SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong Kong Daniel R. Figueiredo School of Computer and Communication Sciences  Swiss Federal Institute of Technology – Lausanne (EPFL) ACM SIGMETRICS / IFIP Performance June 2006
Tutorial Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Game Theory About? ,[object Object],[object Object],[object Object],[object Object],[object Object],2 2
Applications of Game Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations of Game Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Game? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification of Games ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Matrix Game (Normal form) ,[object Object],[object Object],[object Object],Player 1 Player 2 Strategy set  for Player 1 Strategy set  for Player 2 Payoff to Player 1 Payoff to Player 2 ,[object Object],(3, 4) (0, 0) B (3, -1) (-5, 1) B (-2, -1) (2, 2) A C A
More Formal Game Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two-person Zero-sum Games ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyzing the Game ,[object Object],Player 1 Player 2 Strictly  dominated strategy (dominated by C) Strictly  dominated strategy  (dominated by B) -1 2 1 -16 D 3 4 2 5 C -18 3 1 3 B 0 1 -1 12 A D C B A
Dominance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Solving the Game Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 2 3 B 4 -1 -2 T R M L
Solving the Game Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],-1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Analyzing the Game Player 1 Player 2 ,[object Object],[object Object],-1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Saddle Points ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why Play Saddle Points? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 -1 0 -16 D 3 2 5 C 0 -1 12 A D B A
Why Play Saddle Points? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 -1 0 -16 D 3 2 5 C 0 -1 12 A D B A Powerful arguments to play saddle point!
Solving the Game (min-max algorithm) ,[object Object],[object Object],[object Object],Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],-5 -4 8 0 D 3 1 5 7 C -1 0 2 -10 B 5 2 3 4 A D C B A -5 1 -10 2 5 2 8 7
Multiple Saddle Points Player 1 Player 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-5 -4 0 8 D 3 2 2 5 C -1 0 -10 2 B 5 2 2 3 A D C B A -5 2 -10 2 5 2 2 8
Games With no Saddle Points ,[object Object],[object Object],Player 1 Player 2 3 0 B 1 -5 B -1 2 A C A
Mixed Strategies ,[object Object],[object Object],[object Object],Player 1 Payoff to P1 when playing A = 1/3(4) + 2/3(0) = 4/3 Payoff to P1 when playing B = 1/3(-5) + 2/3(3) = 1/3 ,[object Object],3 0 D -5 B 4 A C 2/3 1/3
Mixed Strategies ,[object Object],[object Object],[object Object],Player 1 Payoff to P1 when playing A = x(4) + (1-x)(0) = 4x Payoff to P1 when playing B = x(-5) + (1-x)(3) = 3 – 8x 4x = 3 – 8x, thus x = 1/4 ,[object Object],3 0 D -5 B 4 A C (1-x) x
Mixed Strategies ,[object Object],[object Object],[object Object],[object Object],Player 1 Payoff to P2 when playing C = x(-4) + (1-x)(5) = 5 - 9x Payoff to P2 when playing D = x(0) + (1-x)(-3) = -3 + 3x 5 – 9x = -3 + 3x, thus x = 2/3 Player 2 Payoff to P2 = -1 3 0 D -5 B 4 A C (1-x) x
Minimax Theorem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two-person Non-zero Sum Games ,[object Object],[object Object],Player 1 Player 2 ,[object Object],[object Object],-1, 2 2, 0 B 5, 1 B 3, 4 A A
What is the Solution? ,[object Object],[object Object],[object Object],[object Object],Player 1 Player 2 Player 1 Player 2 2, 1 -1, 4 B 3, 2 B 5, 0 A A -1, 2 2, 0 B 3, 1 B 5, 4 A A
Multiple Solution Problem ,[object Object],[object Object],[object Object],Player 1 Player 2 equilibria 2, 2 1, 1 B 0, 1 B 1, 4 A A
The Good News: Nash’s Theorem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Prisoner’s Dilemma ,[object Object],[object Object],[object Object],[object Object],Suspect 1 Suspect 2 payoff is years in jail ( smaller is better ) single NEP better  outcome 5, 5 10, 1 C 1, 10 C 2, 2 S S
Pareto Optimal ,[object Object],Suspect 1 Suspect 2 ,[object Object],[object Object],[object Object],Pareto Optimal 5, 5 10, 1 C 1, 10 C 2, 2 S S
Game of Chicken Revisited ,[object Object],[object Object],Driver 1 Driver 2 Drivers want to do opposite of one another Will prior communication help? 2 2 -10, -10 -1, 5 stay 5, -1 stay 0, 0 swerve swerve
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How much should firm  i  produce?
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],value chosen by firm 2 value chosen by firm 1
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],and and
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],less quantity produced higher price Competition can be good!
Example: Cournot Model of Duopoly ,[object Object],[object Object],[object Object],NEP : strategies are mutual best responses ,[object Object]
Game Trees (Extensive form) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Game Trees Example ,[object Object],Player 1 Player 2 Player 2 L L R R R L 3, 1 1, 2 -2, 1 0, -1 ,[object Object],what to do when P1 plays L  what to do when P1 plays R  ,[object Object],Payoff to Player 2 Payoff to Player 1
More Formal Extensive Game Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Game Tree Example ,[object Object],[object Object],[object Object],[object Object],Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Converting to Matrix Game ,[object Object],[object Object],Microsoft Mozilla 0, 0 1, 0 java, .net 2, 2 3, 1 .net, java 2, 2 0, 0 java 1, 0 3, 1 .net java, java .net, .net .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
NEP and Incredible Threats Microsoft Mozilla NEP incredible threat ,[object Object],[object Object],.net .net java java java .net 3, 1 1, 0 0, 0 2, 2 0, 0 1, 0 java, .net 2, 2 3, 1 .net, java 2, 2 0, 0 java 1, 0 3, 1 .net java, java .net, .net
Solving the Game (backward induction) ,[object Object],[object Object],Best strategy for Mozilla: .net, java (follow Microsoft) Best strategy for Microsoft: .net ,[object Object],[object Object],Equilibrium outcome .net java 3, 1 2, 2 .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Backward Induction on Game Trees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Leaders and Followers ,[object Object],[object Object],Mozilla: java Microsoft: .net, java ,[object Object],[object Object],[object Object],[object Object],Mozilla Microsoft Microsoft .net .net java java java .net 1, 3 0, 1 0, 0 2, 2
The Subgame Concept ,[object Object],[object Object],[object Object],[object Object],Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2
Subgame Perfect Nash Equilibrium ,[object Object],[object Object],[object Object],[object Object],[object Object]
Subgame Perfect Nash Equilibrium ,[object Object],[object Object],[object Object],MS Mozilla J N Subgame Perfect NEP Not subgame Perfect NEP Microsoft Mozilla Mozilla .net .net java java java .net 3, 1 1, 0 0, 0 2, 2 0,0 1,0 JN 2,2 3,1 NJ 2,2 0,0 J 1,0 3,1 N JJ NN
Title

