Terrorism and the Optimal Defense of Networks of Targets Dan Kovenock Brian Roberson

Size: px
Start display at page:

Download "Terrorism and the Optimal Defense of Networks of Targets Dan Kovenock Brian Roberson"

Transcription

1 Terrorsm and the Optmal efense of Networks of Targets an Kovenock ran Roberson Ths paper has benefted from the helpful comments of Ka Konrad and anel G. Arce as well as partcpants n presentatons at the 2006 Mdwest Economc Theory Meetngs, the 2008 Tournaments, Contests and Relatve Performance Evaluaton Conference held at North Carolna State Unversty, and the 2008 Contests: Theory and Applcatons Conference held at Stockhom School of Economcs. Part of ths work was completed whle Kovenock was Vstng Professor at the Socal Scence Research Center erln (WZ. Roberson gratefully acknowledges fnancal support from the Socal Scence Research Center erln (WZ, the Mam Unversty Commttee on Faculty Research, and the Farmer School of usness. The authors, of course, reman solely responsble for any errors or omssons. an Kovenock Purdue Unversty, epartment of Economcs, Krannert School of Management, 403 West State Street, West Lafayette, IN USA t: , f: , E-mal: kovenock@purdue.edu ran Roberson Mam Unversty, epartment of Economcs, Rchard T. Farmer School of usness, 208 Laws Hall, Oxford, OH USA t: , f: , E-mal: robersba@muoho.edu (Correspondent

2 Abstract Ths paper examnes a game-theoretc model of attack and defense of multple networks of targets n whch there exst ntra-network strategc complementartes among targets. The defender s objectve s to successfully defend all of the networks and the attacker s objectve s to successfully attack at least one network of targets. In ths context, our results hghlght the mportance of modelng asymmetrc attack and defense as a conflct between fully strategc actors wth endogenous entry and force expendture decsons as well as allowng for general correlaton structures for force expendtures wthn and across the networks of targets. 2 JEL Classfcaton: C7, 74 Keywords: Asymmetrc Conflct, Attack and efense, Weakest-Lnk, est-shot

3 3 1 Introducton In the lterature on optmal defense from ntentonal attack there has been growng nterest n not only the attack and defense of solated targets 1 but also networks of targets 2 and even complex supra-networks of targets. 3 Ths move towards ncreasng network complexty emphaszes the role that strategc complementartes among targets play n creatng structural asymmetres between the attack and defense of such combnatons of targets. For example n complex nfrastructure supra-networks such as communcaton systems, electrcal power grds, water and sewage systems, ol ppelne systems, transportaton systems, and cyber securty systems there often exst partcular targets or combnatons of targets whch f destroyed would be suffcent to ether: (a dsable the entre supra-network or (b create a terrorst spectacular. In order to hghlght the mportance of modelng the asymmetrc attack and defense of complex supra-networks as a conflct between fully strategc actors wth endogenous entry and force expendture decsons, we examne a contest-theoretc model of the attack and defense of a complex supra-network and allow for the players to use general correlaton structures for force expendtures wthn and across the networks of targets. The supra-network of targets s made up of an arbtrary combnaton of two smple types of networks whch capture the two extreme endponts of an exposure-redundency spectrum for network types. The maxmal exposure network, whch we label a weakest-lnk network, s successfully defended f and only f the defender successfully defends all targets wthn the network. 4 The maxmal redundancy network, whch we label a best-shot network, s successfully defended f the defender successfully defends at least one target wthn the network. At each target the conflct s modeled as a determnstc contest n whch the player who allocates the hgher level of force wns the target wth probablty one. Gven that the loss of a sngle network may be suffcent to ether dsable the entre supra-network or create a terrorst spectacular, we focus on the case that the attacker s 1 See for example er et al. (2007, Powell (2007a, b, and Rosendorff and Sandler ( See for example er and Abhchandan (2003, er et al. (2005, and Clark and Konrad ( See for example Azaez and er (2007, Hausken (2008, and Levtn and en-ham ( See Hrshlefer (1983 who cons the terms best-shot and weakest-lnk n the context of voluntary provson of publc goods.

4 objectve s to successfully attack a sngle network, and that the defender s objectve s to successfully defend all of the networks. A dstnctve feature of ths envronment s that a mxed strategy s a jont dstrbuton functon n whch the randomzaton n the force allocaton to each target s represented as a separate dmenson. A par of equlbrum jont dstrbuton functons specfes not only each player s randomzaton n force expendtures for each target but also the correlaton structure of the force expendtures wthn and across the networks of targets. For all parameter confguratons, we completely characterze the unque set of Nash equlbrum unvarate margnal dstrbutons for each player as well as the unque equlbrum payoff for each player. Furthermore, n any equlbrum we fnd that the attacker launches an attack on at most one network of targets, and there exst parameter confguratons for whch the attacker optmally launches no attack wth postve probablty. Whle at most one network s attacked, the attacker randomzes over whch network s attacked, and each of the networks s attacked wth postve probablty. In the event that a weakest-lnk network s attacked, the attacker optmally launches an attack on only a sngle target. When a best-shot network s attacked, the attacker optmally attacks every target n that network wth a strctly postve force level. As emphaszed n the Natonal Strategy for Homeland Securty, terrorsts are strategc actors. However, much of the exstng lterature [e.g. Azaez and er (2007, er and Abhchandan (2003, er et al. (2005, er et al. (2007, Levtn and en-ham (2008, Powell (2007a, b, and Rosendorff and Sandler (2004.] assumes that terrorsts (henceforth attackers are not fully strategc n the sense that the number of attacks (whch s usually set to one s exogenously specfed. y endogenzng the attacker s entry and force expendture decsons, we examne not only the condtons under whch the assumpton of one attack s lkely to hold, but also related ssues such as how the defender s actons can decrease the number of terrorst attacks. Furthermore, the few prevous models whch allow for the attacker to endogenously choose the number of targets to attack [e.g. Clark and Konrad (2007 and Hausken (2008] 5 obtan the result 5 Utlzng probablstc contest success functons [Clark and Konrad (2007 utlze the Tullock contest success functon, Hausken (2008 utlzes both the Tullock and dfference-form contest success functons], Clark and Konrad (2007 and Hausken (2008 examne a sngle weakest-lnk network and a supra-network consstng of any arbtrary combnaton of weakest-lnk and best-shot networks [as n ths paper, a successful attack on any one network s suffcent to dsable the entre supra-network], respectvely. 4

5 that even when the attacker s objectve s to dsable a sngle network and the attacker derves no addtonal beneft from successfully dsablng more than one network the attacker optmally chooses to attack every target n every network wth certanty. y showng that n all equlbra of our model the attacker optmally engages n a from of stochastc guerlla warfare n whch they attack at most one network of targets (but wth postve probablty each network s chosen as the one to be attacked, our results also provde a sharp contrast wth exstng models of fully strategc attackers. Secton 2 presents the model of attack and defense wth networks of targets. Secton 3 characterzes a Nash equlbrum and explores propertes of the equlbrum dstrbutons of force. Secton 4 concludes. 5 2 The Model Players The model s formally descrbed as follows. Two players, an attacker, A, and a defender,, smultaneously allocate ther forces across a fnte number, n 2, of heterogeneous targets. The players payoffs depend on the composton of each of the networks of targets n the supra-network. We examne a supra-network consstng of any arbtrary combnaton of two types of smple networks. The targets are parttoned nto a fnte number k 1 of dsjont networks, where network j {1,...,k} conssts of a fnte number n j 1 of targets wth k j=1 n j = n. Let N j denote the set of targets n network j. Let W denote the set of weakest-lnk networks and denote the set of best-shot networks. In a best-shot network the network s successfully defended f the defender allocates at least as hgh a level of force to at least one target wthn the network. Conversely, an attack on a best-shot network s successful f the attacker allocates a hgher level of force to each target n the network. Let x A (x denote the level of force allocated by the attacker (defender to target. efne ι 1 f N j x A j = > x. 0 otherwse Observe that for each target, the player that allocates the hgher level of force wns that target, but n order to wn the network the attacker must wn all of the targets. In a bestshot network, a te arses when player A allocates a level of force to each target n the

6 network that s at least as great as player s allocaton, and there exsts at least one target n the network to whch the players allocate the same level of force. In ths case, the defender wns the network. In the second type of network, whch we label a weakest-lnk network, the network s successfully defended f the defender allocates at least as hgh a level of force to all targets wthn the network. Conversely, an attack on a weakest-lnk network s successful f the attacker allocates a hgher level of force to any target n the network. efne ι W 1 f N j x A j = > x. 0 otherwse Agan, n the case of a te, the defender s assumed to wn the network. The players are rsk neutral and have asymmetrc objectves. The attacker s objectve s to successfully attack at least one network, and the attacker s payoff for the successful attack of at least one network s. The attacker s payoff functon s gven by ( {ι } π A (x A,x = max j j,{ ι W j } j W n x A =1 The defender s objectve s to preserve the entre supra-network, and the defender s payoff for successfully defendng the supra-network s v. The defender s payoff functon s gven by ( {ι } π (x A,x = v (1 max j j,{ ι W j } j W The force allocated to each target must be nonnegatve. It s mportant to note that our formulaton utlzes the all-pay aucton contest success functon. 6 Wthn the all-pay aucton lterature t s well known that the equlbrum of the game n whch the players have dfferng unt costs of resources s equvalent up to a lnear scalng of the equlbrum of the game wth asymmetrc valuatons. Ths result extends drectly to the envronment examned here, and thus, our focus on asymmetrc valuatons also covers the case n whch the players have dfferng unt costs of resources. Also observe that n the formulaton descrbed above the supra-network s a weakestlnk supra-network. That s f the defender loses a sngle network then the entre supranetwork s noperable. y nterchangng the denttes of player A and player, our 6 See aye, Kovenock, and de Vres (1996. n =1 x. 6

7 results on weakest-lnk supra-networks apply drectly to the case of best-shot supranetworks (where a best-shot supra-network s a supra-network whch s successfully defended f the defender successfully defends at least one network. Fgure 1 provdes a representatve supra-network consstng of 5 networks (A,, C,, and E. Networks A, C, and E are weakest-lnk (seres networks wth two targets each. Networks and are best-shot (parallel networks wth fve targets each. In order to preserve the entre supra-network player s objectve s to preserve a path across the entre network. If a sngle target n networks A, C, or E s destroyed then the supra-network s noperable. Conversely, n networks and all of the targets must be destroyed n order to render the supra-network noperable. 7 [Insert Fgure 1 here] Strateges It s clear that there s no pure strategy equlbrum for ths class of games. A mxed strategy, whch we term a dstrbuton of force, for player s an n-varate dstrbuton functon P : R n + [0,1]. The n-tuple of player s allocaton of force across the n targets s a random n-tuple drawn from the n-varate dstrbuton functon P. Model of Attack and efense wth Networks of Targets The model of attack and defense wth networks of targets, whch we label { {Nj } AN j,{ } N j j W,,v }, s the one-shot game n whch players compete by smultaneously announcng dstrbutons of force, each target s won by the player that provdes the hgher allocaton of force for that target, tes are resolved as descrbed above, and players payoffs, π A and π, are specfed above. 3 Optmal strbutons of Force It wll be useful to ntroduce a smple summary statstc whch captures both the asymmetry n the players valuatons and the structural asymmetres arsng n the supranetwork.

