Jeux finiment répétés avec signaux semi-standards

Size: px
Start display at page:

Download "Jeux finiment répétés avec signaux semi-standards"

Transcription

1 Jeux finiment répétés avec signaux semi-standards P. Contou-Carrère 1, T. Tomala 2 CEPN-LAGA, Université Paris 13 7 décembre Université Paris 1, Panthéon Sorbonne 2 HEC, Paris

2 Introduction Repeated games are dynamic interactions, played by stages This talk: the players repeat over and over the same stage game, which is perfectly known In the standard model (with perfect monitoring), the actions played at a given stage are publicly observed before the next stage is reached. We have the Folk Theorem: the equilibrium payoffs of the repeated game are the feasible and individually rational payoffs. We study the model with imperfect monitoring: at the end of each stage, the players receive some signal depending on the action profile. e.g.: Principal-Agent problems Computing the equilibrium payoffs is not known.

3 Introduction Repeated games are dynamic interactions, played by stages This talk: the players repeat over and over the same stage game, which is perfectly known In the standard model (with perfect monitoring), the actions played at a given stage are publicly observed before the next stage is reached. We have the Folk Theorem: the equilibrium payoffs of the repeated game are the feasible and individually rational payoffs. We study the model with imperfect monitoring: at the end of each stage, the players receive some signal depending on the action profile. e.g.: Principal-Agent problems Computing the equilibrium payoffs is not known.

4 Introduction Repeated games are dynamic interactions, played by stages This talk: the players repeat over and over the same stage game, which is perfectly known In the standard model (with perfect monitoring), the actions played at a given stage are publicly observed before the next stage is reached. We have the Folk Theorem: the equilibrium payoffs of the repeated game are the feasible and individually rational payoffs. We study the model with imperfect monitoring: at the end of each stage, the players receive some signal depending on the action profile. e.g.: Principal-Agent problems Computing the equilibrium payoffs is not known.

5 Lots of equilibrium notions: NE, uniform equilibrium Refinements: SPE, sequential... Also correlation and communication This talk: Equilibrium payoffs in finitely repeated games with semi-standard signals Actions sets partitioned into equivalence classes When a player chooses an action, the cell of the partition that contains this action is publicly announced to the rest of the players NE and SPE payoffs of the finitely repeated game with pure strategies. Characterize the limit set of equilibrium payoffs as T + (in the Hausdorff distance)

6 Lots of equilibrium notions: NE, uniform equilibrium Refinements: SPE, sequential... Also correlation and communication This talk: Equilibrium payoffs in finitely repeated games with semi-standard signals Actions sets partitioned into equivalence classes When a player chooses an action, the cell of the partition that contains this action is publicly announced to the rest of the players NE and SPE payoffs of the finitely repeated game with pure strategies. Characterize the limit set of equilibrium payoffs as T + (in the Hausdorff distance)

7 Lots of equilibrium notions: NE, uniform equilibrium Refinements: SPE, sequential... Also correlation and communication This talk: Equilibrium payoffs in finitely repeated games with semi-standard signals Actions sets partitioned into equivalence classes When a player chooses an action, the cell of the partition that contains this action is publicly announced to the rest of the players NE and SPE payoffs of the finitely repeated game with pure strategies. Characterize the limit set of equilibrium payoffs as T + (in the Hausdorff distance)

8 Outline 1 Repeated Games with Imperfect Monitoring The model Aspects of imperfect monitoring 2 The model Equilibrium Notions Feasible Payoffs Robust to Undetectable Deviations Punishment levels Necessary Conditions on Equilibrium payoffs Characterization Elements of the proof

9 Outline 1 Repeated Games with Imperfect Monitoring The model Aspects of imperfect monitoring 2 The model Equilibrium Notions Feasible Payoffs Robust to Undetectable Deviations Punishment levels Necessary Conditions on Equilibrium payoffs Characterization Elements of the proof

10 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Data: Repeated games with imperfect monitoring (also called repeated games with signals, or supergames) A finite stage game G given by a set of players N = {1,..., n}, and for each player i a set of actions A i and a payoff functions g i : A R where A = i A i denotes the set of actions profiles. a monitoring structure: for each player i, a finite set of signals Y i, and a signalling function l : A (Y), where Y = i Y i stands for the set of signal profiles. Play: at every stage t = 1, 2,..., the players independently choose an action in their own set of actions. If a t A is the joint played action, a profile of signals y t = (y i,t ) i is selected according to l(a t ). The stage payoff for player i is then g i (a t ), but what player i learns before starting stage t + 1 is y i,t.

11 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Data: Repeated games with imperfect monitoring (also called repeated games with signals, or supergames) A finite stage game G given by a set of players N = {1,..., n}, and for each player i a set of actions A i and a payoff functions g i : A R where A = i A i denotes the set of actions profiles. a monitoring structure: for each player i, a finite set of signals Y i, and a signalling function l : A (Y), where Y = i Y i stands for the set of signal profiles. Play: at every stage t = 1, 2,..., the players independently choose an action in their own set of actions. If a t A is the joint played action, a profile of signals y t = (y i,t ) i is selected according to l(a t ). The stage payoff for player i is then g i (a t ), but what player i learns before starting stage t + 1 is y i,t.

12 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Data: Repeated games with imperfect monitoring (also called repeated games with signals, or supergames) A finite stage game G given by a set of players N = {1,..., n}, and for each player i a set of actions A i and a payoff functions g i : A R where A = i A i denotes the set of actions profiles. a monitoring structure: for each player i, a finite set of signals Y i, and a signalling function l : A (Y), where Y = i Y i stands for the set of signal profiles. Play: at every stage t = 1, 2,..., the players independently choose an action in their own set of actions. If a t A is the joint played action, a profile of signals y t = (y i,t ) i is selected according to l(a t ). The stage payoff for player i is then g i (a t ), but what player i learns before starting stage t + 1 is y i,t.

13 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Illustration: The prisoner s dilemma C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) (unique equilibrium payoff for the one-shot game: ( 8, 8)). Standard case of perfect monitoring: Y i = A and y i,t = a t for each player i. Trivial observation for player i: Y i is a singleton (play in the dark) Public signals: all players observe the same signal (Fudenberg, Levine, Maskin 94) Observable payoffs: each player can deduce his payoff from his own action and signal (Tomala, 99)

14 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Illustration: The prisoner s dilemma C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) (unique equilibrium payoff for the one-shot game: ( 8, 8)). Standard case of perfect monitoring: Y i = A and y i,t = a t for each player i. Trivial observation for player i: Y i is a singleton (play in the dark) Public signals: all players observe the same signal (Fudenberg, Levine, Maskin 94) Observable payoffs: each player can deduce his payoff from his own action and signal (Tomala, 99)

15 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Illustration: The prisoner s dilemma C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) (unique equilibrium payoff for the one-shot game: ( 8, 8)). Standard case of perfect monitoring: Y i = A and y i,t = a t for each player i. Trivial observation for player i: Y i is a singleton (play in the dark) Public signals: all players observe the same signal (Fudenberg, Levine, Maskin 94) Observable payoffs: each player can deduce his payoff from his own action and signal (Tomala, 99)

16 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Illustration: The prisoner s dilemma C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) (unique equilibrium payoff for the one-shot game: ( 8, 8)). Standard case of perfect monitoring: Y i = A and y i,t = a t for each player i. Trivial observation for player i: Y i is a singleton (play in the dark) Public signals: all players observe the same signal (Fudenberg, Levine, Maskin 94) Observable payoffs: each player can deduce his payoff from his own action and signal (Tomala, 99)

17 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Strategies and payoffs A strategy for player i: σ i = (σ i,t ) t 1 where σ i,t : (A i Y i ) t 1 (A i ) gives the lottery played at stage t depending on his current information. A strategy profile σ induces a probability over plays. Average T-payoff for player i: γ i,t (σ) = E σ [ 1 T T g i (a t )] t=1 Denote γ T = (γ i,t ) i the vector payoff function.

