Defender (Mis)coordination in Security Games

Size: px
Start display at page:

Download "Defender (Mis)coordination in Security Games"

Transcription

1 Albert Xin Jiang University of Southern California Defener (Mis)coorination in Security Games Ariel D. Procaccia Carnegie Mellon University Yuni Qian University of Southern California Nisarg Shah Carnegie Mellon University Abstract We stuy security games with multiple efeners. To achieve maximum security, efeners must perfectly synchronize their ranomize allocations of resources. However, in real-life scenarios (such as protection of the port of Boston) this is not the case. Our goal is to quantify the loss incurre by miscoorination between efeners, both theoretically an empirically. We introuce two notions that capture this loss uner ifferent assumptions: the price of miscoorination, an the price of sequential commitment. Generally speaking, our theoretical bouns inicate that the loss may be extremely high in the worst case, while our simulations establish a smaller yet significant loss in practice. 1 Introuction Security games, a special class of Stackelberg games, have been eploye as ecision ais to scheule limite security resources at critical infrastructure sites incluing key airports an ports in the Unite States (e.g., Los Angeles, Boston, New York) as well as in protecting transportation infrastructure (international flights an metro trains) [Tambe, 2011; Shieh et al., 2012]. These eployments have fuele the security games research area, with focus on efficient computation for scale-up an hanling the significant uncertainty in this omain [Korzhyk et al., 2011a; Basilico et al., 2009; Yin et al., 2010; Jain et al., 2010]. Previous research in security games has assume a single efener agency with control over all the security resources even if there were multiple attacker types or multiple coorinate attackers [Paruchuri et al., 2008; Korzhyk et al., 2011b]. Yet at most major critical infrastructure sites, e.g., port of New York or the Los Angeles International Airport, multiple efener agencies incluing city police, state an feeral law enforcement agencies are responsible for security [Panel, 2011]; these agencies each have control over their own security resources an scheules. Jiang, Qian an Tambe were supporte by US Coast Guar grant HSHQDC-10-D an MURI grant W911NF Procaccia an Shah were supporte by NSF grant CCF an a gift from Microsoft. Milin Tambe University of Southern California tambe@usc.eu In theory, achieving perfect coorination is simple: efeners can pool their resources together, an employ a single centralize algorithm to allocate resources. Our work is motivate by the basic observation that this ieal is far from reality; in practice we observe limite coorination between efeners, which we believe can lea to significantly poorer performance. For example, it is well known that at major ports such as the port of New York, the US Coast Guar an ifferent police epartments each scheule their own boat patrols an security resources inepenently; there is no centralize scheuling. Our research question is therefore: how much o efeners lose ue to lack of coorination? While the ieal coorination mechanism may not be feasible from a policy perspective, our goal is to use it as a gol stanar in orer to inform policy makers an ultimately bring about a higher level of coorination. To that en, the paper offers four key contributions. First, we introuce an analyze the price of miscoorination (PoM) in simultaneous move settings an provie bouns on the worst case loss uner ifferent assumptions of target values. Secon, we introuce the price of sequential commitment (PoSC) when efeners move sequentially. We illustrate that even in situations with low PoM, PoSC may be unboune. Thir, we introuce techniques to compute PoM an PoSC. Finally, we present experimental results base on realistic port scenarios illustrating a smaller yet significant loss in practice. 2 Backgroun on Security Games A security game is a 5-tuple (T, S, R, A, U). T is the set of targets; we enote T = n. A scheule is a subset of the target set T ; S 2 T enotes the collection of feasible scheules. R is the set of resources that belong to the efener; we enote R = m. Every resource has a collection of scheules (a subset of S) to which it can be assigne; A : R 2 S is the function that maps a resource to its collection of possible scheules. In our theoretical results we make the stanar assumption that for any resource, any subset of a feasible scheule is itself a feasible scheule [Yin et al., 2010]. When a resource is assigne to a scheule, we say that all the targets in the scheule are covere by the resource. The payoffs are given by four ifferent utility functions. If target t is attacke, the efener s utility is U c (t) if t was covere, an U u (t) if t was not covere. Similarly,

2 the attacker s utility is Ua(t) c if t was covere, an Ua u (t) if t was not covere. We assume that U c(t) U u (t) an Ua(t) c Ua u (t). Note that it makes no ifference to the players utilities whether a target is covere by one resource or by more than one resources. A pure strategy of the efener is an assignment of resources to feasible scheules; a efener may opt to employ a mixe strategy, which selects at ranom from pure strategies accoring to a istribution. The solution of the security game is the optimal Stackelberg strategy for the efener. Given the efener s mixe strategy that ranomly allocates resources to scheules, the attacker selects a best response by choosing to attack a target that maximizes its expecte utility. The efener chooses its mixe strategy to maximize its own utility given that the attacker best respons. Given the emphasis on explicit game-theoretic moels an equilibrium analysis, our paper also complements research on strategies for multi-robot patrol [Agmon, 2010; Agmon et al., 2009]. 3 The Price of Miscoorination We exten the basic moel to the setting where multiple efeners, with their isjoint sets of resources, efen a set of targets against a single attacker. In particular, we analyze the nee for the efeners to coorinate their moves, an the incurre loss when coorination is lacking. 3.1 Our Moel Let D be the set of efeners; we enote D =. Let the set of resources R be partitione into {R i } i D where R i is the set of resources owne by efener i D. We take an optimistic point of view by assuming that all efeners are intereste in overall security, hence they are all enowe with the same utility functions U c an U u as before. The maximum utility is achieve by the efeners when they pool their resources together, an scheule the whole set R of resources as if they were owne by a single efener. We call this strategy profile the optimal correlate profile (OCP) as the mixe strategies of iniviual efeners are correlate. In other wors, the exact realizations of assignments of the resources of ifferent efeners may be epenent on each other. This represents the scenario with full coorination. Consier an alternative scenario, where the efeners choose their mixe strategies but these mixe strategies are uncorrelate. In other wors, the instantiations of the various mixe strategies are inepenent of each other. We efine the optimal uncorrelate profile (OUP) as the profile of uncorrelate mixe strategies for the efeners that yiels maximum utility among all profiles of uncorrelate mixe strategies. Clearly, the utility to the efeners uner OUP is no greater, an may be strictly smaller, than the utility uner OCP. We efine the supremum (over a given class of security games) of the ratio of the utility uner OCP to that uner OUP as the price of miscoorination (PoM). Example 1. Let there be two efeners, efener 1 with resource r 1 an efener 2 with resource r 2. Let T = {t 1, t 2, t 3 }, with U u (t) = U c a(t) = 0 an U c (t) = U u a (t) = 1 for all t T. Resource r 1 can cover either target t 1 or target t 2, an resource r 2 can cover either target t 2 or target t 3. The optimal correlate profile (OCP) uniformly ranomizes between assigning the resources to {t 1, t 2 }, {t 1, t 3 }, an {t 2, t 3 }. Each target is covere with probability 2/3, hence the efeners are guarantee utility 2/3. In contrast, uner the optimal uncorrelate profile (OUP) each efener covers its own target (t 1 or t 3 ) with probability ( 5 1)/2 = 0.618, an the share target t 2 with the complement probability (which equalizes the coverage probability of t 2 with t 1 an t 3 ). The efeners utility is therefore 0.618, an the ratio of the utilities uner OCP an OUP is 1.078, which is therefore a lower boun for the PoM. The PoM is relate to the notion of meiation value [Ashlagi et al., 2008; Braonjic et al., 2009] (which in turn is inspire by the price of anarchy [Koutsoupias an Papaimitriou, 1999; Roughgaren an Taros, 2002]). Briefly, the meiation value in a game is the ratio between the maximum social welfare (i.e., sum of utilities) in any correlate equilibrium an the maximum social welfare in any mixe-strategy Nash equilibrium. If we efine an artificial game between the efeners, where the utility function of each efener is the same as the common utility function, then the OCP is the welfare-maximizing correlate equilibrium an the OUP is the welfare-maximizing Nash equilibrium. Hence, the PoM coincies with the meiation value in this game. To guarantee that the PoM is meaningful, we assume hereinafter that the efener utilities are non-negative. General security games may have negative utilities; however, by shifting all efener utilities by the minimum efener utility we can obtain a security game with non-negative efener utilities, which is equivalent in terms of its optimal strategies for the efeners an the attacker. Moreover, the PoM of the shifte game has a natural interpretation in the original game: informally, it tells us what fraction of the gap between the worst possible outcome an the best possible correlate outcome is ue to miscoorination. 3.2 Bouns on the PoM Our first result shows that in some games coorination is crucial, as the price of miscoorination may be arbitrarily large. Theorem 1. The PoM is unboune in general security games. Proof. Let there be two efeners, efener 1 with resource r 1 an efener 2 with resource r 2. Let T = {t 1, t 2, t 3 }. Resource r 1 can cover either target t 1 or target t 2, an resource r 2 can cover either target t 2 or target t 3. In terms of structure, this is ientical to the game of Example 1. However, the utilities are efine ifferently. For the efeners, targets t 1 an t 3 are ientical. If either target is attacke, it gives the efeners utility x if covere an 1 if uncovere, where x > 1. Target t 2, if attacke, gives the efeners utility 0 whether it was covere or not. Formally, U c (t 1) = U c (t 3) = x, U u (t 1) = U u (t 3) = 1 an U c (t 2) = U u (t 2) = 0. For the attacker, targets t 1 an t 3 give utility 1 if uncovere an 0 if covere. Target t 2 gives the attacker utility z if uncovere an 0 if covere. Formally, U c a(t) = 0 for all t T, U u a (t 1 ) = U u a (t 3 ) = 1 an U u a (t 2 ) = z.