8 efnton 1 Let α = v /( [ j W n j + j 1 n j ] denote the normed relatve strength of the defender. Several propertes of ths summary statstc should be noted. Frst, the normed relatve strength of the defender s ncreasng n the relatve valuaton of the defender to the attacker (v /, and s decreasng n the level of exposure arsng n the supra-network ( j W n j + j 1 n j. In partcular, the defender s exposure s ncreasng n the number of weakest-lnk targets ( j W n j, and s decreasng n the number of targets wthn each best-shot network ( j 1 n j. For all parameter ranges, Theorem 1 establshes the unqueness of: ( the players equlbrum expected payoffs and ( the players sets of unvarate margnal dstrbutons. Theorem 1 also provdes a par of equlbrum dstrbutons of force for all parameters ranges. Case (1 of Theorem 1 examnes the parameter confguratons for whch the defender has a normed relatve strength advantage,.e. α 1. Case (2 of Theorem 1 addresses the parameter confguratons for whch the defender has a normed relatve strength dsadvantage,.e. α < 1. It s mportant to note that the stated equlbrum dstrbutons of force (n-varate dstrbutons are not unque. However, n Propostons 1-3 we characterze propertes of optmal attack and defense that hold n all equlbra. Theorem 1 For all feasble parameter fguratons of the game AN{{N j } j,{n j } j W,,v } (.e.,,v > 0 and N j /0 for all j there exsts a unque set of Nash equlbrum unvarate margnal dstrbutons and a unque equlbrum payoff for each player. One such equlbrum s for each player to allocate hs forces accordng to the followng n-varate dstrbuton functons. (1 If α 1, then for player A and x j W [0, ] n j j [0, n j ] n j P A (x = 1 1 α + j W Nj x + j mn Nj {x } v Smlarly for player and x j W [0, ] n j j [0, n j ] n j P (x = mn { { mn Nj x } } j W, { } Nj x The expected payoff for player A s 0, and the expected payoff for player s v (1 1 α. j 8

9 9 (2 If α < 1, then for player A and x j W [0,α ] n j j [0, α n j ] n j P A (x = j W Nj x + j mn Nj {x } v Smlarly for player and x j W [0,α ] n j j [0, α n j ] n j ( {mn { x } } { N j Nj x } P (x = 1 α + mn, The expected payoff for player s 0, and the expected payoff for player A s (1 α. Proof The proof of the unqueness of the players equlbrum expected payoffs and sets of unvarate margnal dstrbutons s gven n the appendx. Ths proof establshes that the par of n-varate dstrbuton functons gven n case (1 consttute an equlbrum wthn the case (1 parameter range. The proof of case (2 s analogous. The appendx (see Lemma 5 establshes that n any n-tuple drawn from any equlbrum n-varate dstrbuton P A player A allocates a strctly postve level of force to at most one network of targets. If the network whch receves the strctly postve level of force s a weakestlnk network, then exactly one target n that network receves a strctly postve level of force. Whle not a necessary condton for equlbrum, the P A descrbed n Theorem 1 also dsplays the property that when the network whch receves the strctly postve level of force s a best-shot network the force allocated to each target n that network s an almost surely ncreasng functon of the force allocated to any of the other targets n that network. The appendx (see Lemma 5 also establshes that n any n-tuple drawn from any equlbrum n-varate dstrbuton P player allocates a strctly postve level of force to at most one target n each best-shot network of targets. We wll now show that for each player each pont n the support of ther equlbrum n-varate dstrbuton functon {P A,P } gven n case (1 of Theorem 1 results n the same expected payoff, and then show that there are no proftable devatons from ths support. We begn wth the case n whch player A attacks a sngle target n a sngle weakestlnk network. The probablty that player A wns target n network j W s gven by the unvarate margnal dstrbuton P (x A,{{} N j x =0} j W,{{ n } A j N } j j. Gven that player s usng the equlbrum strategy P descrbed above, the payoff to player A for any allocaton of force x A R n + whch allocates a strctly postve level of j W j

10 10 force to a sngle target n a weakest-lnk network j W s Smplfyng, π A (x A,P = P (x A x A. ( x π A (x A,P = A x A v = 0. A Thus the expected payoff to player A from allocatng a strctly postve level of force to only one target n any weakest-lnk network s 0 regardless of whch target s attacked. Next, we examne the case n whch player A attacks a sngle best-shot network. The probablty that player A wns every target n network j s gven by the n j -varate margnal dstrbuton P ({x A } N j,{{ } N j } j W,{{ n j } N j } j j j, whch we wll denote as P N j ({x A } N j. Gven that player s usng the equlbrum strategy P descrbed above, the payoff to player A for any allocaton of force x A R n + whch allocates a strctly postve level of force only to the targets n a best-shot network j, and allocates zero forces to every other network s Smplfyng, π A (x A,P = P N j π A (x A,P = ( Nj x A ( {x A } Nj N j x A. N j x A = 0. Thus, the expected payoff to player A from allocatng a strctly postve level of force to only one best-shot network s 0 regardless of whch best-shot network s attacked. For player A, possble devatons from the support nclude allocatng a strctly postve level of force to: (a two or more targets n the same weakest-lnk network, (b two or more targets n dfferent weakest-lnk networks, (c two or more best-shot networks, and (d any combnaton of both weakest-lnk and best-shot networks. egnnng wth (a, the probablty that player A wns both targets and n network j W s gven by the bvarate margnal dstrbuton P (x A,x A,{{} N j, } j W,{{ n } j N } j j, whch we wll denote as P, (x A,x A. The payoff to player A for any allocaton of force x A R n + whch allocates a strctly postve level of force to two targets, n a weakest-lnk network j W s π A (x A,P = P ( x A + va P ( x A P, ( x A,x A x A x A.

11 11 Smplfyng, π A (x A,P = x A + x A { mn x A,x A } x A x A < 0. The case of player A allocatng a strctly postve level of force to more than two targets n a weakest-lnk network follows drectly. Clearly, n any optmal strategy player A never allocates a strctly postve level of force to more than one target wthn a weakestlnk network. The proof for type (b devatons follows along smlar lnes. Thus, n any optmal strategy player A never allocates a strctly postve level of force to more than one target wthn a weakest-lnk network of targets or n dfferent weakest-lnk networks. For type (c devatons, the probablty that player A wns all of the targets n both best-shot networks j, j s gven by the (n j + n j -varate margnal dstrbuton P ({x A } N j N j,{{ } N } j j W,{{ n } j N } j j j j, j, whch we wll denote as P N ( j,n j {x A } N j N j. The payoff to player A for any allocaton of force x A R n + whch allocates a strctly postve level of force to exactly two best-shot networks j, j s π A (x A,P = P N j ( {x A } Nj + va P N j ( {x A } N j P N ( j,n j {x A } N j N j N j N j x A. Smplfyng, π A (x A,P = mn { Nj x A, } N x j A The case of player A allocatng a strctly postve level of force to more than two bestshot networks follows drectly. Clearly, n any optmal strategy player A never allocates a strctly postve level of force to more than one best-shot network. The case of type (d, follows along smlar lnes. Thus, the expected payoff from each pont n the support of the n-varate dstrbuton P A results n the same expected payoff, 0, and there exst no allocatons of force whch have a hgher expected payoff. The case for player follows along smlar lnes.

12 Whle the equlbrum dstrbutons of force stated n Theorem 1 are not unque, 7 t s useful to provde some ntuton regardng the exstence of ths partcular equlbrum before movng on to the characterzaton of propertes of optmal attack and defense that hold n all equlbra (Propostons 1-3. The supports of the equlbrum dstrbutons of force stated n Theorem 1 are gven n Fgure (2. Panels ( and ( of Fgure (2 provde the supports for the attacker and defender, respectvely, n the case that there s one weakest-lnk network wth two targets ( = 1,2. Panels ( and (v of Fgure (2 provde the supports for the attacker and defender, respectvely, n the case that there s one best-shot network wth two targets ( = 1,2 and one weakest-lnk network wth one target ( = [Insert Fgure 2] Across all of the Panels (-(v, f α = 1 then each player randomzes contnuously over ther respectve shaded lne segments. In the event that the defender has a normed relatve strength advantage (α > 1, the defender s strategy stays the same, but the attacker now places a mass pont of sze 1 (1/α at the orgn and randomzes contnuously over the respectve lne segments wth the remanng probablty. Conversely, f the defender does not have a normed relatve strength advantage (α < 1 then t s the defender who places a mass pont (of sze 1 α at the orgn. egnnng wth Panels ( and (, recall that f the attacker successfully attacks a sngle target n a weakest-lnk network the entre network s dsabled. As shown n Panel ( the attacker launches an attack on at most one target. To successfully defend a weakest-lnk network, the defender must wn every target wthn the network. As shown n Panel ( the defender s allocaton of force to target s an almost surely strctly ncreasng functon of the force allocated to target. Note that f the attacker launches an attack on at most one target, then the probablty that any sngle attack s successful depends only on the unvarate margnal dstrbutons of the defender s (n-varate jont 7 For example, n the case (1 parameter range of Theorem 1 another equlbrum strategy for player s to use the dstrbuton of force { Nj x } { Nj x } P (x = mn, j W j.