18 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Equilibrium concepts A Nash equilibrium for G T is sa strategy profile σ such that for every player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t (σ). A Uniform Equilibrium for G is a strategy profile σ such that 1 For each player i, γ i,t(σ) converges to some limit γ i(σ) as T +. 2 For all ε > 0, σ is an ε-ne for any sufficiently long finitely repeated game i.e. there exists T ε N such that for all T T ε, for each player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t(σ) + ε. Denote E T (resp. E ) the set of NE payoffs for G T (resp. UE payoffs). Remarks: - E T is a non empty set (apply Nash/Glicksberg: compact convex strategy sets, multi-linear continuous payoffs) - E 1 E T E

19 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Equilibrium concepts A Nash equilibrium for G T is sa strategy profile σ such that for every player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t (σ). A Uniform Equilibrium for G is a strategy profile σ such that 1 For each player i, γ i,t(σ) converges to some limit γ i(σ) as T +. 2 For all ε > 0, σ is an ε-ne for any sufficiently long finitely repeated game i.e. there exists T ε N such that for all T T ε, for each player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t(σ) + ε. Denote E T (resp. E ) the set of NE payoffs for G T (resp. UE payoffs). Remarks: - E T is a non empty set (apply Nash/Glicksberg: compact convex strategy sets, multi-linear continuous payoffs) - E 1 E T E

20 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Equilibrium concepts A Nash equilibrium for G T is sa strategy profile σ such that for every player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t (σ). A Uniform Equilibrium for G is a strategy profile σ such that 1 For each player i, γ i,t(σ) converges to some limit γ i(σ) as T +. 2 For all ε > 0, σ is an ε-ne for any sufficiently long finitely repeated game i.e. there exists T ε N such that for all T T ε, for each player i and strategy σ i for player i, γ i,t(σ i, σ i) γ i,t(σ) + ε. Denote E T (resp. E ) the set of NE payoffs for G T (resp. UE payoffs). Remarks: - E T is a non empty set (apply Nash/Glicksberg: compact convex strategy sets, multi-linear continuous payoffs) - E 1 E T E

21 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Example: the prisoner s dilemma with perfect monitoring C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) ( 1, 1) is an equilibrium payoff of the infinitely repeated game: Play C i as long as your opponent does, otherwise play D i forever. The unique equilibrium payoff of the finitely repeated game is ( 8, 8): Play the unique Nash equilibrium of the stage game (D 1, D 2 ) at every stage.

22 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Example: the prisoner s dilemma with perfect monitoring C 2 D 2 C 1 ( 1, 1) ( 10, 0) D 1 (0, 10) ( 8, 8) ( 1, 1) is an equilibrium payoff of the infinitely repeated game: Play C i as long as your opponent does, otherwise play D i forever. The unique equilibrium payoff of the finitely repeated game is ( 8, 8): Play the unique Nash equilibrium of the stage game (D 1, D 2 ) at every stage.

23 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Define two sets. Feasible payoffs: conv g(a) Min max level for player i: v i = The standard Folk theorem min max p i j i (A j) p i (A i) g i (p i, p i ) Individually rational Payoffs: IR = {(u i ) i R n : i, u i v i } Standard Folk theorem: The equilibrium payoffs for the infinitely repeated game are the payoffs which are both feasible (that can be achieved) and individually rational (every player gets at least his min max level). E = conv g(a) IR

24 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Define two sets. Feasible payoffs: conv g(a) Min max level for player i: v i = The standard Folk theorem min max p i j i (A j) p i (A i) g i (p i, p i ) Individually rational Payoffs: IR = {(u i ) i R n : i, u i v i } Standard Folk theorem: The equilibrium payoffs for the infinitely repeated game are the payoffs which are both feasible (that can be achieved) and individually rational (every player gets at least his min max level). E = conv g(a) IR

25 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Define two sets. Feasible payoffs: conv g(a) Min max level for player i: v i = The standard Folk theorem min max p i j i (A j) p i (A i) g i (p i, p i ) Individually rational Payoffs: IR = {(u i ) i R n : i, u i v i } Standard Folk theorem: The equilibrium payoffs for the infinitely repeated game are the payoffs which are both feasible (that can be achieved) and individually rational (every player gets at least his min max level). E = conv g(a) IR

26 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Folk theorem for SPE A subgame perfect equilibrium (SPE) is strategy profile σ such that σ induces an equilibrium after every finite sequence of actions. Denote E T (resp. E ) the set of SPE payoffs for G T (resp. G ). Aumann, Shapley (1976), Rubinstein (1977) Proof: E = conv g(a) IR Objective = Define strategy profile such that deviations from main path are deterred and punishers have incentive to punish any deviator from main path. Solution = Punish deviator for a long but finite number of stages then return to main path.

27 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Folk theorem for SPE A subgame perfect equilibrium (SPE) is strategy profile σ such that σ induces an equilibrium after every finite sequence of actions. Denote E T (resp. E ) the set of SPE payoffs for G T (resp. G ). Aumann, Shapley (1976), Rubinstein (1977) Proof: E = conv g(a) IR Objective = Define strategy profile such that deviations from main path are deterred and punishers have incentive to punish any deviator from main path. Solution = Punish deviator for a long but finite number of stages then return to main path.

28 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Finitely Repeated Game (1) Benoit and Krishna (1987) If for each player i, there exist e i E 1 such that e i (i) > v i in the Hausdorff distance. lim E T = conv g(a) IR T + Proof: Equilibrium Strategy = Main Path + Punishment phase The main path is followed by a sequence of Nash equilibria of the stage game: players get e 1 for R 1 stages then e 2 for R 2 stages etc. If player i deviates from the main path he receives v i from the day after the deviation on.

29 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Finitely Repeated Game (1) Benoit and Krishna (1987) If for each player i, there exist e i E 1 such that e i (i) > v i in the Hausdorff distance. lim E T = conv g(a) IR T + Proof: Equilibrium Strategy = Main Path + Punishment phase The main path is followed by a sequence of Nash equilibria of the stage game: players get e 1 for R 1 stages then e 2 for R 2 stages etc. If player i deviates from the main path he receives v i from the day after the deviation on.

30 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Finitely Repeated Game (2) Conditions C1 and C2: 1 For every player i, there exist e i, f i E 1 such that e i (i) > f i (i) 2 dim conv g(a) = n Benoit and Krishna (1985) Under conditions C1 and C2, in the Hausdorff distance. lim E T = conv g(a) IR T + Proof: Equilibrium Strategy = Main Path + Punishment + Reward Remark: Benoit and Krishna (1985) consider pure strategies. Gossner (1995) extends this result to mixed strategies.

31 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Finitely Repeated Game (2) Conditions C1 and C2: 1 For every player i, there exist e i, f i E 1 such that e i (i) > f i (i) 2 dim conv g(a) = n Benoit and Krishna (1985) Under conditions C1 and C2, in the Hausdorff distance. lim E T = conv g(a) IR T + Proof: Equilibrium Strategy = Main Path + Punishment + Reward Remark: Benoit and Krishna (1985) consider pure strategies. Gossner (1995) extends this result to mixed strategies.