3 Irrespective of the values of x an z, the efeners never let the attacker attack target t 2 as it woul give them the worst possible utility (zero utility). Now fix x an increase z. As z, the utility of the attacker for a successful attack against target t 2 increases, hence it must be covere by the efeners with probability 1 in the limit to avoi such an attack. Thus, as z, the OCP for the efeners converges to assigning r 1 {t 1 } an r 2 {t 2 } with probability 1/2, an r 1 {t 2 } an r 2 {t 3 } with probability 1/2. This way, target t 2 is fully covere while both targets t 1 an t 3 are covere with probability 1/2, giving the efeners utility 1/2 + x/2. In the limit of the uncorrelate case, at least one efener must cover target t 2 with probability 1. The other efener can only cover one of targets t 1 an t 3. The attacker attacks the other target, resulting in a utility of 1 for the efeners. Thus, taking z in this security game implies that the ratio of utility uner OCP an OUP is at least (1/2 + x/2)/1. As x can be arbitrarily large, the PoM is unboune. The proof of Theorem 1 relies on an extreme asymmetry in the utilities for ifferent targets. It is natural to ask, what is the PoM when the targets are ientical? Specifically, the utility functions of the efeners satisfy U c(t) = x an U u(t) = 0 for all targets t T an some x 0, where the utility for targets being uncovere is zero since we shift the utility functions to make the worst-case utility zero. Similarly, the utility functions of the attacker satisfy Ua(t) c = 0 an Ua u (t) = x for all targets t T an some x 0. We believe that although this is a special case, it is useful for practitioners to explore the extreme points of the problem. It is also worth noting that the case of ientical targets is still rich, even from a complexity-theoretic point of view: it immeiately follows from existing proofs [Korzhyk et al., 2010, Theorem 5] that computing the optimal efener strategy for this case is N P- har, even for one efener an scheules of size at most 3. It is easy to check that in the case of ientical targets, the attacker woul attack the target that is covere with minimum probability in orer to maximize his own utility. Therefore, the utility of the efeners is proportional to the minimum probability with which any target is covere. Let c t enote the coverage probability of target t T in a strategy profile, an let c min = min t T c t enote the minimum coverage probability. Then we are intereste in the ratio c min (OCP )/c min (OUP ). We show that in this case the PoM is upper-boune by a small constant. Theorem 2. The PoM of security games with ientical targets e is at most e Proof. Given a security game with ientical targets an efeners, we claim that there exists an OCP where no target is covere by more than one efeners simultaneously in any pure strategy realization of the OCP. Inee, if a target is covere by more than one efener in a realization, we remove resources of all but one efener assigne to that target in that realization (the assumption that any subset of a feasible scheule is a feasible scheule plays a key role here). Next, consier any such OCP. Let c t,i enote the probability with which efener i covers target t in the OCP. Since a target is not covere by more than one efener at a time, the coverage probability of target t is c t,i, so c min (OCP ) = min t T c t,i. Now consier the marginal uncorrelate profile (MUP) where each efener i scheules its resources as they were scheule in the OCP, but the mixe strategies of ifferent efeners are now uncorrelate. 1 In other wors, each efener follows the mixe strategy that is obtaine as the marginal of the OCP. In this case, target t is still covere by efener i with probability c t,i. However, a target may be covere by more than one efener simultaneously, so the probability of target t being covere overall is 1. Thus, [ ] c min (OUP ) c min (MUP ) = min 1 (1 c t,i ), t T an it follows that min t T P om c t,i ( min t T 1 ). We claim that for all t T, 1 (1 c t,i ) ( 1 1 ) e c t,i. (1) Inee, if c t,i = 0, then Equation (1) follows trivially. Hence, assume that c t,i > 0. Now, 1 c t,i ct,i 1 e c t,i 1 1 e, where the first transition hols because 1 x e x, an the last transition is true since f(x) = (1 e x )/x is a ecreasing function in (0, 1], so f(x) f(1) for all x (0, 1]. Also, c t,i is the coverage probability of target t in the OCP, so 0 < c t,i 1. We have thus establishe (1). We can now conclue that min t T P om c t,i [ min t T 1 ] [ ] min t T = max c t,i t T 1 max c t,i t T 1 e e 1, where the last transition is ue to Equation (1). Is it possible that the upper boun for ientical targets is in fact much closer to 1? Our next theorem answers this question in the negative. Theorem 3. The PoM of security games with ientical targets is at least 4/3. 1 The mixe strategy assignments of various resources of the same efener are still correlate as before.