13 dstrbuton of force. In addton, the defender s expected force expendture depends only on hs set of unvarate margnal dstrbutons, and, for a gven set of unvarate margnal dstrbutons, s nvarant to the correlaton structure. 8 Fnally, note that for the gven correlaton structure n the defender s support [panel (] the probablty that the attacker launches at least one successful attack depends only on the maxmum of hs force allocatons across the two targets. That s, gven the defender s dstrbuton of force, f there exsts any ponts n the support of the attacker s dstrbuton of force n whch x A > x A > 0 wth postve probablty, then the attacker can strctly ncrease hs expected payoff by changng to x A 13 = 0 n all such ponts. In such a devaton, the probablty of at least one successful attack s unaffected, but the attacker s expected force expendture decreases. Thus, at each pont n the support of an optmal dstrbuton of force the attacker launches at most one attack. Panels ( and (v examne a smple supra-network wth one best-shot network and one weakest-lnk network. In Panel (, note that the attacker launches an attack on at most one network. In the event that the best-shot network s attacked, the attacker s allocaton of force to target s an almost surely strctly ncreasng functon of the force allocated to target. In Panel (v, note that the defender allocates a strctly postve level of force to at most one of the targets n the best-shot network, and that level of force allocated to the weakest-lnk network s an almost surely ncreasng functon of the level of force allocated to the best-shot network. Gven these correlaton structures, the ntuton for the attacker launchng an attack on at most one network n the supranetwork follows along the lnes gven above for the weakest-lnk network n whch at most one target was attacked. We now characterze the qualtatve features arsng n all equlbrum dstrbutons of force. Proposton 1 examnes the number of networks that are smultaneously attacked as well as the number of targets wthn each network that are smultaneously attacked and defended. Propostons 2 and 3 examne the lkelhood that the attacker optmally chooses to launch an attack on any gven network, and the lkelhood that the attacker launches no attack or the defender leaves the supra-network undefended. Proposton 1 In any equlbrum {P A,P }: 1. Player A allocates a strctly postve level of force to at most one network. 8 More formally, for a gven set of unvarate margnal dstrbuton functons, the expected force expendture s nvarant to the mappng nto a jont dstrbuton functon,.e. the n-copula.

14 2. If the network to whch player A allocates a strctly postve level of force s a weakest-lnk network, then at most one target n that weakest-lnk network receves a strctly postve level of force. 3. In each best-shot network player allocates a strctly postve level of force to at most one target n the network. The formal proof of Proposton 1 s gven n the appendx (see Lemma 5. The ntuton for Proposton 1 follows from the fact that the lkelhood that player successfully defends all of the networks (and therefore player s expected payoff s weakly decreasng n the number of networks that player A chooses to smultaneously attack. However, player has the ablty to vary the correlaton structure of hs force allocatons whle leavng nvarant: ( hs network specfc multvarate margnal dstrbutons of force, ( hs unvarate margnal dstrbutons of force, and ( hs expected expendture. Furthermore, there exst correlaton structures for whch the lkelhood that player successfully defends all of the networks depends only on player A s force allocaton to the one network whch receves the hghest level of force from player A. Gven that player s usng such a correlaton structure, player A optmally attacks at most one network at a tme. A smlar result extends drectly to (2 the case of weakest-lnk networks and to (3 the case of best-shot networks. Proposton 2 If α 1, then n any equlbrum {P A,P }: 1. The probablty that any weakest-lnk network j s attacked (.e., the probablty that the attacker allocates a strctly postve level of force to weakest-lnk network j s (n j /v, whch s ncreasng n the number of targets n network j and the attacker s valuaton of success and decreasng n the defender s valuaton of successfully defendng the entre supra-network. 2. The probablty that any best-shot network j s attacked s ( /(n j v, whch s ncreasng n the attacker s valuaton of success and s decreasng n both the defender s valuaton and the number of targets n network j. 3. The attacker optmally attacks no network n the supra-network wth probablty 1 (1/α. For the attacker s jont dstrbuton, the appendx characterzes the attacker s mass pont at the orgn (see Lemma 9 as well as hs set of unvarate margnal dstrbutons. Proposton 2 follows drectly. The probablty that a network j s attacked s equal to one mnus the attacker s mass pont at zero n the n j -varate margnal dstrbuton for network j, where the n j -varate margnal dstrbuton for network j s gven by P N j A ({x } Nj. 14

15 The lkelhood that the attacker optmally chooses to launch no attack s ncreasng n the defender s valuaton of success and decreasng n the attacker s valuaton of success. In the case (1 parameter range, the attacker s valuaton s low enough relatve to the defender s valuaton that the optmal strategy ncludes not launchng an attack wth postve probablty. As we move to the case (2 parameter range, the attacker optmally launches an attack wth certanty. In ths case the probablty that any gven network of targets s attacked depends only on the number of targets n the network and the type of network. The proof of Proposton 3 also follows from the characterzaton of the equlbrum jont dstrbutons gven n the appendx. Proposton 3 If α < 1, then n any equlbrum {P A,P }: 1. The probablty that any weakest-lnk network j s attacked (.e., the probablty that the attacker allocates a strctly postve level of force to weakest-lnk network j s n j /([ j W n j + j n 1 ], whch s ncreasng n the number of targets n network j j. 2. The probablty that any best-shot network j s attacked s 1/(n j [ j W n j + j n 1 ], j whch s decreasng n the number of targets n network j. 3. The defender optmally leaves the entre supra-network undefended wth probablty 1 α. In the case (1 parameter range, the defender optmally chooses, wth certanty, to allocate a strctly postve level of defensve force. However, n the case (2 parameter range, the defender optmally chooses to leave the entre supra-network undefended wth postve probablty. Furthermore, the lkelhood that the defender chooses to leave the entre supra-network undefended s ncreasng n the attacker s valuaton of success and decreasng n the defender s valuaton of successfully defendng the entre supranetwork. To summarze, the followng condtons hold n all equlbra. In the case (1 parameter range the attacker optmally chooses not to launch an attack wth postve probablty. In both cases (1 and (2, the attacker optmally launches an attack on at most one network. In the event that a weakest-lnk network s attacked, only one target wthn the network s attacked. The lkelhood that any ndvdual network s attacked depends on the number of targets wthn the network. In each weakest-lnk network the lkelhood of attack s ncreasng n the number of targets. In each best-shot network the lkelhood of attack s decreasng n the number of targets. In the case (2 parameter range, the defender optmally leaves the entre supra-network undefended. Lastly, n both cases (1 15

16 and (2 when the defender chooses to defend the supra-network, wthn each best-shot network, the defender randomly chooses at most one target to defend Concluson Ths paper examnes a game-theoretc model of attack and defense wth multple networks of targets and ntra-network strategc complementartes among targets. In equlbrum we fnd that the correlaton structure of the optmal attack and defense strateges depends crtcally on the composton of the supra-network. In addton, network redundances, as n best-shot networks, strengthen the defender s strategc poston. Conversely, the absence of network redundances, as n weakest-lnk networks, weaken the defender s strategc poston. In the context of networks of targets wth asymmetrc attack and defense, our results hghlght the mportance of allowng for endogenous entry and force expendture decsons ncludng general correlaton structures for force expendtures wthn and across the networks of targets. References 1. Azaez, N., and V. M. er (2007, Optmal resource allocaton for securty n relablty systems, European Journal of Operatonal Research 181: aye, M. R.,. Kovenock, and C. G. de Vres (1996, The all-pay aucton wth complete nformaton, Economc Theory 8: er, V. M., and V. Abhchandan (2003, Optmal allocaton of resources for defense of smple seres and parallel systems from determned adversares, n: Rsk- ased ecson Makng n Water Resources X, Amercan Socety of Cvl Engneers, Reston, VA, pp er, V. M., A. Nagaraj, and V. Abhchandan (2005, Protecton of smple seres and parallel systems wth components of dfferent values, Relablty Engneerng and System Safety 87: er, V. M., S. Olveros, and L. Samuelson (2007, Choosng what to protect: strategc defensve allocaton aganst an unknown attacker, Journal of Publc Economc Theory 9: Clark,. J., and K. A. Konrad (2007, Asymmetrc conflct: weakest lnk aganst best shot, Journal of Conflct Resoluton 51: Coughln, P. J., (1992, Pure strategy equlbra n a class of systems defense games, Internatonal Journal of Game Theory 20:

17 8. Hausken, K., (2008, Strategc defense and attack for seres and parallel relablty systems, European Journal of Operatonal Research 186: Hrshlefer, J., (1983, From weakest-lnk to best-shot: the voluntary provson of publc goods, Publc Choce 41: Levtn, G., and H. en-ham (2007, Importance of protecton aganst ntentonal attacks, Relablty Engneerng and System Safety 93: Nelsen, R.., (1999 An Introducton to Copulas. Sprnger, New York. 12. Powell, R., (2007a, efendng aganst terrorst attacks wth lmted resources, Amercan Poltcal Scence Revew 101: Powell, R., (2007b, Allocatng defensve resources wth prvate nformaton about vulnerablty, Amercan Poltcal Scence Revew 101: Sandler, T., and W. Enders (2004, An economc perspectve on transnatonal terrorsm, European Journal of Poltcal Economy 20: Shubk, M., and R. J. Weber (1981, Systems defense games: Colonel lotto, command and control, Naval Research Logstcs Quarterly 28:

18 18 Appendx Ths appendx characterzes the supports of the equlbrum jont dstrbutons, the unque equlbrum payoffs, and the unque sets of equlbrum unvarate margnal dstrbutons. efore proceedng, observe the followng notatonal conventons whch wll be used throughout the appendx. For ponts n R n, wll use the vector notaton x =(x 1,x 2,...,x n. For a k b k for all k = 1,2,...,n, let [a,b] denote the n-box = [a 1,b 1 ] [a 2,b 2 ]... [a n,b n ], the Cartesan product of n closed ntervals. The vertces of an n-box are the ponts (c 1,c 2,...,c n where c k s equal to a k or b k. Gven that the defender s usng the dstrbuton of force P, let ( ( {ι } Pr max j j,{ ι W } j = 1 P j W,x A (1 denote the probablty that wth a force allocaton of x A the attacker wns at least one network. Thus, the attacker s expected payoff from any pure strategy x A s ( ( {ι } Pr max j j,{ ι W } j = 1 P j W,x A x A. (2 It wll also be useful to note that the attacker s expected payoff from any dstrbuton of force P A s ( ( {ι } E PA [Pr max j j,{ ι W } ] [ ] j = 1 P j W,x A E F x A A (3 where E PA denotes the expectaton wth respect to the jont dstrbuton of force P A and E F A denotes the expectaton wth respect to the unvarate margnal dstrbuton for target, henceforth FA, of the jont dstrbuton of force P A. Smlarly, gven that the attacker s usng the dstrbuton of force P A, let ( ( {ι } Pr max j j,{ ι W } j = 0 P j W A,x denote the probablty that wth a force allocaton of x the defender wns all of the networks n the supra-network. Thus, the defender s expected payoff from any pure strategy x s ( ( {ι } v Pr max j j,{ ι W } j = 0 P j W A,x x. (5 Lastly, the defender s expected payoff from any dstrbuton of force P s ( ( {ι } v E P [Pr max j j,{ ι W } ] [ ] j = 0 P j W A,x E F x (4 (6

