentives requires imposing punishments on the equilibrium path. These punishments may generate inefficiencies, and the greater the noise, the greater the inefficiency. How to impose punishments without creating inefficiencies: transfer value rather than destroying it. In PD example, impossible to distinguish ES from SE. Similar problem arises in Green and Porter (1984). Other examples reveal the need for asymmetric/ nonstationary behavior in symmetric stationary environments.
27 27 / 1 Another Folk Theorem Theorem (Fudenberg, Levine, and Maskin, 1994) Suppose the set of feasible and individually rational payoffs has nonempty interior, and that all action profiles are statistically distinguishable (pairwise full rank). Every strictly individually rational and feasible payoff is a PPE payoff, provided players are patient enough. Note that the monitoring can be arbitrarily noisy, as long as it remains statistically informative. Proof relies on a clever linear programming approach to bounding eq payoffs, due to Fudenberg and Levine (1994).
28 28 / 1 Reputations I Noisy monitoring does not, in general, restrict eq payoffs. Reputation arguments continue to hold (Fudenberg and Levine, 1992; there is a beautiful proof by Gossner, 2011). But: Theorem (Cripps, Mailath, and Samuelson, 2004, 2007) Let p t denote the posterior prob assigned by the uninformed players to the behavioral type. Suppose the behavioral type s action is not part of a static Nash eq, and monitoring has full support. Then, conditional on informed player not being a behavioral type, with probability one, p t 0.
29 29 / 1 Reputations II On the plus side The temporary reputations result does not hold when the uncertainty is continually refreshed, either because the types are themselves changing (Ekmekci, Gossner, and Wilson, 2012), or the uninformed agents have bounded memory (Liu, 2011). There is a glimmer of positive reputation results for two long-lived players (Cripps and Faingold, 2014).
30 30 / 1 Games with Private Monitoring Intertemporal incentives arise when public histories coordinate continuation play. Can intertemporal incentives be provided when the monitoring is private? Stigler (1964) suggested that that answer is often NO, and so collusion is not likely to be a problem when monitoring problems are severe. While intuitive, we need to evaluate this argument within a formal model.
31 31 / 1 The Problem Fix a strategy profile σ. Player i s strategy σ i is sequentially rational if, after all private histories, hi t, the continuation strategy σ i h t is a best reply to the other players i continuation strategies (σ j h t ) j i (which depend on their j private histories). That is, player i is best responding to the other players behavior, given his beliefs over the private histories of the other players. While player i knows his beliefs, we typically do not. Most researchers thought this problem was intractable.
32 32 / 1 The Problem Fix a strategy profile σ. Player i s strategy σ i is sequentially rational if, after all private histories, hi t, the continuation strategy σ i h t is a best reply to the other players i continuation strategies (σ j h t ) j i (which depend on their j private histories). That is, player i is best responding to the other players behavior, given his beliefs over the private histories of the other players. While player i knows his beliefs, we typically do not. Most researchers thought this problem was intractable. Theorem (Sekiguchi, 1997) There exists an almost efficient eq for the PD with conditionally-independent almost-perfect private monitoring.
33 33 / 1 Automaton Representation Recall that any public strategy profile can be represented by an automaton, (W, w 0, f, τ), where W is set of states, w 0 W is the initial state, f : W A is output function (decision rule), and τ : W Y W is transition function. Similarly, any strategy can be represented by an automaton, (W i, wi 0, f i, τ i ), where W i is set of states, W i is i s initial state, f i : W i A i is output function (decision rule), and τ i : W i A i Y i W i is transition function. wi 0
34 34 / 1 A Helpful Observation Fix an automaton representation for player j. Consider the problem for player i of predicting player j s continuation play. In terms of continuation play, it is i s belief over player j s private state that is important. Since the set of states W j partitions the set of histories, differences in beliefs over histories are only relevant in so far as they imply differences in beliefs over private states.
35 35 / 1 Almost Public Monitoring How robust are PPE in the game with public monitoring to the introduction of private monitoring? Perturb the public signal, so that player i observes the conditionally (on y) independent signal y i {y, y}, with probabilities given by π(y 1, y 2 y) = π 1 (y 1 y)π 2 (y 2 y), and π i (y i y) = { 1 ε, if y i = y, ε, if y i y.