4 Proof. Consier the following security game with ientical targets. There are efeners, each efener i has a single resource r i. There are + 1 ientical targets, t 1,..., t +1. For 1 i, resource r i can cover either target t i or target t i+1. Consier the following + 1 pure strategies where strategy i leaves only target i uncovere. This is uniquely achieve by assigning resource r j to target t j for j < i an resource r j to target t j+1 for j i. Since at least one target must be uncovere in any pure strategy, the OCP uniformly ranomizes over these + 1 pure strategies to achieve the optimal minimum coverage probability c min (OCP ) = 1 1/(+1). We next prove that c min (OUP ) < Suppose for contraiction that c min (OUP ) 0.75, so all targets are covere with probability at least First, we prove by inuction that for all 1 i, resource r i covers target t i with probability at least 0.5. For the base case of resource r 1, this is obvious since target t 1 is covere with probability at least 0.75 an r 1 is the only resource that can cover it. Suppose it is true for resource r k. Observe that resource r k covers target t k with probability at least 0.5, hence it covers target t k+1 with probability at most 0.5. If resource r k+1 covers target t k+1 with probability less than 0.5, then ue to the lack of correlation between the assignments of resources r k an r k+1, the probability of coverage of t k+1 woul be less than = 0.75, which contraicts the assumption. Hence, r k+1 must cover t k+1 with probability at least 0.5. Therefore, the inuction hypothesis hols. In particular, resource r covers target t with probability at least 0.5, an hence target t +1 with probability at most 0.5. It follows that the coverage probability of target t +1 is at most 0.5, which yiels a contraiction. Hence, c min (OUP ) < We conclue that P om (1 1/( + 1))/0.75. Taking, we get that P om 4/3. 4 The Price of Sequential Commitment The PoM is optimistic in a sense, because it compares the optimal correlate utility with the optimal uncorrelate utility. Even achieving the optimal uncorrelate utility requires some level of coorination among the efeners: they are not pooling their resources together, but they are coorinating their mixe strategies. Below we consier a more pessimistic moel of efener commitment, an show that in this moel the loss is unboune even when targets are ientical. 4.1 Our Moel We assume that the efeners commit sequentially. The first efener commits to a mixe strategy that optimizes the joint utility function in the absence of the other efeners. Subsequently, each efener chooses a mixe strategy that maximizes the joint utility function given the strategies of the earlier efeners, in the absence of the later efeners; note that there may be more than one optimal strategy. The mixe strategies of various efeners are still uncorrelate. 2 In such a moel, we can now consier the loss in utility ue to sequential commitment compare to the OCP. We e- 2 Our results hol even if the efeners commit to mixe strategies that are correlate with the strategies of the earlier efeners. fine two prices: the price uner the best orer of commitment (PoSC b ) an the price uner the worst orer of commitment (PoSC w ). Formally, PoSC b (resp. PoSC w ) is the supremum (over all security games) of the ratio of the utility uner the OCP to the maximum (resp. minimum) utility over all orers of sequential commitment. 3 It is easy to check that the PoM is a lower boun for the PoSC b, which in turn is a lower boun for the PoSC w. 4.2 Bouns on the PoSC While Theorem 2 shows that the PoM in security games with ientical targets is upper-boune by a small constant, we show that this is not the case even for PoSC b in security games with ientical targets. Theorem 4. The PoSC b (even) in security games with ientical targets is unboune. Proof. Consier a security game with two efeners: efener 1 owns resource r 1 an efener 2 owns resource r 2. The target set T = T 1 T 2 consists of 2 k ientical targets, where T 1 = T 2 = k. Resource r 1 can either cover all the targets in T 1 simultaneously or any single target in T 2, an resource r 2 can either cover all the targets in T 2 simultaneously or any single target in T 1. The efener who commits first has k + 1 feasible scheules for its resource. To maximize the minimum coverage probability, it uniformly ranomizes over the feasible scheules to cover each target with ientical probability 1/(k + 1). Due to the uniform coverage by the first efener, the efener committing later also uniformly ranomizes over its k + 1 feasible scheules. Hence, each target is covere with probability at most 2/(k +1). Note that the optimal strategies are unique. In contrast, we have c min (OCP ) = 1 because efeners 1 an 2 can respectively cover targets in T 1 an T 2 simultaneously. Thus, the price uner the best orer of commitment in this particular security game is at least (k + 1)/2. Hence, PoSC b is Ω(k), an k can be arbitrarily large. The proof of Theorem 4 uses a very simple construction: only two symmetric efeners an ientical targets. However, to obtain the lower boun the efeners nee to be able to cover an increasingly larger number of targets simultaneously. It turns out that we can obtain a matching upper boun that scales linearly with the maximum number of targets any efener can cover simultaneously; call this parameter the max-simultaneous-coverage. In the security game constructe in the proof of Theorem 4, the max-simultaneouscoverage is k. We aitionally assume that every efener can cover every target otherwise an optimal strategy for a efener who commits first an cannot cover all targets woul be to not cover anything, as any strategy woul yiel a utility of 0. We call this property complete iniviual coverage. Theorem 5. Denote the max-simultaneous-coverage by k. Then the PoSC w is O(k) in security games with ientical targets an complete iniviual coverage. 3 Our lower boun on PoSC b in Theorem 4 (resp. upper boun on PoSC w in Theorem 5) works even with the best (resp. worst) tie-breaking among the set of all optimal strategies at each step.

5 Proof. Let be the number of efeners an n be the number of targets. Since any efener can cover at most k targets simultaneously, the total number of targets covere simultaneously in any pure strategy is at most k. It follows that the minimum coverage probability in any mixe strategy (an hence in the OCP) is at most ( k)/n. Moreover, the minimum coverage probability cannot be more than 1. Hence, c min (OCP ) min( k/n, 1). Next, consier sequential commitment with the worst orer. The first efener commits to a mixe strategy that maximizes the minimum coverage probability in absence of the other efeners; if this probability is p 1, then it is easy to see that the worst choice of optimal strategy for the efener is the strategy that covers every target with probability exactly p 1. Such a mixe strategy is feasible since one can reuce the coverage probability of a target as much as require by removing it from the scheules in some of the pure strategy assignments (recall that any subset of a scheule is a feasible scheule). Inuctively, each successive efener also commits to a mixe strategy that covers all targets with ientical probability, maximizing this probability. Denote the ientical coverage probability by efener i as p i. Due to complete iniviual coverage, p i 1/n for all i as the efeners can achieve uniform coverage probability of at least 1/n by uniformly ranomizing over pure strategies that cover ifferent targets. Hence, every target is covere with probability at least 1 (1 p i) 1 (1 1/n) 1 e /n. Thus, min( k/n, 1) P osc w k 1 e /n 1 k = O(k), 1 e 1 min(/n, 1) 1 e /n where the thir transition hols because the function f(x) = min(x, 1)/(1 e x ) achieves its maximum at x = 1. From the proof of Theorem 4 an the statement of Theorem 5, we obtain a complete picture regaring the price of sequential commitment. Corollary 1. Denote the max-simultaneous-coverage by k. Both PoSC b an PoSC w are Θ(k) in security games with ientical targets an complete iniviual coverage. Note that PoSC b PoM, an Theorem 1 shows that the PoM can be unboune even with k = 1 if targets are nonientical. However, that proof crucially uses a game that oes not have the complete iniviual coverage property. We can actually construct an example with k = 1 an complete iniviual coverage where the price uner the best orer scales with the utilities, showing that PoSC b is unboune for nonientical targets even with k = 1. 5 Experimental Results We now turn to an empirical investigation of the PoM an PoSC; our goal is to quantify the loss cause by efeners miscoorination in realistic security games. We compute the PoM an PoSC in these games as follows. The OCP can be compute by solving the traitional security game (with a single efener) where all the resources are assume to belong to one efener. Computing PoSC is also easy; the optimal sequential strategies can be compute by rolling the coverage of earlier efeners into the utility functions, an at each step solving a traitional security game with a single efener using existing computational tools [Tambe, 2011]. The computation of the OUP is trickier; we formulate a nonlinear program whose solution is the OUP, an solve it using the YALMIP toolbox of MATLAB [Lofberg, 2004]; we omit the nontrivial etails ue to lack of space. We worry about the computational efficiency (or lack thereof) of our algorithms only insofar as it restricts our simulations, because while our simulations can inform policy ecisions these are not computations that we expect efeners to perform on a regular basis. For realistic security games, we use the port patrolling problem where a patrolling boat (resource) goes aroun an checks multiple targets a ay [Shieh et al., 2012]. Specifically, we use the actual map of Boston Port shown in Figure 1(a). The figure also shows the time require for the boat to move between various noes. We assume that the boat requires two time units at each target it visits for the check proceure. Due to the extreme computational buren, we restrict ourselves to the case of two efeners, each with one boat. Figure 1(b) shows the locations of homebases of the two efeners (marke in black). The other noes are consiere potential targets. In any scheule, a boat starts from its homebase, visits some targets an finally returns back to its homebase. All visite targets are consiere to be covere by the boat in that scheule. The boat must return within a patrolling time limit. (a) Map (b) Graph Structure Fig. 1: Boston Port, homebases, an targets. We consier two istributions of target valuations, both of which create non zero-sum security games with non-ientical targets. The importance of non-zero-sum security games in realistic omains has been emphasize in the risk analysis literature [Powell, 2007]. Denote by U[a, b] the uniform istribution over all integers between a an b. Homogeneous istribution: Uner this istribution, every target s utility to the efeners is in U[20, 39] if covere, an in U[0, 9] if uncovere (an vice versa for the attacker). Thus, there is homogeneity in target valuations although the actual realizations may create nonientical targets. Heterogeneous istribution: This istribution is relate to the target valuation of the worst case instance of Theorem 1, an captures realistic scenarios where some tar-