32 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring The Finitely Repeated Game (2) Conditions C1 and C2: 1 For every player i, there exist e i, f i E 1 such that e i (i) > f i (i) 2 dim conv g(a) = n Benoit and Krishna (1985) Under conditions C1 and C2, in the Hausdorff distance. lim E T = conv g(a) IR T + Proof: Equilibrium Strategy = Main Path + Punishment + Reward Remark: Benoit and Krishna (1985) consider pure strategies. Gossner (1995) extends this result to mixed strategies.

33 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

34 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

35 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

36 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

37 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

38 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

39 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Signals do matter. Example: The prisoner s dilemma in the dark C 2 D 2 C 1 ( 1, 1) ( 10, 0) E = {( 8, 8)} D 1 (0, 10) ( 8, 8) With imperfect monitoring, there might be in general: 1 Undetectable deviations (Lehrer 1990, 1992) 2 A deviation which is detected by some players, but not the others (Renault, Tomala 1998) 3 A deviation which is detected but the identity of the deviator is unknown (Tomala 1998, Renault et al 05 and 08) 4 Computing the punishment levels may be difficult (Gossner, Tomala 07)

40 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Undetectable deviations Example: Two-player game with public signals Payoffs y 1 y 2 y 3 x 1 (2, 2) (5, 1) (7, 0) x 2 (1, 5) (4, 4) (6, 3) x 3 (0, 7) (3, 6) (5, 5) Signals y 1 y 2 y 3 x 1 a c c x 2 b d d x 3 b d d Player 1 chooses the row and player 2, the column. E.g.: if player 1 chooses the row x 1 and player the column y 2 then player 1 receives a payoff equal to 5 and player 2, a payoff equal to 1. The signal c is publicly announced. Remark: The action x 3 for player 1 is strictly dominated. Player 2 cannot distinguish between the actions x 2 and x 3. Player 2 cannot force player 1 to play the action x 3. Therefore (5, 5) is not an equilibrium payoff but (5, 5) is both feasible and individually rational.

41 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Undetectable deviations Example: Two-player game with public signals Payoffs y 1 y 2 y 3 x 1 (2, 2) (5, 1) (7, 0) x 2 (1, 5) (4, 4) (6, 3) x 3 (0, 7) (3, 6) (5, 5) Signals y 1 y 2 y 3 x 1 a c c x 2 b d d x 3 b d d Player 1 chooses the row and player 2, the column. E.g.: if player 1 chooses the row x 1 and player the column y 2 then player 1 receives a payoff equal to 5 and player 2, a payoff equal to 1. The signal c is publicly announced. Remark: The action x 3 for player 1 is strictly dominated. Player 2 cannot distinguish between the actions x 2 and x 3. Player 2 cannot force player 1 to play the action x 3. Therefore (5, 5) is not an equilibrium payoff but (5, 5) is both feasible and individually rational.

42 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring A deviation which is detected by some players, but not the others E.g.: Proximity games (Renault, Tomala 1998) Players are the vertices of a network and can observe the actions chosen by their closest neighbors but receive no signal about the actions played by the other players. Each player can only observe deviations from part of a strict subset of players. A deviation which is detected, but the identity of the deviator is unknown E.g.: Minority games (Renault et al 05 and 08) An odd number of players have to vote for one of two alternatives A or B. Each player who votes for the least chosen alternative receives a reward of one euro. Between the stages, only the current majority alternative is publicly announced. Games with public signals and observable payoffs.

43 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring A deviation which is detected by some players, but not the others E.g.: Proximity games (Renault, Tomala 1998) Players are the vertices of a network and can observe the actions chosen by their closest neighbors but receive no signal about the actions played by the other players. Each player can only observe deviations from part of a strict subset of players. A deviation which is detected, but the identity of the deviator is unknown E.g.: Minority games (Renault et al 05 and 08) An odd number of players have to vote for one of two alternatives A or B. Each player who votes for the least chosen alternative receives a reward of one euro. Between the stages, only the current majority alternative is publicly announced. Games with public signals and observable payoffs.

44 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Computing the punishment levels may be difficult Example: Three-player game L R Payoffs for P3: T 1 0 B 0 0 W L R T 0 0 B 0 1 E Perfect monitoring: -1/4 (coincides with min max level) P1 and P2 see each other but P3 can only see P2 (Gossner, Tomala 07) P1 and P2 can force P3 s payoff below -3/8: At odd stages, P1 and P2 both play (1/2, 1/2). At even stages, play (T, L) if P1 s previous action was T, otherwise play (B, R). Therefore, P3 s payoff is lower than 1/2 at even stages and 1/4 at odd stages. Punishment level for P3: 0.401

45 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Computing the punishment levels may be difficult Example: Three-player game L R Payoffs for P3: T 1 0 B 0 0 W L R T 0 0 B 0 1 E Perfect monitoring: -1/4 (coincides with min max level) P1 and P2 see each other but P3 can only see P2 (Gossner, Tomala 07) P1 and P2 can force P3 s payoff below -3/8: At odd stages, P1 and P2 both play (1/2, 1/2). At even stages, play (T, L) if P1 s previous action was T, otherwise play (B, R). Therefore, P3 s payoff is lower than 1/2 at even stages and 1/4 at odd stages. Punishment level for P3: 0.401

46 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Computing the punishment levels may be difficult Example: Three-player game L R Payoffs for P3: T 1 0 B 0 0 W L R T 0 0 B 0 1 E Perfect monitoring: -1/4 (coincides with min max level) P1 and P2 see each other but P3 can only see P2 (Gossner, Tomala 07) P1 and P2 can force P3 s payoff below -3/8: At odd stages, P1 and P2 both play (1/2, 1/2). At even stages, play (T, L) if P1 s previous action was T, otherwise play (B, R). Therefore, P3 s payoff is lower than 1/2 at even stages and 1/4 at odd stages. Punishment level for P3: 0.401

47 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Semi-standard signals: If the players choose the action profile (a j ) j then the signal (a j ) j is publicly announced (a j stands for the cell element that contains a j ). Remark: ā j depends on a j, only. If a deviation is detected by a player then it is detected by all the players. If a deviation is detected, the identity of the deviator is known. If player i plays a i such that a i a i, everyone knows that player i is the deviator. Punishment cannot be more severe than the min max level. Lehrer (1990) characterizes the set of equilibrium payoffs of the infinitely repeated game: It is the set of feasible payoff vectors that are robust to undetectable deviations and individually rational.

48 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring Semi-standard signals: If the players choose the action profile (a j ) j then the signal (a j ) j is publicly announced (a j stands for the cell element that contains a j ). Remark: ā j depends on a j, only. If a deviation is detected by a player then it is detected by all the players. If a deviation is detected, the identity of the deviator is known. If player i plays a i such that a i a i, everyone knows that player i is the deviator. Punishment cannot be more severe than the min max level. Lehrer (1990) characterizes the set of equilibrium payoffs of the infinitely repeated game: It is the set of feasible payoff vectors that are robust to undetectable deviations and individually rational.

49 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring This talk: We characterize the set of equilibrium payoffs of the finitely repeated game as T + (in the Hausdorff distance). Difficulties: Undetectable deviations The finite duration of the game: the backward induction effects imply tight constraints on the equilibrium strategy. Refinement of equilibrium (pure strategies): Subgame perfect equilibrium We define the semi-standard min max level for each player, which represents the punishment level which is compatible with the constraint of robustness to undetectable deviations outside the equilibrium path.