36 36 / 1 Grim Trigger 1 Suppose 2p q < δ < 1, so grim trigger is a strict PPE. Strategy in game with private monitoring is y i w 0 w E y i w S If 1 > p > q > r > 0, profile is not a Nash eq (for any ε > 0). Consider private history Ey 1, Sy 1, Sy 1, Sy 1, If 1 > p > r > q > 0, profile is a Nash eq (but not sequential).
37 37 / 1 Behavioral Robustness An eq is behaviorally robust if the same profile is an eq in near-by games. A public profile has bounded recall if there exists L such that after any history of length at least L, continuation play only depends on the last L periods of the public history. Theorem (Mailath and Morris, 2002) A strict PPE with bounded recall is behaviorally robust to private monitoring that is almost public.
38 38 / 1 Behavioral Robustness An eq is behaviorally robust if the same profile is an eq in near-by games. A public profile has bounded recall if there exists L such that after any history of length at least L, continuation play only depends on the last L periods of the public history. Theorem (Mailath and Morris, 2002) A strict PPE with bounded recall is behaviorally robust to private monitoring that is almost public. Theorem (Mailath and Morris, 2006) If the private monitoring is sufficiently rich, a strict PPE is behaviorally robust to private monitoring that is almost public if and only if it has bounded recall.
39 39 / 1 Bounded Recall I Because of these results, it is tempting to think that bounded recall provides an attractive restriction on behavior. Bounded recall may capture some notion of simplicity and bounded rationality. The only strongly symmetric bounded recall equilibrium in some parameterizations of the public monitoring repeated PD is perpetual SS (Cole and Kocherlakota, 2005). For the same parameterizations, the set of strongly symmetric infinite recall PPE is strictly larger.
40 40 / 1 But: Bounded Recall II Theorem (Hörner and Olszewski, 2009) The public monitoring folk theorem holds using bounded recall strategies. The folk theorem also holds using bounded recall strategies for games with almost-public monitoring. Eq use communication phases to encode histories before the recall dates (actions convey information). If cheap talk is possible, public monitoring result is immediate (the private monitoring result requires more work, Compte 1998 and Kandori & Matsushima 1998). This private monitoring folk theorem is not behaviorally robust. Eq incentives rely on indifferences (and a public correlating device), with behavior depending upon the fine details of the monitoring.
41 41 / 1 Bounded Recall III Theorem (Mailath and Olszewski, 2011) The perfect monitoring folk theorem holds using bounded recall strategies with uniformly strict incentives. Moreover, the resulting equilibrium is behaviorally robust to almost-perfect almost-public monitoring. These strategies also use communication phases to encode histories before the recall dates. While behaviorally robust, the constructed profiles are not simple!
42 42 / 1 Belief-Free Equilibria Another approach is to specify behavior in such a way that the beliefs are irrelevant. Definition The profile ((W 1, w 0 1, f 1, τ 1 ), (W 2, w 0 2, f 2, τ 2 )) is a belief-free eq if for all (w 1, w 2 ) W 1 W 1, (W i, w i, f i, τ i ) is a best reply to (W j, w j, f j, τ j ), all i j. This approach is due to Piccione (2002), with a refinement by Ely and Valimaki (2002). Belief-free eq are characterized by Ely, Hörner, and Olszewski (2005).
43 43 / 1 Illustration of Belief Free Eq The product-choice game redux c s H 2, 3 0, 2 L 3, 0 1, 1 Row player is a firm choosing High or Low quality. Column player is a short-lived customer choosing the customized or standard product. In the game with perfect monitoring, grim trigger (play Hc till 1 plays L, then revert to perpetual Ls) is an eq if δ 1 2.
44 44 / 1 The belief-free eq that achieves a payoff of 2 for the row player: Row player always plays 1 2 H L. (Trivial automaton) Column player s strategy has one period memory. Play c for sure after H in the previous period, and play ( α L := 1 1 ) c + 1 2δ 2δ s after L in the previous period. Player 2 s automaton: H L w 0 w c w α L L H
45 45 / 1 Histories are not being used to coordinate continuation play! This is to be contrasted with strict PPE. Rather, lump sum taxes are being imposed after deviant behavior is suggested. This is essentially what Ely Valimaki (2002) do in the repeated prisoners dilemma.