6 gets are far more valuable than others. For the gray targets (which are in some sense share between the two efeners), the utility to the efeners is in U[6, 10] if covere, an in U[1, 5] if uncovere. The utility to the attacker for these targets is 0 if covere an in U[30, 59] if uncovere. These targets are highly valuable; the efeners o not want them to be attacke whether or not they are covere, an the attacker has high utility for a successful attack. For the remaining targets, the utility to the efeners is in U[30, 59] if covere, an in U[10, 15] if uncovere. The utility to the attacker is 0 if covere, an in U[1, 5] if uncovere. These represent targets which the attacker is almost inifferent about, an the efeners o not have rastically low utility even in case of a successful attack. Note that these are shifte utility functions as explaine in Section 3.1. Figures 2 an 3 show the PoM an PoSC for the homogeneous an heterogeneous istributions, respectively. 4 All values are average over 100 ranom trials on target utilities. In both graphs, the x-axis shows the patrolling time limit for both efeners. Legens PoSC b an PoSC w show the average loss (uner the 100 ranom trials) where the average is taken over the best an the worst sequence respectively in every instance, whereas legen P osc 01 (resp. P osc 10 ) shows the average loss uner the fixe commitment sequence where efener 0 (resp. efener 1) commits first. PoSC or PoM PoSC w PoSC 01 PoSC 10 PoSC b PoM Patrolling Time Limit Fig. 2: PoM an PoSC uner the Homogeneous Distribution. Interestingly, the PoM in the homogeneous case (Figure 2) is almost 1 (the worst patrol times give an average PoM of 1.038), but the PoSC w can be significant (as high as 1.749). As expecte, the loss ue to miscoorination is much higher in the heterogeneous case (Figure 3), with the PoM reaching 1.434, an the PoSC w achieving a whopping Corollary 1 shows that both the PoSC b an PoSC w are Θ(k) where k is the max-simultaneous-coverage parameter, which reuces to the maximum scheule size (over all resources) when every efener has one resource. The maximum scheule size is a monotonic function of the patrolling time limit. Hence, the graphs show various losses as functions of the maximum scheule size. While the theoretical 4 Technically the figures show average ratios rather than the PoM an PoSC themselves, which are efine as supremums. PoSC or PoM PoSC w PoSC 01 PoSC 10 PoSC b PoM Patrolling Time Limit Fig. 3: PoM an PoSC uner the Heterogeneous Distribution. results preict a monotonic increment in PoSC b an PoSC w in the worst-case, they seem to have an inverse U shape relationship with the maximum scheule size in our empirical analysis. The ifference arises because the lower boun of Theorem 4 uses an example with an increasing number of targets while the targets are fixe in our case. Hence at a threshol patrolling time limit, the efeners can fully protect all targets in the OCP, an increasing it further maintains the utility in the OCP while increasing the utility in the uncorrelate case for both PoSC an PoM this results in the ownwar curves when time limits are large. The low PoM an PoSC for low patrol time limits is ue to the small overlap between the scheules of the two efeners, which entails less nee for coorination among their strategies. Another interesting observation is that in our particular graph structure, the commitment sequence where efener 1 commits first generally outperforms the sequence where efener 0 commits first. Further, always using the former sequence helps avoi the extremely high PoSC in the isastrous special cases. Thus, the commitment sequence (even if fixe) has great influence on the PoSC. 6 Discussion Our theoretical results suggest that the loss ue to miscoorination can be extremely high or relatively low, epening on the assumptions that are mae. In general though, the PoM (which in the worst case is arbitrarily high) can be significant (more than 30% loss) in realistic simulations. The PoSC is consistently significant, with a loss of as much as 70% in our simulations. We view the PoSC as a better proxy of reality, an in fact one can argue that even the PoSC is optimistic. We therefore interpret our results as suggesting a nee for greater coorination among efeners in critical infrastructure sites. As we hinte in our introuction, the challenge for future work is not purely computational. Inee, the simplest an most effective solution is scheuling the joint pool of resources, but it seems unrealistic to expect organizations as inepenent as, e.g., the New York Police Department an the Coast Guar to aopt such a policy. Hence, to esign realistic coorination mechanisms, it is necessary to etermine what feasible form of coorination can overcome most of the loss while keeping policy makers in the loop.

7 References [Agmon et al., 2009] Noa Agmon, Sarit Kraus, Gal A Kaminka, an Vlaimir Saov. Aversarial uncertainty in multi-robot patrol. In IJCAI, pages , [Agmon, 2010] Noa Agmon. On events in multi-robot patrol in aversarial environments. In AAMAS, pages , [Ashlagi et al., 2008] I. Ashlagi, D. Monerer, an M. Tennenholtz. On the value of correlation. Journal of Artificial Intelligence Research, 33(1): , [Basilico et al., 2009] N. Basilico, N. Gatti, an F. Amigoni. Leaer-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS, [Braonjic et al., 2009] M. Braonjic, G. Ercal-Ozkaya, A. Meyerson, an A. Roytman. On the price of meiation. In EC, pages , [Jain et al., 2010] M. Jain, E. Kares, C. Kiekintvel, F. Oronez, an M. Tambe. Security games with arbitrary scheules: A branch an price approac. In AAAI, [Korzhyk et al., 2010] D. Korzhyk, V. Conitzer, an R. Parr. Complexity of computing optimal Stackelberg strategies in security resource allocation games. In Proc. of The 24th AAAI Conference on Artificial Intelligence, pages , [Korzhyk et al., 2011a] D. Korzhyk, V. Conitzer, an R. Parr. Solving stackelberg games with uncertain observability. In AAMAS, [Korzhyk et al., 2011b] Dmytro Korzhyk, Vincent Conitzer, an Ronal Parr. Security games with multiple attacker resources. In IJCAI, [Koutsoupias an Papaimitriou, 1999] E. Koutsoupias an C. Papaimitriou. Worst-case equilibria. In STACS, pages , [Lofberg, 2004] J. Lofberg. Yalmip: A toolbox for moeling an optimization in matlab. In CACSD, pages IEEE, [Panel, 2011] Los Angeles Mayor s Blue Ribbon Panel. Report of the Mayor s Blue Ribbon Panel on airport security, [Paruchuri et al., 2008] P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Oronez, an S. Kraus. Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In AAMAS, [Powell, 2007] R. Powell. Defening against terrorist attacks with limite resources. American Political Science Review, 101(3): , [Roughgaren an Taros, 2002] T. Roughgaren an É. Taros. How ba is selfish routing? Journal of the ACM, 49(2): , [Shieh et al., 2012] E. Shieh, B. An, R. Yang, M. Tambe, C. Balwin, J. DiRenzo, B. Maule, an G. Meyer. Protect: A eploye game theoretic system to protect the ports of the unite states. In AAMAS, [Tambe, 2011] M. Tambe. Security an Game Theory: Algorithms, Deploye Systems, Lessons Learne. Cambrige University Press, New York, NY, [Yin et al., 2010] Z. Yin, D. Korzhyk, C. Kiekintvel, V. Conitzer, an M. Tambe. Stackelberg vs. nash in security games: Interchangeability, equivalence, an uniqueness. In AAMAS, 2010.