50 The model of repeated game with imperfect monitoring Aspects of Imperfect Monitoring This talk: We characterize the set of equilibrium payoffs of the finitely repeated game as T + (in the Hausdorff distance). Difficulties: Undetectable deviations The finite duration of the game: the backward induction effects imply tight constraints on the equilibrium strategy. Refinement of equilibrium (pure strategies): Subgame perfect equilibrium We define the semi-standard min max level for each player, which represents the punishment level which is compatible with the constraint of robustness to undetectable deviations outside the equilibrium path.

51 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Economic applications of imperfect public monitoring Industrial competition à la Cournot Two firms produce the same good. The price of a unit of good depends on the quantities produced by the firms. The signal here is the price, which is publicly observed but the firms cannot observe the quantity produced by its competitor. Principal/Agent relationships (e.g.: Insurer (principal) / Insured (agent)) The agent s action determines an outcome which can be observed by the principal. But the principal cannot observe the action taken by the agent. Strategic market games Players trade assets and goods over time and propose at each period, bids and offers, which determines the vector price. The signal here, is the vector price which is publicly observed by the players. But the players cannot observe the other players holdings.

52 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems The model Players: N = {1,..., n} Actions: X 1,..., X n Stage payoff function: g i : n i=1 X i R Partitions: X 1,..., X n ( x, y X i, x i y x = y) Monitoring structure: X = n i=1 X i is the set of signals and l : n i=1 X i X the signalling function such that for all (x i ) i n i=1 X i, l((x i ) i ) = ( x i ) i where x i denotes the element of X i that contains x i. G T = T-Fold Repeated Game ( ) 1 T Payoffs: T t=1 g i(x t ) ((x t ) 1 t T = action profile) i N

53 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems We consider pure strategies. Strategies Private Histories: H i,t = (X i X) t 1 (H i,1 singleton) Private Strategies: σ i = (σ i,t ) 1 t T où σ i,t : T t=1 H i,t X i Public Histories: H t = X t 1 (H 1 singleton) Public Strategies: σ i = (σ i,t ) 1 t T où σ i,t : T t=1 H t X i Tomala (1998) For each private strategy σ i for player i, there exists a public strategy σ i equivalent to σ i i.e. such that for each strategy profile σ i of the other players and for each stage t, x t (σ i, σ i ) = x t ( σ i, σ i ). Note: We identify each strategy with the public equivalent strategy.

54 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems We consider pure strategies. Strategies Private Histories: H i,t = (X i X) t 1 (H i,1 singleton) Private Strategies: σ i = (σ i,t ) 1 t T où σ i,t : T t=1 H i,t X i Public Histories: H t = X t 1 (H 1 singleton) Public Strategies: σ i = (σ i,t ) 1 t T où σ i,t : T t=1 H t X i Tomala (1998) For each private strategy σ i for player i, there exists a public strategy σ i equivalent to σ i i.e. such that for each strategy profile σ i of the other players and for each stage t, x t (σ i, σ i ) = x t ( σ i, σ i ). Note: We identify each strategy with the public equivalent strategy.

55 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Equilibrium notions (σ i ) i is a Nash Equilibrium (NE) for G T if for each player i, and each strategy σ i for player i, γ i,t(σ i, σ i) γ i,t (σ). Denote E T the set of NE payoffs for G T. A Subgame Perfect Equilibrium (SPE) is a NE which induces a NE after each public history. Denote E T the set of SPE payoffs for G T.

56 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Feasible payoffs robust to undetectable deviations Lehrer (1989) defines for each player i, the set D i of action profiles (x i, x i ) such that given x i, player i cannot profitably deviate from x i without being detected. Denote D = i D i. Definition (Lehrer (1990)) (x i, x i ) D i x i x i, g i (x i, x i ) g i (x i, x i ) The set of feasible payoffs which are robust to undetectable deviations is the convex hull of g(d), where g(d) = {g(x) : x D}. Remarks: E 1 g(d) We assume that G 1 admits a Nash equilibrium in pure strategies. In particular, g(d).

57 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Compute D for particular semi-standard monitoring structures Perfect monitoring: x i i x i x i = x i For each player i, D i = X and D = X. Trivial monitoring: (x i, x i) X i X i, x i = x i D i is the set of joint action (x i, x i ) such that x i is a best response to x i within X i. Therefore D = i D i is the set of Nash equilibria of G 1. y 1 y 2 y 3 y 4 x 1 (3, 4) (1, 3) (3, 2) (1, 1) Example: x 2 ( 1, 1) (0, 0) (4, 2) (3, 0) x 3 (2, 1) ( 1, 2) (5, 0) (1, 1) x 4 ( 1, 1) (4, 0) ( 1, 1) (0, 0) where X 1 = {{x 1, x 2 }, {x 3, x 4 }} and X 2 = {{y 1, y 2 }, {y 3, y 4 }} D = {(x 1, y 1 ), (x 2, y 3 ), (x 3, y 3 )}

58 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Compute D for particular semi-standard monitoring structures Perfect monitoring: x i i x i x i = x i For each player i, D i = X and D = X. Trivial monitoring: (x i, x i) X i X i, x i = x i D i is the set of joint action (x i, x i ) such that x i is a best response to x i within X i. Therefore D = i D i is the set of Nash equilibria of G 1. y 1 y 2 y 3 y 4 x 1 (3, 4) (1, 3) (3, 2) (1, 1) Example: x 2 ( 1, 1) (0, 0) (4, 2) (3, 0) x 3 (2, 1) ( 1, 2) (5, 0) (1, 1) x 4 ( 1, 1) (4, 0) ( 1, 1) (0, 0) where X 1 = {{x 1, x 2 }, {x 3, x 4 }} and X 2 = {{y 1, y 2 }, {y 3, y 4 }} D = {(x 1, y 1 ), (x 2, y 3 ), (x 3, y 3 )}

59 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Compute D for particular semi-standard monitoring structures Perfect monitoring: x i i x i x i = x i For each player i, D i = X and D = X. Trivial monitoring: (x i, x i) X i X i, x i = x i D i is the set of joint action (x i, x i ) such that x i is a best response to x i within X i. Therefore D = i D i is the set of Nash equilibria of G 1. y 1 y 2 y 3 y 4 x 1 (3, 4) (1, 3) (3, 2) (1, 1) Example: x 2 ( 1, 1) (0, 0) (4, 2) (3, 0) x 3 (2, 1) ( 1, 2) (5, 0) (1, 1) x 4 ( 1, 1) (4, 0) ( 1, 1) (0, 0) where X 1 = {{x 1, x 2 }, {x 3, x 4 }} and X 2 = {{y 1, y 2 }, {y 3, y 4 }} D = {(x 1, y 1 ), (x 2, y 3 ), (x 3, y 3 )}

60 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Punishment levels Standard min max level for player i: v i = Semi-Standard min max level for player i: v i = min x i D i min max g i (x i, x i ) x i X i x i X i max g i (x i, x i ) x i X i where D i denotes the projection of D on X i. Define IR = {u R n u i v i, i N} the set of individually rational payoffs with respect to the standard min max level. Define IR = {u R n u i v i, i N} the set of individually rational payoffs with respect to the semi-standard min max level.

61 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Punishment levels Standard min max level for player i: v i = Semi-Standard min max level for player i: v i = min x i D i min max g i (x i, x i ) x i X i x i X i max g i (x i, x i ) x i X i where D i denotes the projection of D on X i. Define IR = {u R n u i v i, i N} the set of individually rational payoffs with respect to the standard min max level. Define IR = {u R n u i v i, i N} the set of individually rational payoffs with respect to the semi-standard min max level.

