Search results for "Ash"
showing 10 items of 1718 documents
Computational Complexity and Communication: Coordination in Two-Player Games
2002
The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by means of computationally restricted unmediated communication. This result provides an example in game theory where limitations of computational abilities of players are helpful in solv…
The erosion of personal norms and cognitive dissonance
2016
ABSTRACTIn this article, we study how personal norms and behaviour interact and evolve when agents try to reduce cognitive dissonance, and how this dynamic relates to Nash equilibrium. We find that in long run, agents play, and norms prescribe, Nash equilibrium in material payoffs (in the absence of norms). Our model captures two main facts: (i) norms erode along the play of the game; (ii) the erosion of norms depends on the set of possible economic choices, so that the policy maker can potentially influence them.
Pragmatic languages with universal grammars
2012
Abstract This paper constructs the equilibrium for a specific code that can be seen as a “universal grammar” in a class of common interest Sender–Receiver games where players communicate through a noisy channel. We propose a Senderʼs signaling strategy which does not depend on either the game payoffs or the initial probability distribution. The Receiverʼs strategy partitions the set of possible sequences into subsets, with a single action assignment to each of them. The Senderʼs signaling strategy is a Nash equilibrium, i.e. when the Receiver responds best to the Senderʼs strategy, the Sender has no incentive to deviate. An example shows that a tie-breaking decoding is crucial for the block…
Non-cooperative power allocation game with imperfect sensing information for cognitive radio
2012
In this paper, we consider a sensing-based spectrum sharing scenario and present an efficient decentralized algorithm to maximize the total throughput of the cognitive radio users by optimizing jointly both the detection operation and the power allocation, taking into account the influence of the sensing accuracy. This optimization problem can be formulated as a distributed non-cooperative power allocation game, which can be solved by using an alternating direction optimization method. The transmit power budget of the cognitive radio users and the constraint related to the rate-loss of the primary user due to the interference are considered in the scheme. Finally, we use variational inequal…
Efficient Parallel Nash Genetic Algorithm for Solving Inverse Problems in Structural Engineering
2015
A parallel implementation of a game-theory based Nash Genetic Algorithm (Nash-GAs) is presented in this paper for solving reconstruction inverse problems in structural engineering. We compare it with the standard panmictic genetic algorithm in a HPC environment with up to eight processors. The procedure performance is evaluated on a fifty-five bar sized test case of discrete real cross-section types structural frame. Numerical results obtained on this application show a significant achieved increase of performance using the parallel Nash-GAs approach compared to the standard GAs or Parallel GAs.
A Novel Solution to Find the Dynamic Response of an Euler–Bernoulli Beam Fitted with Intraspan TMDs under Poisson Type Loading
2020
This contribution considers a virtual experiment on the vibrational response of rail and road bridges equipped with smart devices in the form of damping elements to mitigate vibrations. The internal damping of the bridge is considered a discontinuity that contain a dashpot. Exact complex eigenvalues and eigenfunctions are derived from a characteristic equation built as the determinant of a 4 x 4 matrix
Scalable Creation of Long-Lived Multipartite Entanglement.
2017
We demonstrate the deterministic generation of multipartite entanglement based on scalable methods. Four qubits are encoded in Ca+40, stored in a microstructured segmented Paul trap. These qubits are sequentially entangled by laser-driven pairwise gate operations. Between these, the qubit register is dynamically reconfigured via ion shuttling operations, where ion crystals are separated and merged, and ions are moved in and out of a fixed laser interaction zone. A sequence consisting of three pairwise entangling gates yields a four-ion Greenberger-Horne-Zeilinger state |ψ=(1/2)(|0000+|1111), and full quantum state tomography reveals a state fidelity of 94.4(3)%. We analyze the decoherence o…
Building emotional agents for strategic decision making
2015
Experimental economics has many works that demonstrate the influence of emotions and affective issues on the process of human strategic decision making. Personality, emotions and mood produce biases on what would be considered the strategic solution (Nash equilibrium) to many games. %CAMBIO% Thus considering these issues on simulations of human behavior may produce results more aligned with real situations. We think that computational agents are a suitable %CAMBIO% technology to simulate such phenomena. We propose to use O3A, an Open Affective Agent Architecture to model rational and affective agents, in order to perform simulations where agents must take decisions as close as possible to h…
Aprendiendo Vibraciones Mec´anicas con Wolfram Mathematica
2015
[EN] Mechanical vibrations as subject can be found within many Engineering and Science Degrees. To achieve that the students understand the mathematics and its physical interpretation is the objective we should get as docents. In this paper we describe how to create a simple graphical model of a single degree of freedom vibrating system allowing us to visualize concepts like above concepts damping, resonance or forced vibrations. For that, we use the popular symbolic software Wolfram Mathematica with which, without an excessive programming complexity, we can obtain a very satisfactory visual model capable to move itself, controlled by parameters. In addition, the model incorporates the curv…
The role of the Access Point in Wi-Fi networks with selfish nodes
2009
In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…