Modes of Convergence

Modes of Convergence Moes of Convergence Electrical Engineering 126 (UC Berkeley Spring 2018 There is only one sense in which a sequence of real numbers (a n n N is sai to converge to a limit. Namely, a n a if for every ε

More information

An investment strategy with optimal sharpe ratio

An investment strategy with optimal sharpe ratio The 22 n Annual Meeting in Mathematics (AMM 2017) Department of Mathematics, Faculty of Science Chiang Mai University, Chiang Mai, Thailan An investment strategy with optimal sharpe ratio S. Jansai a,

More information

Abstract Stanar Risk Aversion an the Deman for Risky Assets in the Presence of Backgroun Risk We consier the eman for state contingent claims in the p

Abstract Stanar Risk Aversion an the Deman for Risky Assets in the Presence of Backgroun Risk We consier the eman for state contingent claims in the p Stanar Risk Aversion an the Deman for Risky Assets in the Presence of Backgroun Risk Günter Franke 1, Richar C. Stapleton 2, an Marti G. Subrahmanyam. 3 November 2000 1 Fakultät für Wirtschaftswissenschaften

More information

REAL OPTION MODELING FOR VALUING WORKER FLEXIBILITY

REAL OPTION MODELING FOR VALUING WORKER FLEXIBILITY REAL OPTION MODELING FOR VALUING WORKER FLEXIBILITY Harriet Black Nembhar Davi A. Nembhar Ayse P. Gurses Department of Inustrial Engineering University of Wisconsin-Maison 53 University Avenue Maison,

More information

CDO TRANCHE PRICING BASED ON THE STABLE LAW VOLUME II: R ELAXING THE LHP. Abstract

CDO TRANCHE PRICING BASED ON THE STABLE LAW VOLUME II: R ELAXING THE LHP. Abstract CDO TRANCHE PRICING BASED ON THE STABLE LAW VOLUME II: R ELAXING THE ASSUMPTION German Bernhart XAIA Investment GmbH Sonnenstraße 9, 833 München, Germany german.bernhart@xaia.com First Version: July 26,

More information

CROSS-BORDER SHOPPING FROM SMALL TO LARGE COUNTRIES

CROSS-BORDER SHOPPING FROM SMALL TO LARGE COUNTRIES Copenhagen Business School Solbjerg Plas 3 DK-2000 Freeriksberg LEFIC WORKING PAPER 2002-06 CROSS-BORDER SHOPPING FROM SMALL TO LARGE COUNTRIES Søren Bo Nielsen www.cbs.k/lefic Cross-borer shopping from

More information

Capacity Constraint OPRE 6377 Lecture Notes by Metin Çakanyıldırım Compiled at 15:30 on Tuesday 22 nd August, 2017

Capacity Constraint OPRE 6377 Lecture Notes by Metin Çakanyıldırım Compiled at 15:30 on Tuesday 22 nd August, 2017 apacity onstraint OPRE 6377 Lecture Notes by Metin Çakanyılırım ompile at 5:30 on Tuesay 22 n August, 207 Solve Exercises. [Marginal Opportunity ost of apacity for Deman with onstant Elasticity] We suppose

More information

GAINS FROM TRADE UNDER MONOPOLISTIC COMPETITION

GAINS FROM TRADE UNDER MONOPOLISTIC COMPETITION bs_bs_banner Pacific Economic Review, 2: (206) pp. 35 44 oi: 0./468-006.250 GAINS FROM TRADE UNDER MONOPOLISTIC COMPETITION ROBERT C. FEENSTRA* University of California, Davis an National Bureau of Economic

More information

The Cascade Auction A Mechanism For Deterring Collusion In Auctions

The Cascade Auction A Mechanism For Deterring Collusion In Auctions The Cascade Auction A Mechanism For Deterring Collusion In Auctions Uriel Feige Weizmann Institute Gil Kalai Hebrew University and Microsoft Research Moshe Tennenholtz Technion and Microsoft Research Abstract

More information

PERFORMANCE OF THE CROATIAN INSURANCE COMPANIES - MULTICRITERIAL APPROACH

PERFORMANCE OF THE CROATIAN INSURANCE COMPANIES - MULTICRITERIAL APPROACH PERFORMANCE OF THE CROATIAN INSURANCE COMPANIES - MULTICRITERIAL APPROACH Davorka Davosir Pongrac Zagreb school of economics an management Joranovac 110, 10000 Zagreb E-mail: avorka.avosir@zsem.hr Višna

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Security Games with Interval Uncertainty

Security Games with Interval Uncertainty Security Games with Interval Uncertainty Christopher Kiekintveld, Towhidul Islam, Vladick Kreinovich Computer Science Department, University of Texas at El Paso cdkiekintveld@utep.edu, mislam2@miners.utep.edu,

More information

Exchange Rate Risk Sharing Contract with Risk-averse Firms

Exchange Rate Risk Sharing Contract with Risk-averse Firms 03 International Conference on Avances in Social Science, Humanities, an anagement ASSH 03 Exchange ate isk Sharing Contract with isk-averse Firms LIU Yang, A Yong-kai, FU Hong School of anagement an Economics,

More information

A NOTE ON THE DYNAMIC ROLE OF MONOPOLISTIC COMPETITION IN THE MONETARY ECONOMY. abstract

A NOTE ON THE DYNAMIC ROLE OF MONOPOLISTIC COMPETITION IN THE MONETARY ECONOMY. abstract A NOTE ON THE DYNAMIC ROLE OF MONOPOLISTIC COMPETITION IN THE MONETARY ECONOMY abstract In the new Keynesian economics, monopolistic competition plays an important role. Much static research is base on

More information

Repos, Fire Sales, and Bankruptcy Policy

Repos, Fire Sales, and Bankruptcy Policy Repos, Fire Sales, an Bankruptcy Policy Gaetano Antinolfi Francesca Carapella Charles Kahn Antoine Martin Davi Mills E Nosal Preliminary an Incomplete May 25, 2012 Abstract The events from the 2007-2009

More information

Appendix. Confidence Banking and Strategic Default. Guillermo Ordoñez. University of Pennsylvania and NBER

Appendix. Confidence Banking and Strategic Default. Guillermo Ordoñez. University of Pennsylvania and NBER Appenix Confience Banking an Strategic Default Guillermo Oroñez University of Pennsylvania an NBER 1 Proofs 1.1 Proof of Proposition 1 Since s ( ) is the signal that makes a goo firm with a given reputation

More information

The efficiency of fair division

The efficiency of fair division The efficiency of fair division Ioannis Caragiannis, Christos Kaklamanis, Panagiotis Kanellopoulos, and Maria Kyropoulou Research Academic Computer Technology Institute and Department of Computer Engineering

More information

Full file at

Full file at Chapter 2 Supply an eman Analysis Solutions to Review uestions 1. Excess eman occurs when price falls below the equilibrium price. In this situation, consumers are emaning a higher quantity than is being

More information

A GENERALIZED COUPON COLLECTOR PROBLEM

A GENERALIZED COUPON COLLECTOR PROBLEM J. Appl. Prob. 48, 08 094 (20) Printe in Englan Applie Probability Trust 20 A GENERALIZED COUPON COLLECTOR PROBLEM WEIYU XU an A. KEVIN TANG, Cornell University Abstract This paper presents an analysis

More information

Numerical solution of conservation laws applied to the Shallow Water Wave Equations

Numerical solution of conservation laws applied to the Shallow Water Wave Equations Numerical solution of conservation laws applie to the Shallow Water Wave Equations Stephen G Roberts Mathematical Sciences Institute, Australian National University Upate January 17, 2013 (base on notes

More information

Econ 101A Final exam May 14, 2013.

Econ 101A Final exam May 14, 2013. Econ 101A Final exam May 14, 2013. Do not turn the page until instructed to. Do not forget to write Problems 1 in the first Blue Book and Problems 2, 3 and 4 in the second Blue Book. 1 Econ 101A Final

More information

Appendix B: Yields and Yield Curves

Appendix B: Yields and Yield Curves Pension Finance By Davi Blake Copyright 006 Davi Blake Appenix B: Yiels an Yiel Curves Bons, with their regular an generally reliable stream of payments, are often consiere to be natural assets for pension

More information

A Game Theoretic Model of Deposit Contracts between the Bank and the Depositor - Extend Study on the Economic Analysis of Bank Run

A Game Theoretic Model of Deposit Contracts between the Bank and the Depositor - Extend Study on the Economic Analysis of Bank Run wwwscieuca/ijfr International Journal of Financial Research Vol 5, No 3; 04 A Game Theoretic Moel of Deposit Contracts between the Bank an the Depositor - Exten Stuy on the Economic Analysis of Bank Run

More information

Contagion and Observability In Security Domains

Contagion and Observability In Security Domains Contagion and Observability In Security Domains Yoram Bachrach, Moez Draief and Sanjeev Goyal Abstract We examine security domains where defenders choose their security levels in the face of a possible

More information

CS364A: Algorithmic Game Theory Lecture #14: Robust Price-of-Anarchy Bounds in Smooth Games