62 Example: 2-Player Game Actions and payoffs Partitions: X 1 = The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems a 2 b 2 c 2 a 1 3, 4 6, 0 2, 1 b 1 1, 2 5, 1 0, 1 c 1 2, 4 } 3, 0 3, 3 and X 2 = { {a 1, b 1 }, {c 1 } { {a 2, b 2 }, {c 2 } Action profiles Robust to unilateral Undetectable Profitable Deviations } } D = {a 1, c 1 {a 2, c 2 Min Max of Player 2 v 2 = min x 1 b 1 max x 2 X 2 g 2 (x 1, x 2 ) = 4 > v 2 = 2 }

63 Example: 2-Player Game Actions and payoffs Partitions: X 1 = The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems a 2 b 2 c 2 a 1 3, 4 6, 0 2, 1 b 1 1, 2 5, 1 0, 1 c 1 2, 4 } 3, 0 3, 3 and X 2 = { {a 1, b 1 }, {c 1 } { {a 2, b 2 }, {c 2 } Action profiles Robust to unilateral Undetectable Profitable Deviations } } D = {a 1, c 1 {a 2, c 2 Min Max of Player 2 v 2 = min x 1 b 1 max x 2 X 2 g 2 (x 1, x 2 ) = 4 > v 2 = 2 }

64 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Necessary Condition on Equilibrium Payoffs: Feasibility Lemma 1 1 If σ is a NE of G T then at each stage t, x t (σ) D. 2 If σ is a SPE of G T then after each public history h, σ(h) D. Corollary E T E T conv(g(d))

65 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Necessary Condition on Equilibrium Payoffs: Individual Rationality Lemma 2 If σ is a NE of G T then γ T (σ) IR. If σ is a SPE of G T then γ T (σ) IR. From Lemmas 1 and 2, Corollary E T conv(g(d)) IR E T conv(g(d)) IR

66 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Limit set of NE payoffs Folk theorem 1 If for every player i, there exists e i E 1 such that e i (i) > v i then lim E T = E T + in the Hausdorff distance, where E = cl (conv(g(d)) IR). Proof : Adapt Benoit and Krishna (1987) proof to semi-standard signals.

67 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Limit set of SPE payoffs Conditions C1 and C2 (Benoit and Krishna (1985)): 1 For every player i, there exist e i, f i E 1 such that e i (i) > f i (i) 2 dim conv(g(d)) = n Folk Theorem 2 Under conditions C1 and C2, lim E T = E T + in the Hausdorff distance, where E = cl (conv(g(d)) IR ).

68 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Standard vs. Semi-Standard Signals Under standard monitoring: D = X which implies that D i = X i and v i = v i and we retrieve the content of the standard folk theorem (Benoit, Krishna (1987)) for finitely repeated games. Remark: Under conditions C1 et C2, when signals are standard, lim T E T = lim T E T. when signals are semi-standard, lim T E T lim T E T.

69 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Standard vs. Semi-Standard Signals Under standard monitoring: D = X which implies that D i = X i and v i = v i and we retrieve the content of the standard folk theorem (Benoit, Krishna (1987)) for finitely repeated games. Remark: Under conditions C1 et C2, when signals are standard, lim T E T = lim T E T. when signals are semi-standard, lim T E T lim T E T.

70 Elements of the proof The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems We adapt Gossner (1995) method to semi-standard signals. We first study finitely repeated games G T (W) with terminal payoffs where payoffs are given by, for all strategy profile σ, θ i,t (σ) = 1 T T t=1 g i (x t (σ)) + 1 T Term i((x t (σ) 1 t T ) } {{ } =Reward {0,W} Denote E T (W) = Set of SPE payoffs of G T(W) Lemma ε > 0, u int(e ), W 0 > 0, T 0 > 0, W W 0, T T 0, w E T (W), w u ε

71 SPE for G T (W) The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Target Payoff: u int(e ). W.l.o.g. suppose u = n+1 α i i=1 α g(q i) where (q 1,...q n+1 ) D n+1, (α i ) n+1 i=1 are positive integers and α = n+1 i=1 α i. Cyclic Play: Repeat (q 1,..., q } {{ } 1,..., q n+1,..., q n+1 ) cyclically } {{ } α 1 times α n+1 times Define σ = Main Path + Punishing Phase + Reward Phase Main path: Play q m at date t if t = m mod(α) Punishment phase: If player i deviates from Main path then play x (i) D such that v i = g i (x (i)) for P stages then return to Main path Reward phase: If player j punished player i then he receives W as terminal payoff otherwise 0.

72 SPE for G T (W) The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Target Payoff: u int(e ). W.l.o.g. suppose u = n+1 α i i=1 α g(q i) where (q 1,...q n+1 ) D n+1, (α i ) n+1 i=1 are positive integers and α = n+1 i=1 α i. Cyclic Play: Repeat (q 1,..., q } {{ } 1,..., q n+1,..., q n+1 ) cyclically } {{ } α 1 times α n+1 times Define σ = Main Path + Punishing Phase + Reward Phase Main path: Play q m at date t if t = m mod(α) Punishment phase: If player i deviates from Main path then play x (i) D such that v i = g i (x (i)) for P stages then return to Main path Reward phase: If player j punished player i then he receives W as terminal payoff otherwise 0.

73 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Link between E T and E T (W): Lemma Under conditions C1 and C2, there exits T 1 > 0 s.t. dim (conv(e T 1 )) = n. Since for all integer k, k.t 1 E T 1 kt 1 E kt 1 and from the previous lemma E T 1 contains an open ball, there exists for all terminal payoff function term taking its values in {0, W} n, a duration T 2 = kt 1 such that for all public history h, term(h) can be sustained by a SPE of G T2. Use last stages of G T to simulate terminal payoff vectors.

74 The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Link between E T and E T (W): Lemma Under conditions C1 and C2, there exits T 1 > 0 s.t. dim (conv(e T 1 )) = n. Since for all integer k, k.t 1 E T 1 kt 1 E kt 1 and from the previous lemma E T 1 contains an open ball, there exists for all terminal payoff function term taking its values in {0, W} n, a duration T 2 = kt 1 such that for all public history h, term(h) can be sustained by a SPE of G T2. Use last stages of G T to simulate terminal payoff vectors.

75 Extensions Repeated Games with Imperfect Monitoring The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Discounted repeated games Folk Theorem 3 If dim conv(g(d)) = n then the set of SPE payoffs of the disccounted repeated game with discount factor λ (0, 1] converges to E (in the Hausdorff distance) as λ 0. Proof: Adapt Fudenberg Maskin (1986) to semi-standard signals Mixed actions and observable distribution of signals Our results adapt to this setup.

76 Extensions Repeated Games with Imperfect Monitoring The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Discounted repeated games Folk Theorem 3 If dim conv(g(d)) = n then the set of SPE payoffs of the disccounted repeated game with discount factor λ (0, 1] converges to E (in the Hausdorff distance) as λ 0. Proof: Adapt Fudenberg Maskin (1986) to semi-standard signals Mixed actions and observable distribution of signals Our results adapt to this setup.

77 Mixed strategies: The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Observable distribution of signals Finite sets of pure actions A i, partitions Ā i. Mixed actions X i = (A i ), partition X i such that for all x, x X i, where x i (ā i ) = a i ā i x i (a i ). x = x ā i, x i (ā i ) = x i(ā i ) Denote D m the set of mixed action profiles which are robust to undetectable deviations. Denote IR m the set of payoff vectors which are IR w.r.t. the v i (computed in mixed strategies). Denote E m the closure of conv(g(d m )) IR m. Hausdorff-convergence of E T to the set E m is obtained under conditions C1 and C2.