19 where E P and E F denote the expectaton wth respect to the jont dstrbuton of force P and the expectaton wth respect to the unvarate margnal dstrbuton for target, F, respectvely. Lemma 1 For each and j such that N j j W, s A = s = s j W and s A = s = 0. For and j such that N j j, s A = s = s j and s A = s = 0. Proof We begn wth the proof that s A = s = 0 for all. y way of contradcton, suppose s A s. Let ŝ max{s A,s }, and let k be the dentty of the player attanng ŝ (that s ŝ = s k and ŝ > s k. If s k > 0, when player k allocates s k to target player k s losng target wth certanty and can strctly ncrease hs payoff by settng s k = 0. It follows drectly, that player k does not randomze over the open nterval (0,ŝ, and thus player k must have a mass pont 0. In the case that s k = 0 (where player k does not randomze over the open nterval (0,ŝ and has a mass pont at 0, we know that ( both players can not have a mass pont at s k and ( player k can strctly ncrease hs payoff by lowerng s k to a neghborhood above 0. Thus, we conclude that s A = s = 0 for all. Lastly, for the proof that for each and j such that N j j W, s A = s = s j W, note that for,k N j j W t follows that f s A = s < sk A = sk then player A would do better by movng mass from s k A to s A. The proof that for and j such that N j j, s A = s = s j follows for the same reasons. Lemma 2 In any equlbrum {P A,P }, for each target j nether player s unvarate margnal dstrbutons place postve mass on any pont except possbly at zero. Proof If x j s such a pont for player j, then player j would ether beneft from movng mass from an ε-neghborhood below x j to zero or to a δ-neghborhood above x j. Lemma 3 In any equlbrum {P A,P }, each player s expected payoff s constant over the support of ther jont dstrbuton except possbly at ponts of dscontnuty of the payoff functon. Proof y Lemma 2, for each target there are no mass ponts n the half-open nterval (0, s ]. Thus for each pont n the support of player j s jont dstrbuton, player j must make hs equlbrum payoff except for possbly at ponts of dscontnuty of the payoff functon. 19

20 Lemma 4 In any equlbrum {P A,P }, for each target each player randomzes contnuously over the nterval (0, s ]. 20 Proof y way of contradcton, suppose that there exsts an equlbrum n whch for some target, player j s unvarate margnal dstrbuton for target, Fj, s constant over the nterval [α,β (0, s ] and strctly ncreasng above β n ts support. For ths to be an equlbrum, t must be the case that F j s also constant over the nterval [α,β. Otherwse, player j could ncrease hs payoff. If F j (α = F j (β, then for any ε > 0 spendng β + ε n target cannot be optmal for player j. Indeed, by dscretely reducng hs expendture from β + ε to α + ε player j s payoff would strctly ncrease. Consequently, f Fj s constant over [α,β t must also be constant over [α, s ], a contradcton to the defnton of s. Lemma 5 In any equlbrum {P A,P }: (a If x A s an n-tuple contaned n the support of P A, then x A allocates a strctly postve level of force to at most one network. (b If the network to whch the n-tuple x A (contaned n the support of P A allocates a strctly postve level of force s a weakest-lnk network, then at most one target n that weakest-lnk network receves a strctly postve level of force. (c If x s an n-tuple contaned n the support of P, then wthn each best-shot network x allocates a strctly postve level of force to at most one target n the network. Proof egnnng wth (a, by way of contradcton suppose that there exsts an equlbrum n whch player A smultaneously allocates a strctly postve level of force to two or more networks. Wthout loss of generalty, we wll also assume that there exsts at least one pont n the support of an equlbrum strategy P A for whch only networks j and j smultaneously receve a strctly postve level of force from player A (henceforth networks j and j are smultaneously attacked. Observe that ths assumpton allows for any number and/or combnaton of networks to be smultaneously attacked as long as at some pont n the support of P A only networks j and j are smultaneously attacked. Furthermore, whle the focus on the case n whch the mnmum number of networks beng smultaneously attacked s equal to two smplfes the expressons that follow, the case n whch the mnmum number of networks whch are smultaneously attacked s greater than two follows drectly.

21 Snce max({ι j } j,{ι W j } j W s equal to ether 0 or 1, the expected payoff for player may be wrtten as ( v v E PA [Pr max ( ] P ι j,ι j = 1,x A s.t. only j and j attacked ( ( {ι } v E PA [Pr max j j,{ ι W } ] j = 1 P j W,x A s.t. not j and j attacked F ( x. (7 The expectaton n the frst lne of (7 s the probablty that player A successfully attacks at least one of the networks j or j gven that player A attacks only networks j and j. The expectaton n the second lne of (7 s the probablty that player A successfully attacks at least one network condtonal on the attack beng on any sngle network or any combnaton of networks other than only j and j. Let x j A denote the restrcton of the vector x A to the set of targets contaned n network j,.e. {x A } N j. Note that ( Pr max ( ( P ι j,ι j = 1,x A s.t. j and j attacked = Pr ι j = 1 P n j,xj A ( + Pr ι j = 1 P n ( j,xj Pr ι j = 1 and ι j = 1 P n j,n j A,x j A,xj A 21. (8 If network j s a best-shot network then Pr(ι j = 1 P n j,xj A = Pn j (x j A. If network j s a weakest-lnk network then the probablty that player A wns at least one target, Pr(ι W j = 1 P n j,xj A, depends crtcally on both Pn j and the number of targets n network j whch are attacked. In both cases, t s clear that player s payoff depends not only on the n j -varate margnal dstrbuton for network j, P n j, and the n j dstrbuton for network j,p n j -varate margnal, but also on the correlaton between these two multvarate margnal dstrbutons. There are 3 possble cases to consder: ( both networks j and j are best-shot networks, ( both networks j and j are weakest-lnk networks, and ( ether network j or j s a best-shot network and the other s a weakest-lnk network. If both networks j and j are best shot networks, then (8 becomes P n j (x j A +Pn j j (x A P n j,n j (x j A,xj A. However, f Pn j,n j (x j A,xj A mn{pn j (x j A,Pn j j (xa} then player could ncrease the frst lne of (7 wthout affectng the unvarate margnals and thus the thrd lne of (7. Furthermore, f P (x = mn j {P n j (x j } then each n j -varate margnal dstrbuton (P n j (x j s preserved, each unvarate margnal dstrbuton (F (x s preserved, and for any set of networks j J the jont margnal dstrbuton for the set J s P J (xj = mn j J {P n j (x j }. Clearly, f networks j and j are the only two networks

22 whch player A smultaneously attacks, then the devaton to such a correlaton strategy strctly ncreases player s payoff. A contradcton to the assumpton that {P A,P } s an equlbrum. Furthermore, f P n j,n j (x j A,xj A = mn{pn j (x j A,Pn j j (xa} then player A could ncrease hs payoff by attackng network j or network j but not both smultaneously; also a contradcton. If networks j and j are not the only networks whch player A smultaneously attacks but all of the networks n the supra-network are best-shot networks, then the second lne of (7 can be broken nto components for each of the sets of networks whch player A smultaneously attacks and each of the networks whch are attacked n solaton. In ths case, the proof follows along the lnes of the proceedng case. That s f the supranetwork s comprsed of only best-shot networks, player A attacks at most one network. For cases ( and ( as well as the remanng case ( network confguratons, note that the result on a supra-network consstng of only best-shot networks can be modfed to show that wthn each weakest-lnk network player A attacks at most one target. That s, wthout loss of generalty, assume that there exsts at least one pont n the support of an equlbrum strategy P A for whch wthn weakest-lnk network j only targets and smultaneously receve a strctly postve level of force from player A. In such a case, Pr(ι W j = 1 P n j,xj A = F (x A + F (x A Pn j (x A,x A,{ s j W } N j, where (x A,x A,{ s j W } N j, denotes the vector formed by replacng each zero n x j A (all targets except and wth s j W. Settng Pn j (x j A = mn j{f (x }, the result follows drectly, as does the result for the case n whch the number of targets whch are smultaneously attacked s greater than two or nvolves any arbtrary combnatons of weakest-lnk targets. Thus, player A attacks at most one target n each weakest-lnk network, and Pr(ι j = 1 P n j,xj A = F (x A. Insertng ths back nto (8, the proof for cases ( and ( as well as the remanng case ( network confguratons follows drectly. The proof for part (c follows from a symmetrc argument. Lemma 6 j, j W, s j W = s j W s W. Proof Followng from Lemmas 2 and 5, n the support of any optmal strategy, when player A allocates s j W to a sngle target n network j the force allocated to each of the remanng targets s 0, player A wns network j wth certanty, and player A s expected payoff s s j W. From Lemma 3, player A s expected payoff s constant across all ponts n the support of P A. Thus, j, j W, s j j W = s W s W. Lemma 7 j, s W = n j s j. 22

23 Proof From Lemma 5 part (a n the support of any optmal strategy player A attacks at most one network. In the case that player A attacks best-shot network j, from Lemma 3 there exsts a k A 0 such that ( Pr ι j = 1 P n j,x A 23 k A + x A (9 whch holds wth equalty for each x A n the support of P A such that player A attacks best-shot network j. From Lemma 5 part (c n the support of any optmal strategy player allocates a strctly postve level of force to at most one target n network j, and thus the support of player s n j -varate margnal dstrbuton for network j, P n j s contaned on the each of the n j axes n R n j. From Lemmas 2 and 4, t follows that equaton (1 holds wth equalty not only for each x A n the support of P A such that player A attacks best-shot network j, but gven that network j s the only network attacked for all n j -tuples x j [0, s j ]n j. That s gven that the support of player s n j -varate margnal dstrbuton for network j s: ( contaned on the each of the n j axes n R n j, ( has no mass ponts except possble at the orgn n R n j, and ( s contnuous on each axs, t follows that for x j A [0, s j ]n j, P n j (x j A = Pr(ι j = 1 P n j,x A = k A va + x A. Thus, f player A chooses the n j -tuple wth s j for each element then from Lemma 2 player A s expected payoff from such an n j -tuple s n j s j. From Lemmas 3 and 6, k A = s W. From Lemma 3, player A s expected payoff s constant across all ponts n the support of P A. Thus, j, s W = n j s j. Lemma 8 s W = mn{,v /[ j W n j + j (1/n j ]}. Proof If player allocates: ( s W to each target n each weakest-lnk network, ( s j to exactly one target n each best-shot network j, and ( 0 to each of the remanng targets n the best-shot networks, then player wns wth certanty and has an expected payoff of v j W n j s W + j ( s W /n j 0. Thus, n such a case t must be that s W v /[ j W n j + j (1/n j ]. Smlarly, player A s expected payoff s s W 0, and thus, s W. Snce player A attacks at most one network, and n the case of a weakest-lnk network only one target, we know that the orgn s contaned n the support of any equlbrum dstrbuton of force for player A, P A. y way of contradcton suppose that there exsts an equlbrum {P A,P } n whch the orgn s not contaned n the support of P. Thus, there exsts an ε > 0 such that for at least two targets, denoted as targets 1 and 2, the ntersecton of the projecton

