Search results for "network formation"
showing 8 items of 8 documents
Networked relationships in the e-MID Interbank market: A trading model with memory
2014
Interbank markets are fundamental for bank liquidity management. In this paper, we introduce a model of interbank trading with memory. Our model reproduces features of preferential trading patterns in the e-MID market recently empirically observed through the method of statistically validated networks. The memory mechanism is used to introduce a proxy of trust in the model. The key idea is that a lender, having lent many times to a borrower in the past, is more likely to lend to that borrower again in the future than to other borrowers, with which the lender has never (or has in- frequently) interacted. The core of the model depends on only one parameter representing the initial attractiven…
Topology management in unstructured P2P networks using neural networks
2007
Resource discovery is an essential problem in peer-to-peer networks since there is no centralized index in which to look for information about resources. In a pure P2P network peers act as servers and clients at the same time and in the Gnutella network for example, peers know only their neighbors. In addition to developing different kinds of resource discovery algorithms, one approach is to study the different topologies or structures of the P2P network. In many cases topology management is based on either technical characteristics of the peers or their interests based on the previous resource queries. In this paper, we propose a topology management algorithm which does not predetermine fa…
Attracting sets in network regulatory theory
2016
Modern telecommunication networks are very complex and they should be able to deal with rapid and unpredictable changes in traffic flows. Virtual Network Topology is used to carry IP traffic over Wavelength-division multiplexing optical network. To use network resources in the most optimal way, there is a need for an algorithm, which will dynamically re-share resources among all devices in the particular network segment, based on links utilization between routers. Attractor selection mechanism could be used to dynamically control such Virtual Network Topology. The advantage of this algorithm is that it can adopt to very rapid, unknown and unpredictable changes in traffic flows. This mechani…
The grass is always greener on the other side of the fence: the effect of misperceived signalling in a network formation process
2007
Social and economic networks are becoming increasingly popular in the last ten years, because of both the application of game theory to the network formation processes4, and the study of stochastic processes that fit the statistical properties of real world social networks.5 In the very recent years there have also been attempts to combine the contribution of these two streams of research, trying to find strategic models whose equilibria resemble the empirical data.6 A well known source of debate in the game theoretical approach is the incompatibility between stability and efficiency: in most of the models Nash equilibria are actually not the network architectures that maximize the overall …
R&D Network Formation with Myopic and Farsighted Firms
2018
We study the formation of R&D networks when each firm benefits from the research done by other firms it is connected to. Firms can be either myopic or farsighted when deciding about the links they want to form. We propose the notion of myopic-farsighted stable set to determine the R&D networks that emerge in the long run. When the majority of firms is myopic, stability leads to R&D networks consisting of either two asymmetric components with the largest component comprises three-quarters of firms or two symmetric components of nearly equal size with the largest component having only myopic firms. But, once the majority of firms becomes farsighted, only R&D networks with two asymmetric compo…
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
2007
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-Tat can affect selfish peers who are able to set their upload bandwidth. They show that there is a "good" Nash Equilibrium at which each peer uploads at the maximum rate. In this paper we consider a different game where BT clients can change the number of connections to open in order to improve their performance. We study this game using the analytical framework of network formation games [2]. In particular we characterize the set of pairwise stable networks the peers can form and how the peers can dynamically reach…
Heterogeneous network games: Conflicting preferences
2013
Proceeding at: 2nd Annual UECE Lisbon Meeting: Game Theory and Applications, took place 2010, November, 4-6, in Lisbon (Portugal). The event Web site http://pascal.iseg.utl.pt/~uece/lisbonmeetings2010/ In many economic situations, a player pursues coordination or anti-coordination with her neighbors on a network, but she also has intrinsic preferences among the available options. We here introduce a model which allows to analyze this issue by means of a simple framework in which players endowed with an idiosyncratic identity interact on a social network through strategic complements or substitutes. We classify the possible types of Nash equilibria under complete information, finding two thr…
Family business internationalisation and networks: emerging pathways
2017
Purpose The aim of this study is twofold: to provide a meta-synthesis of the current state of knowledge in family business (FB) internationalisation research, adopting a network perspective, and to highlight emerging themes that may set the stage for future work on FB internationalisation, for the benefit of researchers adopting a network perspective. Design/methodology/approach To address the twofold purpose of the study, the current paper provides a state-of-the-art review of 25 peer-reviewed journal articles published from 1993 to 2014. This study also presents a meta-synthesis of the theoretical approaches, key findings and concepts that were pinpointed in the review, and proposes emer…