78 Mixed strategies: The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Observable distribution of signals Finite sets of pure actions A i, partitions Ā i. Mixed actions X i = (A i ), partition X i such that for all x, x X i, where x i (ā i ) = a i ā i x i (a i ). x = x ā i, x i (ā i ) = x i(ā i ) Denote D m the set of mixed action profiles which are robust to undetectable deviations. Denote IR m the set of payoff vectors which are IR w.r.t. the v i (computed in mixed strategies). Denote E m the closure of conv(g(d m )) IR m. Hausdorff-convergence of E T to the set E m is obtained under conditions C1 and C2.

79 Open problems The model Equilibrium notions Feasible payoffs robust to undetectable deviations Punishment levels Necessary Conditions on Equilibrium Payoffs Characterization Elements of the proof Extensions Open problems Mixed strategies and non observable distribution of signals How to detect deviations from the main path or deviations from the punishing phase? Gossner (1995) (standard repeated game) defines statistical test functions: After a punishing phase h (sequence of action profiles), test j (h) = 1 if player j did punish the deviator, and test j (h) = 0 if not. Remark: The (empirical) frequency of actions can be controlled thanks to the assumption of perfect observability of past played actions. Under imperfect monitoring, only empirical distributions of signals can be controlled but not the frequencies of actions within the classes. This can lead to payoffs far away the target payoff...

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games 6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses

More information

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction 6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R

More information

Théorie de la décision et théorie des jeux Stefano Moretti

Théorie de la décision et théorie des jeux Stefano Moretti héorie de la décision et théorie des jeux Stefano Moretti UMR 7243 CNRS Laboratoire d'analyse et Modélisation de Systèmes pour l'aide à la décision (LAMSADE) Université Paris-Dauphine email: Stefano.MOREI@dauphine.fr

More information

Lecture V: Mixed Strategies

Lecture V: Mixed Strategies Lecture V: Mixed Strategies Markus M. Möbius February 26, 2008 Osborne, chapter 4 Gibbons, sections 1.3-1.3.A 1 The Advantage of Mixed Strategies Consider the following Rock-Paper-Scissors game: Note that

More information

When is Reputation Bad? 1

When is Reputation Bad? 1 When is Reputation Bad? 1 Jeffrey Ely Drew Fudenberg David K Levine 2 First Version: April 22, 2002 This Version: November 20, 2005 Abstract: In traditional reputation theory, the ability to build a reputation

More information

Competition and Regulation. Lecture 2: Background on imperfect competition

Competition and Regulation. Lecture 2: Background on imperfect competition Competition and Regulation Lecture 2: Background on imperfect competition Monopoly A monopolist maximizes its profits, choosing simultaneously quantity and prices, taking the Demand as a contraint; The

More information

Repeated Games and Reputations

Repeated Games and Reputations 1 / 1 Repeated Games and Reputations George J Mailath UPenn June 26, 2014 9th Tinbergen Institute Conference: 70 Years of Theory of Games and Economic Behaviour The slides and associated bibliography are

More information

Infinitely Repeated Games with Discounting Ù

Infinitely Repeated Games with Discounting Ù Infinitely Repeated Games with Discounting Page 1 Infinitely Repeated Games with Discounting Ù Introduction 1 Discounting the future 2 Interpreting the discount factor 3 The average discounted payoff 4

More information

ALMOST COMMON PRIORS 1. INTRODUCTION

ALMOST COMMON PRIORS 1. INTRODUCTION ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type

More information

An Example of a Repeated Partnership Game with Discounting and with Uniformly Inefficient Equilibria

An Example of a Repeated Partnership Game with Discounting and with Uniformly Inefficient Equilibria An Example of a Repeated Partnership Game with Discounting and with Uniformly Inefficient Equilibria Roy Radner; Roger Myerson; Eric Maskin The Review of Economic Studies, Vol. 53, No. 1. (Jan., 1986),

More information

Games Manipulators Play

Games Manipulators Play Games Manipulators Play Umberto Grandi Department of Mathematics University of Padova 23 January 2014 [Joint work with Edith Elkind, Francesca Rossi and Arkadii Slinko] Gibbard-Satterthwaite Theorem All

More information

Equilibrium computation: Part 1

Equilibrium computation: Part 1 Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

Game Theory: Supermodular Games 1

Game Theory: Supermodular Games 1 Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

When is Reputation Bad? The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.

When is Reputation Bad? The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. When is Reputation Bad? he Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published Version Accessed Citable Link erms

More information

Investing without credible inter-period regulations:

Investing without credible inter-period regulations: Investing without credible inter-period regulations: A bargaining approach with application to investments in natural resources jell Bjørn Nordal ecember 999 Permanent address and affiliation: Post doctor

More information

Persuasion by Cheap Talk - Online Appendix

Persuasion by Cheap Talk - Online Appendix Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case

More information

AN INTRODUCTION TO GAME THEORY

AN INTRODUCTION TO GAME THEORY AN INTRODUCTION TO GAME THEORY 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. MARTIN J. OSBORNE University of Toronto

More information

Tiers, Preference Similarity, and the Limits on Stable Partners

Tiers, Preference Similarity, and the Limits on Stable Partners Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider

More information

Non-Exclusive Competition in the Market for Lemons

Non-Exclusive Competition in the Market for Lemons Non-Exclusive Competition in the Market for Lemons Andrea Attar Thomas Mariotti François Salanié October 2007 Abstract In order to check the impact of the exclusivity regime on equilibrium allocations,

More information

How to Solve Strategic Games? Dominant Strategies

How to Solve Strategic Games? Dominant Strategies How to Solve Strategic Games? There are three main concepts to solve strategic games: 1. Dominant Strategies & Dominant Strategy Equilibrium 2. Dominated Strategies & Iterative Elimination of Dominated

More information

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where. Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S

More information

Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency

Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine

More information

Backward Induction and Subgame Perfection

Backward Induction and Subgame Perfection Backward Induction and Subgame Perfection In extensive-form games, we can have a Nash equilibrium profile of strategies where player 2 s strategy is a best response to player 1 s strategy, but where she

More information

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses

More information

SUSTAINABLE PLANS AND DEBT

SUSTAINABLE PLANS AND DEBT 1 Federal Reserve Bank of Minneapolis Research Department (JV SR125) ONE GRAPH SUSTAINABLE PLANS AND DEBT V. V. Chari Patrick J. Kehoe* Federal Reserve Bank of Minneapolis Federal Reserve Bank of Minneapolis

More information

Working Paper An exact non-cooperative support for the sequential Raiffa solution. Working papers // Institute of Mathematical Economics, No.