24 of player s support onto the x 1,x 2 -plane wth the box [0,ε] 2 s empty. There are fve confguratons to consder: ( targets 1 and 2 are n the same weakest-lnk network, ( targets 1 and 2 are n separate weakest-lnk networks, ( targets 1 and 2 are n the same best-shot network, (v targets 1 and 2 are n separate best-shot networks, (v target 1 s n a weakest-lnk network and target 2 s n a best-shot network. From Lemma 5, t s clear that we can rule out case (. In cases ( and (, for any (x 1,x 2 [0,ε] 2 player s bvarate margnal dstrbuton for targets 1 and 2, P 1,2, s equal to zero and player A can strctly ncrease hs payoff by allocatng a level of force less than ε to both targets 1 and 2 a contradcton to Lemma 5 f targets 1 and 2 are n the same weakest-lnk network or f targets 1 and 2 are n separate weakest-lnk networks. Followng along smlar lnes, cases (v and (v lead to a smlar contradcton to Lemma 5. Thus, the orgn s contaned n the support of any equlbrum dstrbuton P for player. Snce only one player can have a mass pont at the orgn, we have that f s W > 0 player A must outbd player wth a probablty that s bounded away from zero. Thus, player places postve mass at the orgn, but f player has a mass pont at the orgn then t must be the case that v j W n j s W + j ( s W /n j = 0. Smlarly, f v j W n j s W + j ( s W /n j > 0 then player must outbd player A wth a probablty that s bounded away from zero. Thus, s W = 0 and player A places postve mass at the orgn. 24 The next two lemmas follow drectly from Lemma 8. Recall that α = v /( [ j W n j + j 1 n j ]. Lemma 9 If α 1, then ( player A places mass 1 (1/α at the orgn, ( player A s expected payoff s 0, ( player does not place postve mass at the orgn, and (v player s expected payoff s v (v /α. Lemma 10 If α < 1, then ( player places mass 1 α at the orgn, ( player s expected payoff s 0, ( player A does not place postve mass at the orgn, and (v player A s expected payoff s α. Lemma 11 There exsts a unque set of equlbrum unvarate margnal dstrbutons {{F j A } j W,{F j } j W }. Proof Ths proof s for the unqueness of player s set of unvarate margnal dstrbutons. The proof for player A s analogous. For each best-shot network j, from Lemma 7 for x j [0, s j ]n j, P n j (x j = s W + x, where s W = mn{,v /[ j W n j +

25 25 j (1/n j ]} and s j = s W n j. Thus, n each best-shot network j player s unque unvarate margnal dstrbutons follow from player s unque n j -varate margnal dstrbuton for network j. From Lemma 5 parts (a and (b, player A attacks at most one target n one weakestlnk network. From Lemmas 2, 3, and 4 t follows that for each target n each weakestlnk network j W, F ( x A x A = s W for x [0, s W ]. Thus, player s unvarate margnal dstrbutons are unquely determned n each weakest-lnk network.

26 26 A A C C E E Fg. 1 Example Supra-Network wth Fve Networks (A,, C,, and E

27 27 One weakest-lnk network wth two targets ( = 1,2 x 2 x 2 ṽ A ṽ A x 1 x 1 ṽ A ṽ A ( Attacker ( efender One best-shot network wth two targets ( = 1,2 and one weakest-lnk network wth one target ( = 3 x 2 x 2 ṽ A2 ṽ A2 x 1 x 1 ṽ A2 ṽ A2 ṽ A x 3 ( Attacker ṽ A x 3 (v efender Fg. 2 Supports of the equlbrum jont dstrbutons stated n Theorem 1 (ṽ A = mn{α, }.

OPERATIONS RESEARCH. Game Theory

OPERATIONS RESEARCH. Game Theory OPERATIONS RESEARCH Chapter 2 Game Theory Prof. Bbhas C. Gr Department of Mathematcs Jadavpur Unversty Kolkata, Inda Emal: bcgr.umath@gmal.com 1.0 Introducton Game theory was developed for decson makng

More information

Introduction to game theory

Introduction to game theory Introducton to game theory Lectures n game theory ECON5210, Sprng 2009, Part 1 17.12.2008 G.B. Ashem, ECON5210-1 1 Overvew over lectures 1. Introducton to game theory 2. Modelng nteractve knowledge; equlbrum

More information

Appendix - Normally Distributed Admissible Choices are Optimal

Appendix - Normally Distributed Admissible Choices are Optimal Appendx - Normally Dstrbuted Admssble Choces are Optmal James N. Bodurtha, Jr. McDonough School of Busness Georgetown Unversty and Q Shen Stafford Partners Aprl 994 latest revson September 00 Abstract

More information

ECE 586GT: Problem Set 2: Problems and Solutions Uniqueness of Nash equilibria, zero sum games, evolutionary dynamics

ECE 586GT: Problem Set 2: Problems and Solutions Uniqueness of Nash equilibria, zero sum games, evolutionary dynamics Unversty of Illnos Fall 08 ECE 586GT: Problem Set : Problems and Solutons Unqueness of Nash equlbra, zero sum games, evolutonary dynamcs Due: Tuesday, Sept. 5, at begnnng of class Readng: Course notes,

More information

Lecture 7. We now use Brouwer s fixed point theorem to prove Nash s theorem.

Lecture 7. We now use Brouwer s fixed point theorem to prove Nash s theorem. Topcs on the Border of Economcs and Computaton December 11, 2005 Lecturer: Noam Nsan Lecture 7 Scrbe: Yoram Bachrach 1 Nash s Theorem We begn by provng Nash s Theorem about the exstance of a mxed strategy

More information

- contrast so-called first-best outcome of Lindahl equilibrium with case of private provision through voluntary contributions of households

- contrast so-called first-best outcome of Lindahl equilibrium with case of private provision through voluntary contributions of households Prvate Provson - contrast so-called frst-best outcome of Lndahl equlbrum wth case of prvate provson through voluntary contrbutons of households - need to make an assumpton about how each household expects

More information

A MODEL OF COMPETITION AMONG TELECOMMUNICATION SERVICE PROVIDERS BASED ON REPEATED GAME

A MODEL OF COMPETITION AMONG TELECOMMUNICATION SERVICE PROVIDERS BASED ON REPEATED GAME A MODEL OF COMPETITION AMONG TELECOMMUNICATION SERVICE PROVIDERS BASED ON REPEATED GAME Vesna Radonć Đogatovć, Valentna Radočć Unversty of Belgrade Faculty of Transport and Traffc Engneerng Belgrade, Serba

More information

UNIVERSITY OF NOTTINGHAM

UNIVERSITY OF NOTTINGHAM UNIVERSITY OF NOTTINGHAM SCHOOL OF ECONOMICS DISCUSSION PAPER 99/28 Welfare Analyss n a Cournot Game wth a Publc Good by Indraneel Dasgupta School of Economcs, Unversty of Nottngham, Nottngham NG7 2RD,

More information

Elements of Economic Analysis II Lecture VI: Industry Supply

Elements of Economic Analysis II Lecture VI: Industry Supply Elements of Economc Analyss II Lecture VI: Industry Supply Ka Hao Yang 10/12/2017 In the prevous lecture, we analyzed the frm s supply decson usng a set of smple graphcal analyses. In fact, the dscusson

More information

Contests with Group-Specific Public-Good Prizes

Contests with Group-Specific Public-Good Prizes Contests wth Group-Specfc Publc-Good Przes Kyung Hwan ak * Department of Economcs Sungkyunkwan Unversty Seoul 110-745 South Korea September 2005 Abstract I examne the equlbrum effort levels of ndvdual

More information

Applications of Myerson s Lemma

Applications of Myerson s Lemma Applcatons of Myerson s Lemma Professor Greenwald 28-2-7 We apply Myerson s lemma to solve the sngle-good aucton, and the generalzaton n whch there are k dentcal copes of the good. Our objectve s welfare

More information

II. Random Variables. Variable Types. Variables Map Outcomes to Numbers

II. Random Variables. Variable Types. Variables Map Outcomes to Numbers II. Random Varables Random varables operate n much the same way as the outcomes or events n some arbtrary sample space the dstncton s that random varables are smply outcomes that are represented numercally.

More information

Problems to be discussed at the 5 th seminar Suggested solutions

Problems to be discussed at the 5 th seminar Suggested solutions ECON4260 Behavoral Economcs Problems to be dscussed at the 5 th semnar Suggested solutons Problem 1 a) Consder an ultmatum game n whch the proposer gets, ntally, 100 NOK. Assume that both the proposer

More information

Problem Set 6 Finance 1,

Problem Set 6 Finance 1, Carnege Mellon Unversty Graduate School of Industral Admnstraton Chrs Telmer Wnter 2006 Problem Set 6 Fnance, 47-720. (representatve agent constructon) Consder the followng two-perod, two-agent economy.

More information

Wages as Anti-Corruption Strategy: A Note

Wages as Anti-Corruption Strategy: A Note DISCUSSION PAPER November 200 No. 46 Wages as Ant-Corrupton Strategy: A Note by dek SAO Faculty of Economcs, Kyushu-Sangyo Unversty Wages as ant-corrupton strategy: A Note dek Sato Kyushu-Sangyo Unversty

More information

A Utilitarian Approach of the Rawls s Difference Principle

A Utilitarian Approach of the Rawls s Difference Principle 1 A Utltaran Approach of the Rawls s Dfference Prncple Hyeok Yong Kwon a,1, Hang Keun Ryu b,2 a Department of Poltcal Scence, Korea Unversty, Seoul, Korea, 136-701 b Department of Economcs, Chung Ang Unversty,

More information

references Chapters on game theory in Mas-Colell, Whinston and Green

references Chapters on game theory in Mas-Colell, Whinston and Green Syllabus. Prelmnares. Role of game theory n economcs. Normal and extensve form of a game. Game-tree. Informaton partton. Perfect recall. Perfect and mperfect nformaton. Strategy.. Statc games of complete

More information

CS 286r: Matching and Market Design Lecture 2 Combinatorial Markets, Walrasian Equilibrium, Tâtonnement

CS 286r: Matching and Market Design Lecture 2 Combinatorial Markets, Walrasian Equilibrium, Tâtonnement CS 286r: Matchng and Market Desgn Lecture 2 Combnatoral Markets, Walrasan Equlbrum, Tâtonnement Matchng and Money Recall: Last tme we descrbed the Hungaran Method for computng a maxmumweght bpartte matchng.

More information

Games and Decisions. Part I: Basic Theorems. Contents. 1 Introduction. Jane Yuxin Wang. 1 Introduction 1. 2 Two-player Games 2

Games and Decisions. Part I: Basic Theorems. Contents. 1 Introduction. Jane Yuxin Wang. 1 Introduction 1. 2 Two-player Games 2 Games and Decsons Part I: Basc Theorems Jane Yuxn Wang Contents 1 Introducton 1 2 Two-player Games 2 2.1 Zero-sum Games................................ 3 2.1.1 Pure Strateges.............................