CS364A: Algorithmic Game Theory Lecture #14: Robust Price-of-Anarchy Bounds in Smooth Games CS364A: Algorithmic Game Theory Lecture #14: Robust Price-of-Anarchy Bounds in Smooth Games Tim Roughgarden November 6, 013 1 Canonical POA Proofs In Lecture 1 we proved that the price of anarchy (POA)

More information

In Class Exercises. Problem 1

In Class Exercises. Problem 1 In Class Exercises Problem 1 A group of n students go to a restaurant. Each person will simultaneously choose his own meal but the total bill will be shared amongst all the students. If a student chooses

More information

Deterrence and Risk Preferences in Sequential Attacker Defender Games with Continuous Efforts

Deterrence and Risk Preferences in Sequential Attacker Defender Games with Continuous Efforts Risk Analysis DOI:./risa.768 Deterrence an Risk Preferences in Sequential Attacker Defener Games with Continuous Efforts Vineet M. Payappalli, Jun Zhuang,, an Victor Richmon R. Jose Most attacker efener

More information

Key words: financial intermediation, entrepreneurship, economic growth

Key words: financial intermediation, entrepreneurship, economic growth DEPARTMENT OF ECONOMICS ISSN 1441-5429 DISCUSSION PAPER 18/07 FINANCIA INTERMEDIATION, ENTREPRENEURSHIP AND ECONOMIC GROWTH Wenli Cheng * Abstract: This paper presents a simple general equilibrium moel

More information

Complexity of Iterated Dominance and a New Definition of Eliminability

Complexity of Iterated Dominance and a New Definition of Eliminability Complexity of Iterated Dominance and a New Definition of Eliminability Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu

More information

A Costless Way to Increase Equity

A Costless Way to Increase Equity A Costless Way to Increase Equity Raphael Flore October 27, 2016 Abstract This paper complements stanar theories of optimal capital structure by allowing firms to invest in the financial markets in which

More information

Dynamic Pricing through Customer Discounts for Optimizing Multi-Class Customers Demand Fulfillment

Dynamic Pricing through Customer Discounts for Optimizing Multi-Class Customers Demand Fulfillment Dynamic Pricing through Customer Discounts for Optimizing ulti-class Customers Deman Fulfillment Qing Ding Panos Kouvelis an Joseph ilner# John. Olin School of Business Washington University St. Louis,

More information

Data Center Demand Response in Deregulated Electricity Markets

Data Center Demand Response in Deregulated Electricity Markets Data Center Deman Response in Deregulate Electricity Markets Shahab Bahrami, Stuent Member, IEEE, Vincent W.S. Wong, Fellow, IEEE, an Jianwei Huang, Fellow, IEEE Abstract With the evelopment of eregulate

More information

March 30, Why do economists (and increasingly, engineers and computer scientists) study auctions?

March 30, Why do economists (and increasingly, engineers and computer scientists) study auctions? March 3, 215 Steven A. Matthews, A Technical Primer on Auction Theory I: Independent Private Values, Northwestern University CMSEMS Discussion Paper No. 196, May, 1995. This paper is posted on the course

More information

The Comprehensive Business Income Tax System: A Proposal for Ultimate Neutrality between Debt and New Equity Issues?

The Comprehensive Business Income Tax System: A Proposal for Ultimate Neutrality between Debt and New Equity Issues? International Journal of Sciences: Basic an Applie Research (IJSBAR) ISSN 2307-4531 (Print & Online) http://gssrr.org/inex.php?journaljournalofbasicanapplie ---------------------------------------------------------------------------------------------------------------------------

More information

transfers in orer to keep income of the hospital sector unchange, then a larger welfare gain woul be obtaine, even if the government implements a bala

transfers in orer to keep income of the hospital sector unchange, then a larger welfare gain woul be obtaine, even if the government implements a bala The Impact of Marginal Tax Reforms on the Supply of Health Relate Services in Japan * Ryuta Ray Kato 1. Introuction This paper presents a computable general equilibrium (CGE) framework to numerically examine

More information

Econ 101A Final exam May 14, 2013.

Econ 101A Final exam May 14, 2013. Econ 101A Final exam May 14, 2013. Do not turn the page until instructed to. Do not forget to write Problems 1 in the first Blue Book and Problems 2, 3 and 4 in the second Blue Book. 1 Econ 101A Final

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Options an Their Analytic Pricing Formulas II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

SPLITTING FIELDS KEITH CONRAD

SPLITTING FIELDS KEITH CONRAD SPLITTING FIELDS EITH CONRAD 1. Introuction When is a fiel an f(t ) [T ] is nonconstant, there is a fiel extension / in which f(t ) picks up a root, say α. Then f(t ) = (T α)g(t ) where g(t ) [T ] an eg

More information

Data Center Demand Response in Deregulated Electricity Markets

Data Center Demand Response in Deregulated Electricity Markets This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content may change prior to final publication. Citation information: DOI 0.09/TSG.208.280830,

More information

Coherent small area estimates for skewed business data

Coherent small area estimates for skewed business data Coherent small area estimates for skewe business ata Thomas Zimmermann Ralf Münnich Abstract The eman for reliable business statistics at isaggregate levels such as NACE classes increase consierably in

More information

HW Consider the following game:

HW Consider the following game: HW 1 1. Consider the following game: 2. HW 2 Suppose a parent and child play the following game, first analyzed by Becker (1974). First child takes the action, A 0, that produces income for the child,

More information

NBER WORKING PAPER SERIES PROFIT SHIFTING AND TRADE AGREEMENTS IN IMPERFECTLY COMPETITIVE MARKETS. Kyle Bagwell Robert W. Staiger

NBER WORKING PAPER SERIES PROFIT SHIFTING AND TRADE AGREEMENTS IN IMPERFECTLY COMPETITIVE MARKETS. Kyle Bagwell Robert W. Staiger NBER WORKING PAPER SERIES PROFIT SHIFTING AND TRADE AGREEMENTS IN IMPERFECTLY COMPETITIVE MARKETS Kyle Bagwell Robert W. Staiger Working Paper 14803 http://www.nber.org/papers/w14803 NATIONAL BUREAU OF

More information

The Deployment-to-Saturation Ratio in Security Games (Online Appendix)

The Deployment-to-Saturation Ratio in Security Games (Online Appendix) The Deployment-to-Saturation Ratio in Security Games (Online Appendix) Manish Jain manish.jain@usc.edu University of Southern California, Los Angeles, California 989. Kevin Leyton-Brown kevinlb@cs.ubc.edu

More information

The use of Expected Utility Theory (EUT) in Taxpayers Behaviour Modelling

The use of Expected Utility Theory (EUT) in Taxpayers Behaviour Modelling American Journal of Applie Sciences Original Research Paper The use of Expecte Utility Theory (EUT) in Taxpayers Behaviour Moelling Fari Ameur an Mohame Tkiouat Stuies an Research Laboratory in Applie

More information

New Trade Models, New Welfare Implications

New Trade Models, New Welfare Implications New rae Moels, New Welfare Implications he Harvar community has mae this article openly available. Please share how this access benefits you. Your story matters Citation Melitz, Marc J., an Stephen J.

More information

Forecast Horizons for Production Planning with Stochastic Demand

Forecast Horizons for Production Planning with Stochastic Demand Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December

More information

Maximizing Winnings on Final Jeopardy!