Working Paper An exact non-cooperative support for the sequential Raiffa solution. Working papers // Institute of Mathematical Economics, No. econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Trockel,

More information

Game Theory and Algorithms Lecture 10: Extensive Games: Critiques and Extensions

Game Theory and Algorithms Lecture 10: Extensive Games: Critiques and Extensions Game Theory and Algorithms Lecture 0: Extensive Games: Critiques and Extensions March 3, 0 Summary: We discuss a game called the centipede game, a simple extensive game where the prediction made by backwards

More information

On the Existence of Nash Equilibrium in General Imperfectly Competitive Insurance Markets with Asymmetric Information

On the Existence of Nash Equilibrium in General Imperfectly Competitive Insurance Markets with Asymmetric Information analysing existence in general insurance environments that go beyond the canonical insurance paradigm. More recently, theoretical and empirical work has attempted to identify selection in insurance markets

More information

Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling

Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling Daron Acemoglu MIT November 3, 2011. Daron Acemoglu (MIT) Education, Selection, and Signaling November 3, 2011. 1 / 31 Introduction

More information

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part

More information

The Ascending Auction Paradox

The Ascending Auction Paradox The Ascending Auction Paradox Lawrence M. Ausubel and Jesse A. Schwartz* University of Maryland July 05, 1999 Abstract We examine uniform-price, multiple-unit auctions that are dynamic rather than sealedbid,

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Game Theory in Wireless Networks: A Tutorial

Game Theory in Wireless Networks: A Tutorial 1 Game heory in Wireless Networks: A utorial Mark Felegyhazi, Jean-Pierre Hubaux EPFL Switzerland email: {mark.felegyhazi, jean-pierre.hubaux}@epfl.ch EPFL echnical report: LCA-REPOR-2006-002, submitted

More information

Customer Service Quality and Incomplete Information in Mobile Telecommunications: A Game Theoretical Approach to Consumer Protection.

Customer Service Quality and Incomplete Information in Mobile Telecommunications: A Game Theoretical Approach to Consumer Protection. Customer Service Quality and Incomplete Information in Mobile Telecommunications: A Game Theoretical Approach to Consumer Protection.* Rafael López Zorzano, Universidad Complutense, Spain. Teodosio Pérez-Amaral,

More information

CPC/CPA Hybrid Bidding in a Second Price Auction

CPC/CPA Hybrid Bidding in a Second Price Auction CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper

More information

Universidad Carlos III de Madrid Game Theory Problem Set - Dynamic Games

Universidad Carlos III de Madrid Game Theory Problem Set - Dynamic Games Universidad Carlos III de Madrid Game Theory Problem Set - Dynamic Games Session Problems 1, 2, 3, 4, 5, 6 1 (no SPNE) 2 7, 8, 9, 10, 11 3 12, 13, 14, 15, 16 4 17, 18, 19 5 Test 1. The next figure shows

More information

6.207/14.15: Networks Lectures 19-21: Incomplete Information: Bayesian Nash Equilibria, Auctions and Introduction to Social Learning

6.207/14.15: Networks Lectures 19-21: Incomplete Information: Bayesian Nash Equilibria, Auctions and Introduction to Social Learning 6.207/14.15: Networks Lectures 19-21: Incomplete Information: Bayesian Nash Equilibria, Auctions and Introduction to Social Learning Daron Acemoglu and Asu Ozdaglar MIT November 23, 25 and 30, 2009 1 Introduction

More information

Bounding Rationality by Discounting Time

Bounding Rationality by Discounting Time Bounding Rationality by Discounting Time Lance Fortnow 1 Rahul Santhanam 2 1 Northwestern University, Evanston, USA 2 University of Edinburgh, Edinburgh, UK fortnow@eecs.northwestern.edu rsanthan@inf.ed.ac.uk

More information

Game Mining: How to Make Money from those about to Play a Game

Game Mining: How to Make Money from those about to Play a Game Game Mining: How to Make Money from those about to Play a Game David H. Wolpert NASA Ames Research Center MailStop 269-1 Moffett Field, CA 94035-1000 david.h.wolpert@nasa.gov James W. Bono Department of

More information

Program Equilibrium. Moshe Tennenholtz Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Haifa 32000, Israel

Program Equilibrium. Moshe Tennenholtz Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Haifa 32000, Israel Program Equilibrium Moshe Tennenholtz Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Haifa 32000, Israel This work has been carried out while the author was with

More information

Department of Economics The Ohio State University Economics 817: Game Theory

Department of Economics The Ohio State University Economics 817: Game Theory Department of Economics The Ohio State University Economics 817: Game Theory Syllabus and Reading List James Peck M-W 11:30-1:18 Autumn 2011 Arps Hall 177 www.econ.ohio-state.edu/jpeck/econ817.htm Office

More information

On Reputation in Game Theory Application on Online Settings

On Reputation in Game Theory Application on Online Settings On Reputation in Game Theory Application on Online Settings Karl Aberer, Zoran Despotovic Distributed Information Systems Laboratory (LSIR) Institute of Core Computing Sciences (IIF) Swiss Federal Institute

More information

Decentralised bilateral trading, competition for bargaining partners and the law of one price

Decentralised bilateral trading, competition for bargaining partners and the law of one price ECONOMICS WORKING PAPERS Decentralised bilateral trading, competition for bargaining partners and the law of one price Kalyan Chatterjee Kaustav Das Paper Number 105 October 2014 2014 by Kalyan Chatterjee

More information

9 Repeated Games. Tomorrow, and tomorrow, and tomorrow, Creeps in this petty pace from day to day To the last syllable of recorded time Shakespeare

9 Repeated Games. Tomorrow, and tomorrow, and tomorrow, Creeps in this petty pace from day to day To the last syllable of recorded time Shakespeare 9 Repeated Games Tomorrow, and tomorrow, and tomorrow, Creeps in this petty pace from day to day To the last syllable of recorded time Shakespeare When a game G is repeated an indefinite number of times

More information

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to

More information

Geometrical Characterization of RN-operators between Locally Convex Vector Spaces

Geometrical Characterization of RN-operators between Locally Convex Vector Spaces Geometrical Characterization of RN-operators between Locally Convex Vector Spaces OLEG REINOV St. Petersburg State University Dept. of Mathematics and Mechanics Universitetskii pr. 28, 198504 St, Petersburg

More information

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12 CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Imperfect monitoring in communication networks

Imperfect monitoring in communication networks Journal of Economic Theory (00) www.elsevier.com/locate/jet Imperfect monitoring in communication networks Michael McBride University of California, Irvine, Social Science Plaza, Irvine, CA -00, USA Received

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

A Simple Model of Price Dispersion *

A Simple Model of Price Dispersion * Federal Reserve Bank of Dallas Globalization and Monetary Policy Institute Working Paper No. 112 http://www.dallasfed.org/assets/documents/institute/wpapers/2012/0112.pdf A Simple Model of Price Dispersion

More information

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011

Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely

More information

Elections and Preferred Candidates - A Review of electoral Systems

Elections and Preferred Candidates - A Review of electoral Systems Ideology and Competence in Alternative Electoral Systems. Matias Iaryczower and Andrea Mattozzi March 1, 008 Abstract We develop a model of elections in proportional (PR) and majoritarian (FPTP) electoral

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory

UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory UCLA Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory (SPRING 2011) Instructions: You have 4 hours for the exam Answer any 5 out of the 6 questions. All questions are weighted equally.

More information

Bad Reputation. March 26, 2002

Bad Reputation. March 26, 2002 Bad Reputation Jeffrey C. Ely Juuso Välimäki March 26, 2002 Abstract We study the classical reputation model in which a long-run player faces a sequence of short-run players and would like to establish

More information

Introduction to Topology

Introduction to Topology Introduction to Topology Tomoo Matsumura November 30, 2010 Contents 1 Topological spaces 3 1.1 Basis of a Topology......................................... 3 1.2 Comparing Topologies.......................................