46 46 / 1 Imperfect Monitoring This works for public and private monitoring. No hope for behavioral robustness. Theorem (Hörner and Olszewski, 2006) The folk theorem holds for games with private almost-perfect monitoring. Result uses belief-free ideas in a central way, but the equilibria constructed are not belief free.
47 47 / 1 Purifiability Belief-free equilibria typically have the property that players randomize the same way after different histories (and so with different beliefs over the private states of the other player(s)). Harsanyi (1973) purification is perhaps the best rationale for randomizing behavior in finite normal form games. Can we purify belief-free equilibria (Bhaskar, Mailath, and Morris, 2008)? The one period memory belief free equilibria of Ely and Valimaki (2002), as exemplified above, is not purifiable using one period memory strategies. They are purifiable using unbounded memory strategies. Open question: can they be purified using bounded memory strategies? (It turns out that for sequential games, only Markov equilibria can be purified using bounded memory strategies, Bhaskar, Mailath, and Morris 2013).
48 48 / 1 What about noisy monitoring? Current best result is Sugaya (2013): Theorem The folk theorem generically holds for the repeated two-player prisoners dilemma with private monitoring if the support of each player s signal distribution is sufficiently large. Neither cheap talk communication nor public randomization is necessary, and the monitoring can be very noisy.
49 49 / 1 Ex Post Equilibria The belief-free idea is very powerful. Suppose there is an unknown state determining payoffs and monitoring. ω E E S E 1, 1 1, 2 S 2, 1 0, 0 ω S E S E 0, 0 2, 1 S 1, 2 1, 1 Let Γ(δ; ω) denote the complete-information repeated game when state ω is common knowledge. The monitoring may be perfect or imperfect public.
50 50 / 1 Perfect Public Ex Post Equilibria Γ(δ; ω) is complete-information repeated game at ω. Definition The profile of public strategies σ is a perfect public ex post eq if σ h t is a Nash eq of Γ(δ; ω) for all histories h t H, where σ h t is the continuation public profile induced by h t. These equilibria can be strict; histories do coordinate play. But the eq are belief free.
51 Perfect Public Ex Post Equilibria Γ(δ; ω) is complete-information repeated game at ω. Definition The profile of public strategies σ is a perfect public ex post eq if σ h t is a Nash eq of Γ(δ; ω) for all histories h t H, where σ h t is the continuation public profile induced by h t. These equilibria can be strict; histories do coordinate play. But the eq are belief free. Theorem (Fudenberg and Yamamoto 2010) Suppose the signals are statistically informative (about actions and states). The folk theorem holds state-by-state. These ideas also can be used in some classes of reputation games (Hörner and Lovo, 2009) and in games with private monitoring (Yamamoto, 2014). 51 / 1
52 52 / 1 Conclusion The current theory of repeated games shows that the long relationships can discourage opportunistic behavior, it does not show that long run relationships will discourage opportunistic behavior. The current set of tools are well suited to proving folk theorems, but do not to provide a positive theory of behavior in long run relationships. In particular, the tools typically focus on continuation values and patient players. They do not focus on behavior directly. There are some suggestive results with bounded recall or memory. The reputations literature has a larger positive content, but has serious limitations. We need a better positive theory of behavior in repeated games.
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation
6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma
When is Reputation Bad? The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.
When is Reputation Bad? he Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published Version Accessed Citable Link erms
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
When is Reputation Bad? 1
When is Reputation Bad? 1 Jeffrey Ely Drew Fudenberg David K Levine 2 First Version: April 22, 2002 This Version: November 20, 2005 Abstract: In traditional reputation theory, the ability to build a reputation
Department of Economics The Ohio State University Economics 817: Game Theory
Department of Economics The Ohio State University Economics 817: Game Theory Syllabus and Reading List James Peck M-W 11:30-1:18 Autumn 2011 Arps Hall 177 www.econ.ohio-state.edu/jpeck/econ817.htm Office
A Simple Model of Price Dispersion *
Federal Reserve Bank of Dallas Globalization and Monetary Policy Institute Working Paper No. 112 http://www.dallasfed.org/assets/documents/institute/wpapers/2012/0112.pdf A Simple Model of Price Dispersion
Credible Termination Threats, Reputation and Private Monitoring.