Maximizing Winnings on Final Jeopardy! Maximizing Winnings on Final Jeopardy! Jessica Abramson, Natalie Collina, and William Gasarch August 2017 1 Abstract Alice and Betty are going into the final round of Jeopardy. Alice knows how much money

More information

An Evaluation of Shareholder Activism

An Evaluation of Shareholder Activism An Evaluation of Shareholer Activism Barbara G. Katz Stern School of Business, New York University 44 W. 4th St., New York, NY 10012 bkatz@stern.nyu.eu; tel: 212 998 0865; fax: 212 995 4218 corresponing

More information

Assessment of Acceptance Sampling Plans Using Posterior Distribution for a Dependent Process

Assessment of Acceptance Sampling Plans Using Posterior Distribution for a Dependent Process Rochester Institute of Technology RIT Scholar Works Articles 1-21-2010 Assessment of Acceptance Sampling Plans Using Posterior Distribution for a Depenent Process A. Erhan Mergen Rochester Institute of

More information

Comparative Study between Linear and Graphical Methods in Solving Optimization Problems

Comparative Study between Linear and Graphical Methods in Solving Optimization Problems Comparative Study between Linear and Graphical Methods in Solving Optimization Problems Mona M Abd El-Kareem Abstract The main target of this paper is to establish a comparative study between the performance

More information

P. Manju Priya 1, M.Phil Scholar. G. Michael Rosario 2, Associate Professor , Tamil Nadu, INDIA)

P. Manju Priya 1, M.Phil Scholar. G. Michael Rosario 2, Associate Professor , Tamil Nadu, INDIA) International Journal of Computational an Applie Mathematics. ISSN 89-4966 Volume, Number (07 Research Inia Publications http://www.ripublication.com AN ORDERING POLICY UNDER WO-LEVEL RADE CREDI POLICY

More information

Introduction to Financial Derivatives

Introduction to Financial Derivatives 55.444 Introuction to Financial Derivatives Week of December n, 3 he Greeks an Wrap-Up Where we are Previously Moeling the Stochastic Process for Derivative Analysis (Chapter 3, OFOD) Black-Scholes-Merton

More information

The Joint Dynamics of Electricity Spot and Forward Markets: Implications on Formulating Dynamic Hedging Strategies

The Joint Dynamics of Electricity Spot and Forward Markets: Implications on Formulating Dynamic Hedging Strategies Energy Laboratory MI EL 00-005 Massachusetts Institute of echnology he Joint Dynamics of Electricity Spot an Forwar Markets: Implications on Formulating Dynamic Heging Strategies ovember 2000 he Joint

More information

An efficient method for computing the Expected Value of Sample Information. A non-parametric regression approach

An efficient method for computing the Expected Value of Sample Information. A non-parametric regression approach ScHARR Working Paper An efficient metho for computing the Expecte Value of Sample Information. A non-parametric regression approach Mark Strong,, eremy E. Oakley 2, Alan Brennan. School of Health an Relate

More information

OPTIMAL DYNAMIC MECHANISM DESIGN WITH DEADLINES

OPTIMAL DYNAMIC MECHANISM DESIGN WITH DEADLINES OPTIMAL DYNAMIC MECHANISM DESIGN WITH DEADLINES KONRAD MIERENDORFF Abstract. A seller maximizes revenue from selling an object in a ynamic environment, with buyers that iffer in their patience: Each buyer

More information

6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015)

6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015) 6th International Conference on Electronics Mechanics Culture an Meicine (EMCM 2015) esearch on the Evolution Mechanism an Countermeasures of Green Builing Market Base on Evolutionary Game Theory Zhongfu

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors

Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors Socially-Optimal Design of Crowdsourcing Platforms with Reputation Update Errors 1 Yuanzhang Xiao, Yu Zhang, and Mihaela van der Schaar Abstract Crowdsourcing systems (e.g. Yahoo! Answers and Amazon Mechanical

More information

Exercises Solutions: Oligopoly

Exercises Solutions: Oligopoly Exercises Solutions: Oligopoly Exercise - Quantity competition 1 Take firm 1 s perspective Total revenue is R(q 1 = (4 q 1 q q 1 and, hence, marginal revenue is MR 1 (q 1 = 4 q 1 q Marginal cost is MC

More information

Commitment in First-price Auctions

Commitment in First-price Auctions Commitment in First-price Auctions Yunjian Xu and Katrina Ligett November 12, 2014 Abstract We study a variation of the single-item sealed-bid first-price auction wherein one bidder (the leader) publicly

More information

Maximizing Winnings on Final Jeopardy!

Maximizing Winnings on Final Jeopardy! Maximizing Winnings on Final Jeopardy! Jessica Abramson, Natalie Collina, and William Gasarch August 2017 1 Introduction Consider a final round of Jeopardy! with players Alice and Betty 1. We assume that

More information

University of Windsor Faculty of Business Administration Winter 2001 Mid Term Examination: units.

University of Windsor Faculty of Business Administration Winter 2001 Mid Term Examination: units. Time: 1 hour 20 minutes University of Winsor Faculty of Business Aministration Winter 2001 Mi Term Examination: 73-320 Instructors: Dr. Y. Aneja NAME: LAST (PLEASE PRINT) FIRST Stuent ID Number: Signature:

More information

Chapter 7. Chapter Outline. Asset Market Equilibrium. Money and Other Assets. The Functions of Money. What is Money?

Chapter 7. Chapter Outline. Asset Market Equilibrium. Money and Other Assets. The Functions of Money. What is Money? Chapter Outline Chapter 7 The Asset arket, oney, an Prices oney an acroeconomics What Is oney? The Supply of oney Portfolio Allocation an the Deman for oney Asset arket Equilibrium oney Growth an Inflation

More information

If you have ever spoken with your grandparents about what their lives were like

If you have ever spoken with your grandparents about what their lives were like CHAPTER 7 Economic Growth I: Capital Accumulation an Population Growth The question of growth is nothing new but a new isguise for an age-ol issue, one which has always intrigue an preoccupie economics:

More information

2. Lattice Methods. Outline. A Simple Binomial Model. 1. No-Arbitrage Evaluation 2. Its relationship to risk-neutral valuation.

2. Lattice Methods. Outline. A Simple Binomial Model. 1. No-Arbitrage Evaluation 2. Its relationship to risk-neutral valuation. . Lattice Methos. One-step binomial tree moel (Hull, Chap., page 4) Math69 S8, HM Zhu Outline. No-Arbitrage Evaluation. Its relationship to risk-neutral valuation. A Simple Binomial Moel A stock price

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Chapter 6: Mixed Strategies and Mixed Strategy Nash Equilibrium

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2017

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2017 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2017 These notes have been used and commented on before. If you can still spot any errors or have any suggestions for improvement, please

More information

Keywords: corporate income tax, source of finance, imputation tax system, full imputation tax system, split rate system.

Keywords: corporate income tax, source of finance, imputation tax system, full imputation tax system, split rate system. Ilija Gruevski; Corporate taxes an their potential effects on investment Ilija GRUEVSKI * UDC 336.226.12:330.322.54 Professional paper CORPORATE TAXES AND THEIR POTENTIAL EFFECTS ON INVESTMENT Abstract

More information

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference. 14.126 GAME THEORY MIHAI MANEA Department of Economics, MIT, 1. Existence and Continuity of Nash Equilibria Follow Muhamet s slides. We need the following result for future reference. Theorem 1. Suppose

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren October, 2013 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

OPEN BUDGET QUESTIONNAIRE CAMEROON

OPEN BUDGET QUESTIONNAIRE CAMEROON International Buget Project OPEN BUDGET QUESTIONNAIRE CAMEROON October 2005 International Buget Project Center on Buget an Policy Priorities 820 First Street, NE Suite 510 Washington, DC 20002 www.internationalbuget.org

More information

Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania

Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania Financial Fragility A Global-Games Approach Itay Goldstein Wharton School, University of Pennsylvania Financial Fragility and Coordination Failures What makes financial systems fragile? What causes crises

More information

Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions

Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions Maria-Florina Balcan Avrim Blum Yishay Mansour February 2007 CMU-CS-07-111 School of Computer Science Carnegie

More information

Environmental regulation incidence towards international oligopolies: pollution taxes vs emission permits

Environmental regulation incidence towards international oligopolies: pollution taxes vs emission permits Environmental regulation incience towars international oligopolies: pollution taxes vs emission permits Florent PRATLONG 22 ERASME an EUREQua Université Paris I Panthon-Sorbonne March, 2004 Preliminary

More information

Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index

Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index Parallel Accommodating Conduct: Evaluating the Performance of the CPPI Index Marc Ivaldi Vicente Lagos Preliminary version, please do not quote without permission Abstract The Coordinate Price Pressure