More information

Efficient Response to Bad Behavior - Network Marketing Model

Efficient Response to Bad Behavior - Network Marketing Model Audit Mechanisms for Provable Risk Management and Accountable Data Governance Jeremiah Blocki, Nicolas Christin, Anupam Datta, and Arunesh Sinha Carnegie Mellon University, Pittsburgh, PA {jblocki, nicolasc,

More information

The Multiplicative Weights Update method

The Multiplicative Weights Update method Chapter 2 The Multiplicative Weights Update method The Multiplicative Weights method is a simple idea which has been repeatedly discovered in fields as diverse as Machine Learning, Optimization, and Game

More information

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2 Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are

More information

4. Expanding dynamical systems

4. Expanding dynamical systems 4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,

More information

2. Information Economics

2. Information Economics 2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

10 Evolutionarily Stable Strategies

10 Evolutionarily Stable Strategies 10 Evolutionarily Stable Strategies There is but a step between the sublime and the ridiculous. Leo Tolstoy In 1973 the biologist John Maynard Smith and the mathematician G. R. Price wrote an article in

More information

Week 7 - Game Theory and Industrial Organisation

Week 7 - Game Theory and Industrial Organisation Week 7 - Game Theory and Industrial Organisation The Cournot and Bertrand models are the two basic templates for models of oligopoly; industry structures with a small number of firms. There are a number

More information

Economics of Insurance

Economics of Insurance Economics of Insurance In this last lecture, we cover most topics of Economics of Information within a single application. Through this, you will see how the differential informational assumptions allow

More information

The Prison S Dilemma and Its Connections

The Prison S Dilemma and Its Connections Games Played in a Contracting Environment V. Bhaskar Department of Economics University College London Gower Street London WC1 6BT February 2008 Abstract We analyze normal form games where a player has

More information

Christmas Gift Exchange Games

Christmas Gift Exchange Games Christmas Gift Exchange Games Arpita Ghosh 1 and Mohammad Mahdian 1 Yahoo! Research Santa Clara, CA, USA. Email: arpita@yahoo-inc.com, mahdian@alum.mit.edu Abstract. The Christmas gift exchange is a popular

More information

ECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.

ECON 40050 Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted. 1 ECON 40050 Game Theory Exam 1 - Answer Key Instructions: 1) You may use a pen or pencil, a hand-held nonprogrammable calculator, and a ruler. No other materials may be at or near your desk. Books, coats,

More information

Notes on metric spaces

Notes on metric spaces Notes on metric spaces 1 Introduction The purpose of these notes is to quickly review some of the basic concepts from Real Analysis, Metric Spaces and some related results that will be used in this course.

More information

Credible Termination Threats, Reputation and Private Monitoring.

Credible Termination Threats, Reputation and Private Monitoring. Credible Termination Threats, Reputation and Private Monitoring. Olivier Compte First Version: June 2001 This Version: April 2005 Abstract In repeated principal-agent relationships, termination threats

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

Economics 159: Introduction to Game Theory. Summer 2015: Session A. Online Course

Economics 159: Introduction to Game Theory. Summer 2015: Session A. Online Course Economics 159: Introduction to Game Theory Summer 2015: Session A Online Course *Syllabussubjecttochange.Checkcoursewebpageforup-to-dateinformation* This course is an introduction to game theory and strategic

More information

Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model

Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model Allan Collard-Wexler April 19, 2012 Co-Written with John Asker and Vasiliki Skreta 1 Reading for next week: Make Versus Buy in

More information

Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web

Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web Proceedings of the International Conference on Advances in Control and Optimization of Dynamical Systems (ACODS2007) Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web S.

More information

The Impact of Electronic Markets on B2B-Relationships

The Impact of Electronic Markets on B2B-Relationships The Impact of Electronic Markets on BB-Relationships Jochen Haller Department of Microeconomics and Spatial Economics, University of Stuttgart, Germany January 00 Revised: February 004 Abstract. Although

More information

Some representability and duality results for convex mixed-integer programs.

Some representability and duality results for convex mixed-integer programs. Some representability and duality results for convex mixed-integer programs. Santanu S. Dey Joint work with Diego Morán and Juan Pablo Vielma December 17, 2012. Introduction About Motivation Mixed integer

More information

ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY 100-3 90-99 21 80-89 14 70-79 4 0-69 11

ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY 100-3 90-99 21 80-89 14 70-79 4 0-69 11 The distribution of grades was as follows. ECO 199 B GAMES OF STRATEGY Spring Term 2004 PROBLEM SET 4 B DRAFT ANSWER KEY Range Numbers 100-3 90-99 21 80-89 14 70-79 4 0-69 11 Question 1: 30 points Games

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Approach to Communication Equilibria Author(s): Francoise Forges Source: Econometrica, Vol. 54, No. 6 (Nov., 1986), pp. 1375-1385 Published by: The Econometric Society Stable URL: http://www.jstor.org/stable/1914304

More information

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2010, Article ID 510838, 15 pages doi:10.1155/2010/510838 Research Article Stability Analysis for Higher-Order Adjacent Derivative

More information

Spectrum Trading with Insurance in Cognitive Radio Networks

Spectrum Trading with Insurance in Cognitive Radio Networks Spectrum Trading with Insurance in Cognitive Radio Networks 1/46 Spectrum Trading with Insurance in Cognitive Radio Networks Haiming Jin 1, Gaofei Sun 1, Xinbing Wang 1 and Qian Zhang 2 1 Department of

More information

1 Representation of Games. Kerschbamer: Commitment and Information in Games

1 Representation of Games. Kerschbamer: Commitment and Information in Games 1 epresentation of Games Kerschbamer: Commitment and Information in Games Game-Theoretic Description of Interactive Decision Situations This lecture deals with the process of translating an informal description

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Decentralization and Private Information with Mutual Organizations

Decentralization and Private Information with Mutual Organizations Decentralization and Private Information with Mutual Organizations Edward C. Prescott and Adam Blandin Arizona State University 09 April 2014 1 Motivation Invisible hand works in standard environments

More information

Fairness with an Honest Minority and a Rational Majority

Fairness with an Honest Minority and a Rational Majority Fairness with an Honest Minority and a Rational Majority The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

Minimally Infeasible Set Partitioning Problems with Balanced Constraints

Minimally Infeasible Set Partitioning Problems with Balanced Constraints Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of

More information

MA651 Topology. Lecture 6. Separation Axioms.

MA651 Topology. Lecture 6. Separation Axioms. MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples

More information

Evolutionary dynamics and backward induction

Evolutionary dynamics and backward induction Games and Economic Behavior 41 (2002) 227 264 www.elsevier.com/locate/geb Evolutionary dynamics and backward induction Sergiu Hart Center for Rationality and Interactive Decision Theory, Department of

More information

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Alex Edmans LBS, NBER, CEPR, and ECGI Itay Goldstein Wharton Wei Jiang Columbia May 8, 05 A Proofs of Propositions and

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]

Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly] ECON9 (Spring 0) & 350 (Tutorial ) Chapter Monopolistic Competition and Oligopoly (Part ) Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

Bad Reputation. January 30, 2003. Abstract

Bad Reputation. January 30, 2003. Abstract Bad Reputation Jeffrey C. Ely Juuso Välimäki January 30, 2003 Abstract We construct a model where the reputational concern of the long-run player to look good in the current period results in the loss

More information

The Advantages and Disadvantages of Online Linear Optimization

The Advantages and Disadvantages of Online Linear Optimization LINEAR PROGRAMMING WITH ONLINE LEARNING TATSIANA LEVINA, YURI LEVIN, JEFF MCGILL, AND MIKHAIL NEDIAK SCHOOL OF BUSINESS, QUEEN S UNIVERSITY, 143 UNION ST., KINGSTON, ON, K7L 3N6, CANADA E-MAIL:{TLEVIN,YLEVIN,JMCGILL,MNEDIAK}@BUSINESS.QUEENSU.CA

More information