Credible Termination Threats, Reputation and Private Monitoring. Olivier Compte First Version: June 2001 This Version: April 2005 Abstract In repeated principal-agent relationships, termination threats
ALMOST COMMON PRIORS 1. INTRODUCTION
ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type
6.207/14.15: Networks Lectures 19-21: Incomplete Information: Bayesian Nash Equilibria, Auctions and Introduction to Social Learning
6.207/14.15: Networks Lectures 19-21: Incomplete Information: Bayesian Nash Equilibria, Auctions and Introduction to Social Learning Daron Acemoglu and Asu Ozdaglar MIT November 23, 25 and 30, 2009 1 Introduction
Limited Records and Reputation Bubbles
Limited Records and Reputation Bubbles Qingmin Liu Andrzej Skrzypacz May 8, 2013 Abstract This paper offers a tractable and fully rational model to study the economics of reputation in a dynamic market
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Socially-Optimal Design of Service Exchange Platforms with Imperfect Monitoring
Socially-Optimal Design of Service Exchange Platforms with Imperfect Monitoring YUANZHANG XIAO and MIHAELA VAN DER SCHAAR, University of California, Los Angeles We study the design of service exchange
Lecture V: Mixed Strategies
Lecture V: Mixed Strategies Markus M. Möbius February 26, 2008 Osborne, chapter 4 Gibbons, sections 1.3-1.3.A 1 The Advantage of Mixed Strategies Consider the following Rock-Paper-Scissors game: Note that
10 Evolutionarily Stable Strategies
10 Evolutionarily Stable Strategies There is but a step between the sublime and the ridiculous. Leo Tolstoy In 1973 the biologist John Maynard Smith and the mathematician G. R. Price wrote an article in
Game Theory and Algorithms Lecture 10: Extensive Games: Critiques and Extensions
Game Theory and Algorithms Lecture 0: Extensive Games: Critiques and Extensions March 3, 0 Summary: We discuss a game called the centipede game, a simple extensive game where the prediction made by backwards
2. Information Economics
2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many
ECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.
1 ECON 40050 Game Theory Exam 1 - Answer Key Instructions: 1) You may use a pen or pencil, a hand-held nonprogrammable calculator, and a ruler. No other materials may be at or near your desk. Books, coats,
Persuasion by Cheap Talk - Online Appendix
Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case
Follow links for Class Use and other Permissions. For more information send email to: [email protected]
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
Bad Reputation. January 30, 2003. Abstract
Bad Reputation Jeffrey C. Ely Juuso Välimäki January 30, 2003 Abstract We construct a model where the reputational concern of the long-run player to look good in the current period results in the loss
6.254 : Game Theory with Engineering Applications Lecture 1: Introduction
6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R
Competition and Regulation. Lecture 2: Background on imperfect competition
Competition and Regulation Lecture 2: Background on imperfect competition Monopoly A monopolist maximizes its profits, choosing simultaneously quantity and prices, taking the Demand as a contraint; The
Bad Reputation. January 21, 2003. Abstract
Bad Reputation Jeffrey C. Ely Juuso Välimäki January 21, 2003 Abstract We construct a model where the reputational concern of the long-run player to look good in the current period results in the loss
Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents
Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider
Reputation in repeated settlement bargaining
Reputation in repeated settlement bargaining Jihong Lee Birkbeck College, London and Yonsei University Qingmin Liu Cowles Foundation and University of Pennsylvania PRELIMINARY and INCOMPLETE commets welcome!
0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text)
September 2 Exercises: Problem 2 (p. 21) Efficiency: p. 28-29: 1, 4, 5, 6 0.0.2 Pareto Efficiency (Sec. 4, Ch. 1 of text) We discuss here a notion of efficiency that is rooted in the individual preferences
ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY 100-3 90-99 21 80-89 14 70-79 4 0-69 11
The distribution of grades was as follows. ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY Range Numbers 100-3 90-99 21 80-89 14 70-79 4 0-69 11 Question 1: 30 points Games
Do not open this exam until told to do so.