More information

Tests for Two Correlations

Tests for Two Correlations PASS Sample Sze Software Chapter 805 Tests for Two Correlatons Introducton The correlaton coeffcent (or correlaton), ρ, s a popular parameter for descrbng the strength of the assocaton between two varables.

More information

Dr. A. Sudhakaraiah* V. Rama Latha E.Gnana Deepika

Dr. A. Sudhakaraiah* V. Rama Latha E.Gnana Deepika Internatonal Journal Of Scentfc & Engneerng Research, Volume, Issue 6, June-0 ISSN - Splt Domnatng Set of an Interval Graph Usng an Algorthm. Dr. A. Sudhakaraah* V. Rama Latha E.Gnana Deepka Abstract :

More information

Economic Design of Short-Run CSP-1 Plan Under Linear Inspection Cost

Economic Design of Short-Run CSP-1 Plan Under Linear Inspection Cost Tamkang Journal of Scence and Engneerng, Vol. 9, No 1, pp. 19 23 (2006) 19 Economc Desgn of Short-Run CSP-1 Plan Under Lnear Inspecton Cost Chung-Ho Chen 1 * and Chao-Yu Chou 2 1 Department of Industral

More information

Intensive vs Extensive Margin Tradeo s in a Simple Monetary Search Model

Intensive vs Extensive Margin Tradeo s in a Simple Monetary Search Model Intensve vs Extensve Margn Tradeo s n a Smple Monetary Search Model Sébasten Lotz y Unversty of Pars 2 Andre Shevchenko z Mchgan State Unversty Aprl 2006 hrstopher Waller x Unversty of Notre Dame Abstract

More information

Price and Quantity Competition Revisited. Abstract

Price and Quantity Competition Revisited. Abstract rce and uantty Competton Revsted X. Henry Wang Unversty of Mssour - Columba Abstract By enlargng the parameter space orgnally consdered by Sngh and Vves (984 to allow for a wder range of cost asymmetry,

More information

15-451/651: Design & Analysis of Algorithms January 22, 2019 Lecture #3: Amortized Analysis last changed: January 18, 2019

15-451/651: Design & Analysis of Algorithms January 22, 2019 Lecture #3: Amortized Analysis last changed: January 18, 2019 5-45/65: Desgn & Analyss of Algorthms January, 09 Lecture #3: Amortzed Analyss last changed: January 8, 09 Introducton In ths lecture we dscuss a useful form of analyss, called amortzed analyss, for problems

More information

Online Appendix for Merger Review for Markets with Buyer Power

Online Appendix for Merger Review for Markets with Buyer Power Onlne Appendx for Merger Revew for Markets wth Buyer Power Smon Loertscher Lesle M. Marx July 23, 2018 Introducton In ths appendx we extend the framework of Loertscher and Marx (forthcomng) to allow two

More information

Lecture Note 1: Foundations 1

Lecture Note 1: Foundations 1 Economcs 703 Advanced Mcroeconomcs Prof. Peter Cramton ecture Note : Foundatons Outlne A. Introducton and Examples B. Formal Treatment. Exstence of Nash Equlbrum. Exstence wthout uas-concavty 3. Perfect

More information

Tests for Two Ordered Categorical Variables

Tests for Two Ordered Categorical Variables Chapter 253 Tests for Two Ordered Categorcal Varables Introducton Ths module computes power and sample sze for tests of ordered categorcal data such as Lkert scale data. Assumng proportonal odds, such

More information

Equilibrium in Prediction Markets with Buyers and Sellers

Equilibrium in Prediction Markets with Buyers and Sellers Equlbrum n Predcton Markets wth Buyers and Sellers Shpra Agrawal Nmrod Megddo Benamn Armbruster Abstract Predcton markets wth buyers and sellers of contracts on multple outcomes are shown to have unque

More information

Tradable Emissions Permits in the Presence of Trade Distortions

Tradable Emissions Permits in the Presence of Trade Distortions 85 Tradable Emssons Permts n the Presence of Trade Dstortons Shnya Kawahara Abstract Ths paper nvestgates how trade lberalzaton affects domestc emssons tradng scheme n a poltcal economy framework. Developng

More information

Linear Combinations of Random Variables and Sampling (100 points)

Linear Combinations of Random Variables and Sampling (100 points) Economcs 30330: Statstcs for Economcs Problem Set 6 Unversty of Notre Dame Instructor: Julo Garín Sprng 2012 Lnear Combnatons of Random Varables and Samplng 100 ponts 1. Four-part problem. Go get some

More information

General Examination in Microeconomic Theory. Fall You have FOUR hours. 2. Answer all questions

General Examination in Microeconomic Theory. Fall You have FOUR hours. 2. Answer all questions HARVARD UNIVERSITY DEPARTMENT OF ECONOMICS General Examnaton n Mcroeconomc Theory Fall 2010 1. You have FOUR hours. 2. Answer all questons PLEASE USE A SEPARATE BLUE BOOK FOR EACH QUESTION AND WRITE THE

More information

Ch Rival Pure private goods (most retail goods) Non-Rival Impure public goods (internet service)

Ch Rival Pure private goods (most retail goods) Non-Rival Impure public goods (internet service) h 7 1 Publc Goods o Rval goods: a good s rval f ts consumpton by one person precludes ts consumpton by another o Excludable goods: a good s excludable f you can reasonably prevent a person from consumng

More information

Optimal Service-Based Procurement with Heterogeneous Suppliers

Optimal Service-Based Procurement with Heterogeneous Suppliers Optmal Servce-Based Procurement wth Heterogeneous Supplers Ehsan Elah 1 Saf Benjaafar 2 Karen L. Donohue 3 1 College of Management, Unversty of Massachusetts, Boston, MA 02125 2 Industral & Systems Engneerng,

More information

Problem Set #4 Solutions

Problem Set #4 Solutions 4.0 Sprng 00 Page Problem Set #4 Solutons Problem : a) The extensve form of the game s as follows: (,) Inc. (-,-) Entrant (0,0) Inc (5,0) Usng backwards nducton, the ncumbent wll always set hgh prces,

More information

Introduction to PGMs: Discrete Variables. Sargur Srihari

Introduction to PGMs: Discrete Variables. Sargur Srihari Introducton to : Dscrete Varables Sargur srhar@cedar.buffalo.edu Topcs. What are graphcal models (or ) 2. Use of Engneerng and AI 3. Drectonalty n graphs 4. Bayesan Networks 5. Generatve Models and Samplng

More information

Attorneys' Compensation in Litigation with Bilateral Delegation

Attorneys' Compensation in Litigation with Bilateral Delegation Attorneys' Compensaton n Ltgaton wth Blateral Delegaton by Kyung Hwan Bak * Department of Economcs, Sungkyunkwan Unversty, Seoul 110-745, South Korea and Department of Economcs, Vrgna Polytechnc Insttute

More information

Global Optimization in Multi-Agent Models

Global Optimization in Multi-Agent Models Global Optmzaton n Mult-Agent Models John R. Brge R.R. McCormck School of Engneerng and Appled Scence Northwestern Unversty Jont work wth Chonawee Supatgat, Enron, and Rachel Zhang, Cornell 11/19/2004

More information

MgtOp 215 Chapter 13 Dr. Ahn

MgtOp 215 Chapter 13 Dr. Ahn MgtOp 5 Chapter 3 Dr Ahn Consder two random varables X and Y wth,,, In order to study the relatonshp between the two random varables, we need a numercal measure that descrbes the relatonshp The covarance

More information

Clearing Notice SIX x-clear Ltd

Clearing Notice SIX x-clear Ltd Clearng Notce SIX x-clear Ltd 1.0 Overvew Changes to margn and default fund model arrangements SIX x-clear ( x-clear ) s closely montorng the CCP envronment n Europe as well as the needs of ts Members.

More information

Static (or Simultaneous- Move) Games of Complete Information

Static (or Simultaneous- Move) Games of Complete Information Statc (or Smultaneous- Move) Games of Complete Informaton Nash Equlbrum Best Response Functon F. Valognes - Game Theory - Chp 3 Outlne of Statc Games of Complete Informaton Introducton to games Normal-form

More information

Maturity Effect on Risk Measure in a Ratings-Based Default-Mode Model

Maturity Effect on Risk Measure in a Ratings-Based Default-Mode Model TU Braunschweg - Insttut für Wrtschaftswssenschaften Lehrstuhl Fnanzwrtschaft Maturty Effect on Rsk Measure n a Ratngs-Based Default-Mode Model Marc Gürtler and Drk Hethecker Fnancal Modellng Workshop

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #21 Scribe: Lawrence Diao April 23, 2013

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #21 Scribe: Lawrence Diao April 23, 2013 COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture #21 Scrbe: Lawrence Dao Aprl 23, 2013 1 On-Lne Log Loss To recap the end of the last lecture, we have the followng on-lne problem wth N

More information

Elton, Gruber, Brown, and Goetzmann. Modern Portfolio Theory and Investment Analysis, 7th Edition. Solutions to Text Problems: Chapter 9

Elton, Gruber, Brown, and Goetzmann. Modern Portfolio Theory and Investment Analysis, 7th Edition. Solutions to Text Problems: Chapter 9 Elton, Gruber, Brown, and Goetzmann Modern Portfolo Theory and Investment Analyss, 7th Edton Solutons to Text Problems: Chapter 9 Chapter 9: Problem In the table below, gven that the rskless rate equals

More information

Production and Supply Chain Management Logistics. Paolo Detti Department of Information Engeneering and Mathematical Sciences University of Siena

Production and Supply Chain Management Logistics. Paolo Detti Department of Information Engeneering and Mathematical Sciences University of Siena Producton and Supply Chan Management Logstcs Paolo Dett Department of Informaton Engeneerng and Mathematcal Scences Unversty of Sena Convergence and complexty of the algorthm Convergence of the algorthm

More information

On the use of menus in sequential common agency

On the use of menus in sequential common agency Games and Economc Behavor 6 (2008) 329 33 www.elsever.com/locate/geb Note On the use of menus n sequental common agency Gacomo Calzolar a, Alessandro Pavan b, a Department of Economcs, Unversty of Bologna,

More information

Lecture Note 2 Time Value of Money

Lecture Note 2 Time Value of Money Seg250 Management Prncples for Engneerng Managers Lecture ote 2 Tme Value of Money Department of Systems Engneerng and Engneerng Management The Chnese Unversty of Hong Kong Interest: The Cost of Money

More information

Taxation and Externalities. - Much recent discussion of policy towards externalities, e.g., global warming debate/kyoto

Taxation and Externalities. - Much recent discussion of policy towards externalities, e.g., global warming debate/kyoto Taxaton and Externaltes - Much recent dscusson of polcy towards externaltes, e.g., global warmng debate/kyoto - Increasng share of tax revenue from envronmental taxaton 6 percent n OECD - Envronmental

More information

Highlights of the Macroprudential Report for June 2018

Highlights of the Macroprudential Report for June 2018 Hghlghts of the Macroprudental Report for June 2018 October 2018 FINANCIAL STABILITY DEPARTMENT Preface Bank of Jamaca frequently conducts assessments of the reslence and strength of the fnancal system.