More information

PAULI MURTO, ANDREY ZHUKOV

PAULI MURTO, ANDREY ZHUKOV GAME THEORY SOLUTION SET 1 WINTER 018 PAULI MURTO, ANDREY ZHUKOV Introduction For suggested solution to problem 4, last year s suggested solutions by Tsz-Ning Wong were used who I think used suggested

More information

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015. FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.) Hints for Problem Set 2 1. Consider a zero-sum game, where

More information

1. An insurance company models claim sizes as having the following survival function. 25(x + 1) (x 2 + 2x + 5) 2 x 0. S(x) =

1. An insurance company models claim sizes as having the following survival function. 25(x + 1) (x 2 + 2x + 5) 2 x 0. S(x) = ACSC/STAT 373, Actuarial Moels I Further Probability with Applications to Actuarial Science WINTER 5 Toby Kenney Sample Final Eamination Moel Solutions This Sample eamination has more questions than the

More information

Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants

Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants Impact of Imperfect Information on the Optimal Exercise Strategy for Warrants April 2008 Abstract In this paper, we determine the optimal exercise strategy for corporate warrants if investors suffer from

More information

THE SELECTION OF ACTUARIAL ASSUMPTIONS IN AN UNSTABLE ECONOMY, MEXICO A CASE HISTORY MARCELA FLORES QU IROZ BUFETE DE CONSULTORIA ACTUARIAL, MEXICO

THE SELECTION OF ACTUARIAL ASSUMPTIONS IN AN UNSTABLE ECONOMY, MEXICO A CASE HISTORY MARCELA FLORES QU IROZ BUFETE DE CONSULTORIA ACTUARIAL, MEXICO THE SELECTION OF ACTUARIAL ASSUMPTIONS IN AN UNSTABLE ECONOMY, MEXICO A CASE HISTORY I MARCELA FLORES QU IROZ BUFETE DE CONSULTORIA ACTUARIAL, MEXICO When an economy unergoes rastic variations of the macroeconomic

More information

Game-theoretic Resource Allocation with Real-time Probabilistic Surveillance Information

Game-theoretic Resource Allocation with Real-time Probabilistic Surveillance Information Game-theoretic Resource Allocation with Real-time Probabilistic Surveillance Information Wenjun Ma, Weiru Liu, and Kevin McAreavey School of EEECS, Queen s University Belfast {w.ma, w.liu, kevin.mcareavey}@qub.ac.uk

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India October 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India October 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India October 22 COOPERATIVE GAME THEORY Correlated Strategies and Correlated

More information

Liquidity Hoarding 1

Liquidity Hoarding 1 Liquiity Hoaring Douglas Gale New York University Tanju Yorulmazer 3 Feeral Reserve Bank of New York 9 August, The views expresse here are those of the authors an o not necessarily represent the views

More information

Investing and Price Competition for Multiple Bands of Unlicensed Spectrum

Investing and Price Competition for Multiple Bands of Unlicensed Spectrum Investing and Price Competition for Multiple Bands of Unlicensed Spectrum Chang Liu EECS Department Northwestern University, Evanston, IL 60208 Email: changliu2012@u.northwestern.edu Randall A. Berry EECS

More information

Linking the Negative Binomial and Logarithmic Series Distributions via their Associated Series

Linking the Negative Binomial and Logarithmic Series Distributions via their Associated Series Revista Colombiana e Estaística Diciembre 2008, volumen 31, no. 2, pp. 311 a 319 Linking the Negative Binomial an Logarithmic Series Distributions via their Associate Series Relacionano las istribuciones

More information

Dynamic Accumulation Model for the Second Pillar of the Slovak Pension System

Dynamic Accumulation Model for the Second Pillar of the Slovak Pension System UDC: 368.914(437.6) JEL classification: C1, E27, G11, G23 Keywors: ynamic stochastic programming; fune pillar; utility function; Bellman equation; Slovak pension system; risk aversion; pension portfolio

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

ISSN BWPEF Uninformative Equilibrium in Uniform Price Auctions. Arup Daripa Birkbeck, University of London.

ISSN BWPEF Uninformative Equilibrium in Uniform Price Auctions. Arup Daripa Birkbeck, University of London. ISSN 1745-8587 Birkbeck Working Papers in Economics & Finance School of Economics, Mathematics and Statistics BWPEF 0701 Uninformative Equilibrium in Uniform Price Auctions Arup Daripa Birkbeck, University

More information

January 26,

January 26, January 26, 2015 Exercise 9 7.c.1, 7.d.1, 7.d.2, 8.b.1, 8.b.2, 8.b.3, 8.b.4,8.b.5, 8.d.1, 8.d.2 Example 10 There are two divisions of a firm (1 and 2) that would benefit from a research project conducted

More information

Regret Minimization and Security Strategies

Regret Minimization and Security Strategies Chapter 5 Regret Minimization and Security Strategies Until now we implicitly adopted a view that a Nash equilibrium is a desirable outcome of a strategic game. In this chapter we consider two alternative

More information

A Rare Move: The Effect of Switching from a Closing Call. Auction to a Continuous Trading

A Rare Move: The Effect of Switching from a Closing Call. Auction to a Continuous Trading A Rare Move: The Effect of Switching from a Closing Call Auction to a Continuous Traing Ya-Kai Chang Department of Finance College of Business Chung Yuan Christian University Robin K. Chou Department of

More information

Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions

Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions Single Price Mechanisms for Revenue Maximization in Unlimited Supply Combinatorial Auctions Maria-Florina Balcan Avrim Blum Yishay Mansour December 7, 2006 Abstract In this note we generalize a result

More information

10.1 Elimination of strictly dominated strategies

10.1 Elimination of strictly dominated strategies Chapter 10 Elimination by Mixed Strategies The notions of dominance apply in particular to mixed extensions of finite strategic games. But we can also consider dominance of a pure strategy by a mixed strategy.

More information

A d-step Approach for Distinct Squares in Strings

A d-step Approach for Distinct Squares in Strings A -step Approach for Distinct Squares in Strings Mei Jiang Joint work with Antoine Deza an Frantisek Franek Department of Computing an Software McMaster University LSD & LAW, Feb 2011 Outline 1 Introuction

More information

Chapter 21: Option Valuation

Chapter 21: Option Valuation Chapter 21: Option Valuation-1 Chapter 21: Option Valuation I. The Binomial Option Pricing Moel Intro: 1. Goal: to be able to value options 2. Basic approach: 3. Law of One Price: 4. How it will help:

More information

Dynamic Demand for New and Used Durable Goods without Physical Depreciation: The Case of Japanese Video Games

Dynamic Demand for New and Used Durable Goods without Physical Depreciation: The Case of Japanese Video Games Dynamic Deman for New an Use Durable Goos without Physical Depreciation: The Case of Japanese Vieo Games Masakazu Ishihara Stern School of Business New York University Anrew Ching Rotman School of Management

More information

Introduction to Financial Derivatives

Introduction to Financial Derivatives 55.444 Introuction to Financial Derivatives Week of December 3 r, he Greeks an Wrap-Up Where we are Previously Moeling the Stochastic Process for Derivative Analysis (Chapter 3, OFOD) Black-Scholes-Merton

More information

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010 May 19, 2010 1 Introduction Scope of Agent preferences Utility Functions 2 Game Representations Example: Game-1 Extended Form Strategic Form Equivalences 3 Reductions Best Response Domination 4 Solution

More information

Outline for today. Stat155 Game Theory Lecture 13: General-Sum Games. General-sum games. General-sum games. Dominated pure strategies

Outline for today. Stat155 Game Theory Lecture 13: General-Sum Games. General-sum games. General-sum games. Dominated pure strategies Outline for today Stat155 Game Theory Lecture 13: General-Sum Games Peter Bartlett October 11, 2016 Two-player general-sum games Definitions: payoff matrices, dominant strategies, safety strategies, Nash

More information

Game theory for. Leonardo Badia.

Game theory for. Leonardo Badia. Game theory for information engineering Leonardo Badia leonardo.badia@gmail.com Zero-sum games A special class of games, easier to solve Zero-sum We speak of zero-sum game if u i (s) = -u -i (s). player

More information