Do not open this exam until told to do so. Department of Economics College of Social and Applied Human Sciences K. Annen, Winter 004 Final (Version ): Intermediate Microeconomics (ECON30) Solutions Final
A Theory of Intraday Patterns: Volume and Price Variability
A Theory of Intraday Patterns: Volume and Price Variability Anat R. Admati Paul Pfleiderer Stanford University This article develops a theory in which concentrated-trading patterns arise endogenously as
Bayesian Nash Equilibrium
. Bayesian Nash Equilibrium . In the final two weeks: Goals Understand what a game of incomplete information (Bayesian game) is Understand how to model static Bayesian games Be able to apply Bayes Nash
Infinitely Repeated Games with Discounting Ù
Infinitely Repeated Games with Discounting Page 1 Infinitely Repeated Games with Discounting Ù Introduction 1 Discounting the future 2 Interpreting the discount factor 3 The average discounted payoff 4
Capital Structure. Itay Goldstein. Wharton School, University of Pennsylvania
Capital Structure Itay Goldstein Wharton School, University of Pennsylvania 1 Debt and Equity There are two main types of financing: debt and equity. Consider a two-period world with dates 0 and 1. At
On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information
Finance 400 A. Penati - G. Pennacchi Notes on On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information by Sanford Grossman This model shows how the heterogeneous information
Backward Induction and Subgame Perfection
Backward Induction and Subgame Perfection In extensive-form games, we can have a Nash equilibrium profile of strategies where player 2 s strategy is a best response to player 1 s strategy, but where she
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
Choice under Uncertainty
Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory
KRANNERT GRADUATE SCHOOL OF MANAGEMENT
KRANNERT GRADUATE SCHOOL OF MANAGEMENT Purdue University West Lafayette, Indiana Endogenous Rationing, Price Dispersion, and Collusion in Capacity Constrained Supergames by Emmanuel Dechenaux Dan Kovenock
Information in Mechanism Design
Dirk Bergemann and Juuso Valimaki Econometric Society World Congress August 2005 Mechanism Design Economic agents have private information that is relevant for a social allocation problem. Information
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE YUAN TIAN This synopsis is designed merely for keep a record of the materials covered in lectures. Please refer to your own lecture notes for all proofs.
Games of Incomplete Information
Games of Incomplete Information Jonathan Levin February 00 Introduction We now start to explore models of incomplete information. Informally, a game of incomplete information is a game where the players
Perfect Bayesian Equilibrium
Perfect Bayesian Equilibrium When players move sequentially and have private information, some of the Bayesian Nash equilibria may involve strategies that are not sequentially rational. The problem is
Théorie de la décision et théorie des jeux Stefano Moretti
héorie de la décision et théorie des jeux Stefano Moretti UMR 7243 CNRS Laboratoire d'analyse et Modélisation de Systèmes pour l'aide à la décision (LAMSADE) Université Paris-Dauphine email: [email protected]
Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage
Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Alex Edmans LBS, NBER, CEPR, and ECGI Itay Goldstein Wharton Wei Jiang Columbia May 8, 05 A Proofs of Propositions and
Evolutionary dynamics and backward induction
Games and Economic Behavior 41 (2002) 227 264 www.elsevier.com/locate/geb Evolutionary dynamics and backward induction Sergiu Hart Center for Rationality and Interactive Decision Theory, Department of
Games of Incomplete Information
Games of Incomplete Information Yan Chen November 16, 2005 Games of Incomplete Information Auction Experiments Auction Theory Administrative stuff Games of Incomplete Information Several basic concepts:
Cooperation with Network Monitoring
Cooperation with Network Monitoring Alexander Wolitzky Microsoft Research and Stanford University July 20 Abstract This paper studies the maximum level of cooperation that can be sustained in sequential
AN INTRODUCTION TO GAME THEORY
AN INTRODUCTION TO GAME THEORY 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. MARTIN J. OSBORNE University of Toronto
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Efficient Response to Bad Behavior - Network Marketing Model
Audit Mechanisms for Provable Risk Management and Accountable Data Governance Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha Carnegie Mellon University, Pittsburgh, PA {jblocki, nicolasc,
Methods for Finding Bases
Methods for Finding Bases Bases for the subspaces of a matrix Row-reduction methods can be used to find bases. Let us now look at an example illustrating how to obtain bases for the row space, null space,
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
Lecture 3: Growth with Overlapping Generations (Acemoglu 2009, Chapter 9, adapted from Zilibotti)
Lecture 3: Growth with Overlapping Generations (Acemoglu 2009, Chapter 9, adapted from Zilibotti) Kjetil Storesletten September 10, 2013 Kjetil Storesletten () Lecture 3 September 10, 2013 1 / 44 Growth
UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory
UCLA Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory (SPRING 2011) Instructions: You have 4 hours for the exam Answer any 5 out of the 6 questions. All questions are weighted equally.