More information

Real Exchange Rate Fluctuations, Wage Stickiness and Markup Adjustments

Real Exchange Rate Fluctuations, Wage Stickiness and Markup Adjustments Real Exchange Rate Fluctuatons, Wage Stckness and Markup Adjustments Yothn Jnjarak and Kanda Nakno Nanyang Technologcal Unversty and Purdue Unversty January 2009 Abstract Motvated by emprcal evdence on

More information

Consumption Based Asset Pricing

Consumption Based Asset Pricing Consumpton Based Asset Prcng Mchael Bar Aprl 25, 208 Contents Introducton 2 Model 2. Prcng rsk-free asset............................... 3 2.2 Prcng rsky assets................................ 4 2.3 Bubbles......................................

More information

Cyclic Scheduling in a Job shop with Multiple Assembly Firms

Cyclic Scheduling in a Job shop with Multiple Assembly Firms Proceedngs of the 0 Internatonal Conference on Industral Engneerng and Operatons Management Kuala Lumpur, Malaysa, January 4, 0 Cyclc Schedulng n a Job shop wth Multple Assembly Frms Tetsuya Kana and Koch

More information

Single-Item Auctions. CS 234r: Markets for Networks and Crowds Lecture 4 Auctions, Mechanisms, and Welfare Maximization

Single-Item Auctions. CS 234r: Markets for Networks and Crowds Lecture 4 Auctions, Mechanisms, and Welfare Maximization CS 234r: Markets for Networks and Crowds Lecture 4 Auctons, Mechansms, and Welfare Maxmzaton Sngle-Item Auctons Suppose we have one or more tems to sell and a pool of potental buyers. How should we decde

More information

Volume 30, Issue 1. Partial privatization in price-setting mixed duopoly. Kazuhiro Ohnishi Institute for Basic Economic Science, Japan

Volume 30, Issue 1. Partial privatization in price-setting mixed duopoly. Kazuhiro Ohnishi Institute for Basic Economic Science, Japan Volume 3, Issue 1 Partal prvatzaton n prce-settng mxed duopoly Kazuhro Ohnsh Insttute for Basc Economc Scence, Japan Abstract Ths paper nvestgates a prce-settng mxed model nvolvng a prvate frm and a publc

More information

Quiz on Deterministic part of course October 22, 2002

Quiz on Deterministic part of course October 22, 2002 Engneerng ystems Analyss for Desgn Quz on Determnstc part of course October 22, 2002 Ths s a closed book exercse. You may use calculators Grade Tables There are 90 ponts possble for the regular test, or

More information

Mechanisms for Efficient Allocation in Divisible Capacity Networks

Mechanisms for Efficient Allocation in Divisible Capacity Networks Mechansms for Effcent Allocaton n Dvsble Capacty Networks Antons Dmaks, Rahul Jan and Jean Walrand EECS Department Unversty of Calforna, Berkeley {dmaks,ran,wlr}@eecs.berkeley.edu Abstract We propose a

More information

Quadratic Games. First version: February 24, 2017 This version: December 12, Abstract

Quadratic Games. First version: February 24, 2017 This version: December 12, Abstract Quadratc Games Ncolas S. Lambert Gorgo Martn Mchael Ostrovsky Frst verson: February 24, 2017 Ths verson: December 12, 2017 Abstract We study general quadratc games wth mult-dmensonal actons, stochastc

More information

Privatization and government preference in an international Cournot triopoly

Privatization and government preference in an international Cournot triopoly Fernanda A Ferrera Flávo Ferrera Prvatzaton and government preference n an nternatonal Cournot tropoly FERNANDA A FERREIRA and FLÁVIO FERREIRA Appled Management Research Unt (UNIAG School of Hosptalty

More information

Mode is the value which occurs most frequency. The mode may not exist, and even if it does, it may not be unique.

Mode is the value which occurs most frequency. The mode may not exist, and even if it does, it may not be unique. 1.7.4 Mode Mode s the value whch occurs most frequency. The mode may not exst, and even f t does, t may not be unque. For ungrouped data, we smply count the largest frequency of the gven value. If all

More information

University of Toronto November 9, 2006 ECO 209Y MACROECONOMIC THEORY. Term Test #1 L0101 L0201 L0401 L5101 MW MW 1-2 MW 2-3 W 6-8

University of Toronto November 9, 2006 ECO 209Y MACROECONOMIC THEORY. Term Test #1 L0101 L0201 L0401 L5101 MW MW 1-2 MW 2-3 W 6-8 Department of Economcs Prof. Gustavo Indart Unversty of Toronto November 9, 2006 SOLUTION ECO 209Y MACROECONOMIC THEORY Term Test #1 A LAST NAME FIRST NAME STUDENT NUMBER Crcle your secton of the course:

More information

University of Toronto November 9, 2006 ECO 209Y MACROECONOMIC THEORY. Term Test #1 L0101 L0201 L0401 L5101 MW MW 1-2 MW 2-3 W 6-8

University of Toronto November 9, 2006 ECO 209Y MACROECONOMIC THEORY. Term Test #1 L0101 L0201 L0401 L5101 MW MW 1-2 MW 2-3 W 6-8 Department of Economcs Prof. Gustavo Indart Unversty of Toronto November 9, 2006 SOLUTION ECO 209Y MACROECONOMIC THEORY Term Test #1 C LAST NAME FIRST NAME STUDENT NUMBER Crcle your secton of the course:

More information

Economics 1410 Fall Section 7 Notes 1. Define the tax in a flexible way using T (z), where z is the income reported by the agent.

Economics 1410 Fall Section 7 Notes 1. Define the tax in a flexible way using T (z), where z is the income reported by the agent. Economcs 1410 Fall 2017 Harvard Unversty Yaan Al-Karableh Secton 7 Notes 1 I. The ncome taxaton problem Defne the tax n a flexble way usng T (), where s the ncome reported by the agent. Retenton functon:

More information

Chapter 3 Student Lecture Notes 3-1

Chapter 3 Student Lecture Notes 3-1 Chapter 3 Student Lecture otes 3-1 Busness Statstcs: A Decson-Makng Approach 6 th Edton Chapter 3 Descrbng Data Usng umercal Measures 005 Prentce-Hall, Inc. Chap 3-1 Chapter Goals After completng ths chapter,

More information

A Bootstrap Confidence Limit for Process Capability Indices

A Bootstrap Confidence Limit for Process Capability Indices A ootstrap Confdence Lmt for Process Capablty Indces YANG Janfeng School of usness, Zhengzhou Unversty, P.R.Chna, 450001 Abstract The process capablty ndces are wdely used by qualty professonals as an

More information

EDC Introduction

EDC Introduction .0 Introducton EDC3 In the last set of notes (EDC), we saw how to use penalty factors n solvng the EDC problem wth losses. In ths set of notes, we want to address two closely related ssues. What are, exactly,

More information

A Single-Product Inventory Model for Multiple Demand Classes 1

A Single-Product Inventory Model for Multiple Demand Classes 1 A Sngle-Product Inventory Model for Multple Demand Classes Hasan Arslan, 2 Stephen C. Graves, 3 and Thomas Roemer 4 March 5, 2005 Abstract We consder a sngle-product nventory system that serves multple

More information

Random Variables. b 2.

Random Variables. b 2. Random Varables Generally the object of an nvestgators nterest s not necessarly the acton n the sample space but rather some functon of t. Techncally a real valued functon or mappng whose doman s the sample

More information

Macroeconomic Theory and Policy

Macroeconomic Theory and Policy ECO 209 Macroeconomc Theory and Polcy Lecture 7: The Open Economy wth Fxed Exchange Rates Gustavo Indart Slde 1 Open Economy under Fxed Exchange Rates Let s consder an open economy wth no captal moblty

More information

Appendix for Solving Asset Pricing Models when the Price-Dividend Function is Analytic

Appendix for Solving Asset Pricing Models when the Price-Dividend Function is Analytic Appendx for Solvng Asset Prcng Models when the Prce-Dvdend Functon s Analytc Ovdu L. Caln Yu Chen Thomas F. Cosmano and Alex A. Hmonas January 3, 5 Ths appendx provdes proofs of some results stated n our

More information

Risk and Return: The Security Markets Line

Risk and Return: The Security Markets Line FIN 614 Rsk and Return 3: Markets Professor Robert B.H. Hauswald Kogod School of Busness, AU 1/25/2011 Rsk and Return: Markets Robert B.H. Hauswald 1 Rsk and Return: The Securty Markets Lne From securtes

More information

Parallel Prefix addition

Parallel Prefix addition Marcelo Kryger Sudent ID 015629850 Parallel Prefx addton The parallel prefx adder presented next, performs the addton of two bnary numbers n tme of complexty O(log n) and lnear cost O(n). Lets notce the

More information

Examining the Validity of Credit Ratings Assigned to Credit Derivatives

Examining the Validity of Credit Ratings Assigned to Credit Derivatives Examnng the Valdty of redt atngs Assgned to redt Dervatves hh-we Lee Department of Fnance, Natonal Tape ollege of Busness No. 321, Sec. 1, h-nan d., Tape 100, Tawan heng-kun Kuo Department of Internatonal

More information

Creating a zero coupon curve by bootstrapping with cubic splines.

Creating a zero coupon curve by bootstrapping with cubic splines. MMA 708 Analytcal Fnance II Creatng a zero coupon curve by bootstrappng wth cubc splnes. erg Gryshkevych Professor: Jan R. M. Röman 0.2.200 Dvson of Appled Mathematcs chool of Educaton, Culture and Communcaton

More information

Bargaining over Strategies of Non-Cooperative Games

Bargaining over Strategies of Non-Cooperative Games Games 05, 6, 73-98; do:0.3390/g603073 Artcle OPEN ACCESS games ISSN 073-4336 www.mdp.com/ournal/games Barganng over Strateges of Non-Cooperatve Games Guseppe Attanas, *, Aurora García-Gallego, Nkolaos

More information

FORD MOTOR CREDIT COMPANY SUGGESTED ANSWERS. Richard M. Levich. New York University Stern School of Business. Revised, February 1999

FORD MOTOR CREDIT COMPANY SUGGESTED ANSWERS. Richard M. Levich. New York University Stern School of Business. Revised, February 1999 FORD MOTOR CREDIT COMPANY SUGGESTED ANSWERS by Rchard M. Levch New York Unversty Stern School of Busness Revsed, February 1999 1 SETTING UP THE PROBLEM The bond s beng sold to Swss nvestors for a prce

More information

Quadratic Games. First version: February 24, 2017 This version: August 3, Abstract

Quadratic Games. First version: February 24, 2017 This version: August 3, Abstract Quadratc Games Ncolas S. Lambert Gorgo Martn Mchael Ostrovsky Frst verson: February 24, 2017 Ths verson: August 3, 2018 Abstract We study general quadratc games wth multdmensonal actons, stochastc payoff

More information

Uniform Output Subsidies in Economic Unions versus Profit-shifting Export Subsidies

Uniform Output Subsidies in Economic Unions versus Profit-shifting Export Subsidies nform Output Subsdes n Economc nons versus Proft-shftng Export Subsdes Bernardo Moreno nversty of Málaga and José L. Torres nversty of Málaga Abstract Ths paper focuses on the effect of output subsdes

More information

ECON 4921: Lecture 12. Jon Fiva, 2009

ECON 4921: Lecture 12. Jon Fiva, 2009 ECON 4921: Lecture 12 Jon Fva, 2009 Roadmap 1. Introducton 2. Insttutons and Economc Performance 3. The Frm 4. Organzed Interest and Ownershp 5. Complementarty of Insttutons 6. Insttutons and Commtment

More information

Dynamic Analysis of Knowledge Sharing of Agents with. Heterogeneous Knowledge

Dynamic Analysis of Knowledge Sharing of Agents with. Heterogeneous Knowledge Dynamc Analyss of Sharng of Agents wth Heterogeneous Kazuyo Sato Akra Namatame Dept. of Computer Scence Natonal Defense Academy Yokosuka 39-8686 JAPAN E-mal {g40045 nama} @nda.ac.jp Abstract In ths paper

More information

Foundations of Machine Learning II TP1: Entropy

Foundations of Machine Learning II TP1: Entropy Foundatons of Machne Learnng II TP1: Entropy Gullaume Charpat (Teacher) & Gaétan Marceau Caron (Scrbe) Problem 1 (Gbbs nequalty). Let p and q two probablty measures over a fnte alphabet X. Prove that KL(p

More information

Topics on the Border of Economics and Computation November 6, Lecture 2

Topics on the Border of Economics and Computation November 6, Lecture 2 Topcs on the Border of Economcs and Computaton November 6, 2005 Lecturer: Noam Nsan Lecture 2 Scrbe: Arel Procacca 1 Introducton Last week we dscussed the bascs of zero-sum games n strategc form. We characterzed

More information

Raising Food Prices and Welfare Change: A Simple Calibration. Xiaohua Yu

Raising Food Prices and Welfare Change: A Simple Calibration. Xiaohua Yu Rasng Food Prces and Welfare Change: A Smple Calbraton Xaohua Yu Professor of Agrcultural Economcs Courant Research Centre Poverty, Equty and Growth Unversty of Göttngen CRC-PEG, Wlhelm-weber-Str. 2 3773

More information

arxiv: v2 [math.co] 6 Apr 2016

arxiv: v2 [math.co] 6 Apr 2016 On the number of equvalence classes of nvertble Boolean functons under acton of permutaton of varables on doman and range arxv:1603.04386v2 [math.co] 6 Apr 2016 Marko Carć and Modrag Žvkovć Abstract. Let

More information

Теоретические основы и методология имитационного и комплексного моделирования

Теоретические основы и методология имитационного и комплексного моделирования MONTE-CARLO STATISTICAL MODELLING METHOD USING FOR INVESTIGA- TION OF ECONOMIC AND SOCIAL SYSTEMS Vladmrs Jansons, Vtaljs Jurenoks, Konstantns Ddenko (Latva). THE COMMO SCHEME OF USI G OF TRADITIO AL METHOD

More information

Sequential equilibria of asymmetric ascending auctions: the case of log-normal distributions 3

Sequential equilibria of asymmetric ascending auctions: the case of log-normal distributions 3 Sequental equlbra of asymmetrc ascendng auctons: the case of log-normal dstrbutons 3 Robert Wlson Busness School, Stanford Unversty, Stanford, CA 94305-505, USA Receved: ; revsed verson. Summary: The sequental

More information

ECO 209Y MACROECONOMIC THEORY AND POLICY LECTURE 8: THE OPEN ECONOMY WITH FIXED EXCHANGE RATES

ECO 209Y MACROECONOMIC THEORY AND POLICY LECTURE 8: THE OPEN ECONOMY WITH FIXED EXCHANGE RATES ECO 209 MACROECONOMIC THEOR AND POLIC LECTURE 8: THE OPEN ECONOM WITH FIXED EXCHANGE RATES Gustavo Indart Slde 1 OPEN ECONOM UNDER FIXED EXCHANGE RATES Let s consder an open economy wth no captal moblty

More information

Proceedings of the 2nd International Conference On Systems Engineering and Modeling (ICSEM-13)

Proceedings of the 2nd International Conference On Systems Engineering and Modeling (ICSEM-13) Proceedngs of the 2nd Internatonal Conference On Systems Engneerng and Modelng (ICSEM-13) Research on the Proft Dstrbuton of Logstcs Company Strategc Allance Based on Shapley Value Huang Youfang 1, a,

More information

TCOM501 Networking: Theory & Fundamentals Final Examination Professor Yannis A. Korilis April 26, 2002

TCOM501 Networking: Theory & Fundamentals Final Examination Professor Yannis A. Korilis April 26, 2002 TO5 Networng: Theory & undamentals nal xamnaton Professor Yanns. orls prl, Problem [ ponts]: onsder a rng networ wth nodes,,,. In ths networ, a customer that completes servce at node exts the networ wth

More information

occurrence of a larger storm than our culvert or bridge is barely capable of handling? (what is The main question is: What is the possibility of

occurrence of a larger storm than our culvert or bridge is barely capable of handling? (what is The main question is: What is the possibility of Module 8: Probablty and Statstcal Methods n Water Resources Engneerng Bob Ptt Unversty of Alabama Tuscaloosa, AL Flow data are avalable from numerous USGS operated flow recordng statons. Data s usually

More information

3/3/2014. CDS M Phil Econometrics. Vijayamohanan Pillai N. Truncated standard normal distribution for a = 0.5, 0, and 0.5. CDS Mphil Econometrics

3/3/2014. CDS M Phil Econometrics. Vijayamohanan Pillai N. Truncated standard normal distribution for a = 0.5, 0, and 0.5. CDS Mphil Econometrics Lmted Dependent Varable Models: Tobt an Plla N 1 CDS Mphl Econometrcs Introducton Lmted Dependent Varable Models: Truncaton and Censorng Maddala, G. 1983. Lmted Dependent and Qualtatve Varables n Econometrcs.

More information

The Vickrey-Target Strategy and the Core in Ascending Combinatorial Auctions

The Vickrey-Target Strategy and the Core in Ascending Combinatorial Auctions The Vckrey-Target Strategy and the Core n Ascendng Combnatoral Auctons Ryuj Sano ISER, Osaka Unversty Prelmnary Verson December 26, 2011 Abstract Ths paper consders a general class of combnatoral auctons

More information

Jeffrey Ely. October 7, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.

Jeffrey Ely. October 7, This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License. October 7, 2012 Ths work s lcensed under the Creatve Commons Attrbuton-NonCommercal-ShareAlke 3.0 Lcense. Recap We saw last tme that any standard of socal welfare s problematc n a precse sense. If we want

More information

Welfare Aspects in the Realignment of Commercial Framework. between Japan and China

Welfare Aspects in the Realignment of Commercial Framework. between Japan and China Prepared for the 13 th INFORUM World Conference n Huangshan, Chna, July 3 9, 2005 Welfare Aspects n the Realgnment of Commercal Framework between Japan and Chna Toshak Hasegawa Chuo Unversty, Japan Introducton

More information

Competitive Rumor Spread in Social Networks

Competitive Rumor Spread in Social Networks Compettve Rumor Spread n Socal Networks Yongwhan Lm Operatons Research Center, Massachusetts Insttute of Technology yongwhan@mt.edu Asuman Ozdaglar EECS, Massachusetts Insttute of Technology asuman@mt.edu

More information

Inequity aversion. Puzzles from experiments

Inequity aversion. Puzzles from experiments Inequty averson Readngs: Fehr and Schmdt (1999) Camerer (2003), Ch. 2.8, pp.101-104 Sobel (2005) pp. 398-401 Puzzles from experments Compared to self-nterest model: Too much generosty & cooperaton Dctator

More information

Macroeconomic Theory and Policy

Macroeconomic Theory and Policy ECO 209 Macroeconomc Theory and Polcy Lecture 7: The Open Economy wth Fxed Exchange Rates Gustavo Indart Slde 1 Open Economy under Fxed Exchange Rates Let s consder an open economy wth no captal moblty

More information

COST ALLOCATION IN PUBLIC ENTERPRISES: THE CORE AND ISSUES OF CROSS-SUBSIDIZATION. Haralambos D Sourbis*

COST ALLOCATION IN PUBLIC ENTERPRISES: THE CORE AND ISSUES OF CROSS-SUBSIDIZATION. Haralambos D Sourbis* COST ALLOCATION IN PUBLIC ENTERPRISES: THE CORE AND ISSUES OF CROSS-SUBSIDIZATION By Haralambos D Sourbs* Abstract Ths paper examnes the mplcatons of core allocatons on the provson of a servce to a communty

More information

Monetary Tightening Cycles and the Predictability of Economic Activity. by Tobias Adrian and Arturo Estrella * October 2006.

Monetary Tightening Cycles and the Predictability of Economic Activity. by Tobias Adrian and Arturo Estrella * October 2006. Monetary Tghtenng Cycles and the Predctablty of Economc Actvty by Tobas Adran and Arturo Estrella * October 2006 Abstract Ten out of thrteen monetary tghtenng cycles snce 1955 were followed by ncreases

More information

4. Greek Letters, Value-at-Risk

4. Greek Letters, Value-at-Risk 4 Greek Letters, Value-at-Rsk 4 Value-at-Rsk (Hull s, Chapter 8) Math443 W08, HM Zhu Outlne (Hull, Chap 8) What s Value at Rsk (VaR)? Hstorcal smulatons Monte Carlo smulatons Model based approach Varance-covarance

More information

Understanding price volatility in electricity markets

Understanding price volatility in electricity markets Proceedngs of the 33rd Hawa Internatonal Conference on System Scences - 2 Understandng prce volatlty n electrcty markets Fernando L. Alvarado, The Unversty of Wsconsn Rajesh Rajaraman, Chrstensen Assocates

More information