(Good and Bad) Reputation for a Servant of Two Masters
(Good and Bad) Reputation for a Servant of Two Masters Heski Bar-Isaac University of Toronto Joyee Deb New York University March 2013 Abstract We consider a model in which an agent takes actions to affect
Binomial lattice model for stock prices
Copyright c 2007 by Karl Sigman Binomial lattice model for stock prices Here we model the price of a stock in discrete time by a Markov chain of the recursive form S n+ S n Y n+, n 0, where the {Y i }
Sharing Online Advertising Revenue with Consumers
Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, [email protected] 2 Harvard University.
Oligopoly and Strategic Pricing
R.E.Marks 1998 Oligopoly 1 R.E.Marks 1998 Oligopoly Oligopoly and Strategic Pricing In this section we consider how firms compete when there are few sellers an oligopolistic market (from the Greek). Small
Online Appendix for Student Portfolios and the College Admissions Problem
Online Appendix for Student Portfolios and the College Admissions Problem Hector Chade Gregory Lewis Lones Smith November 25, 2013 In this online appendix we explore a number of different topics that were
Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole
Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole Luís M. B. Cabral New York University and CEPR November 2005 1 Introduction Beginning with their seminal 2002 paper,
The Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
9 Repeated Games. Tomorrow, and tomorrow, and tomorrow, Creeps in this petty pace from day to day To the last syllable of recorded time Shakespeare
9 Repeated Games Tomorrow, and tomorrow, and tomorrow, Creeps in this petty pace from day to day To the last syllable of recorded time Shakespeare When a game G is repeated an indefinite number of times
Web Appendix for Reference-Dependent Consumption Plans by Botond Kőszegi and Matthew Rabin
Web Appendix for Reference-Dependent Consumption Plans by Botond Kőszegi and Matthew Rabin Appendix A: Modeling Rational Reference-Dependent Behavior Throughout the paper, we have used the PPE solution
Econometrics Simple Linear Regression
Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight
Psychology and Economics (Lecture 17)
Psychology and Economics (Lecture 17) Xavier Gabaix April 13, 2004 Vast body of experimental evidence, demonstrates that discount rates are higher in the short-run than in the long-run. Consider a final
Numerical Methods for Option Pricing
Chapter 9 Numerical Methods for Option Pricing Equation (8.26) provides a way to evaluate option prices. For some simple options, such as the European call and put options, one can integrate (8.26) directly
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Dynamics and Equilibria
Dynamics and Equilibria Sergiu Hart Presidential Address, GAMES 2008 (July 2008) Revised and Expanded (November 2009) Revised (2010, 2011, 2012, 2013) SERGIU HART c 2008 p. 1 DYNAMICS AND EQUILIBRIA Sergiu
Competitive Screening in Credit Markets with Adverse Selection: A Cover Version of Bester s Model
Competitive Screening in Credit Markets with Adverse Selection: A Cover Version of Bester s Model Ran Spiegler April 18, 2013 Abstract This note presents a simple model of competitive screening in a credit
Working Paper Series
RGEA Universidade de Vigo http://webs.uvigo.es/rgea Working Paper Series A Market Game Approach to Differential Information Economies Guadalupe Fugarolas, Carlos Hervés-Beloso, Emma Moreno- García and
The Basics of Game Theory
Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #7 The Basics of Game Theory Friday - November 5, 2004 OUTLINE OF TODAY S RECITATION 1. Game theory definitions:
Math 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania
Financial Markets Itay Goldstein Wharton School, University of Pennsylvania 1 Trading and Price Formation This line of the literature analyzes the formation of prices in financial markets in a setting
Universidad Carlos III de Madrid Game Theory Problem Set - Dynamic Games
Universidad Carlos III de Madrid Game Theory Problem Set - Dynamic Games Session Problems 1, 2, 3, 4, 5, 6 1 (no SPNE) 2 7, 8, 9, 10, 11 3 12, 13, 14, 15, 16 4 17, 18, 19 5 Test 1. The next figure shows
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan
1 Sufficient statistics
1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =