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
gt_2007
gt_2007gt_2007
gt_2007
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory in Economics
Game theory in EconomicsGame theory in Economics
Game theory in Economics
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Lecture 1 - Game Theory
Lecture 1 - Game TheoryLecture 1 - Game Theory
Lecture 1 - Game Theory
 
Game theory
Game theoryGame theory
Game theory
 
Game theory
Game theoryGame theory
Game theory
 
Game
Game Game
Game
 
Game theory
Game theoryGame theory
Game theory
 
Game Theory Presentation
Game Theory PresentationGame Theory Presentation
Game Theory Presentation
 
Game theory ppt
Game theory pptGame theory ppt
Game theory ppt
 
Game theory ppt
Game theory pptGame theory ppt
Game theory ppt
 
Game theory
Game theoryGame theory
Game theory
 
An introduction to Game Theory
An introduction to Game TheoryAn introduction to Game Theory
An introduction to Game Theory
 
Game Theory
Game TheoryGame Theory
Game Theory
 

Ähnlich wie file1

Ähnlich wie file1 (20)

Game Theory SV.docx
Game Theory SV.docxGame Theory SV.docx
Game Theory SV.docx
 
Unit II A - Game Theory
Unit II A - Game TheoryUnit II A - Game Theory
Unit II A - Game Theory
 
Newgame (2)
Newgame (2)Newgame (2)
Newgame (2)
 
Game theory 2011
Game theory 2011Game theory 2011
Game theory 2011
 
Gt brno
Gt brnoGt brno
Gt brno
 
Game theory
Game theoryGame theory
Game theory
 
Seminar_3.pptx
Seminar_3.pptxSeminar_3.pptx
Seminar_3.pptx
 
OR 14 15-unit_4
OR 14 15-unit_4OR 14 15-unit_4
OR 14 15-unit_4
 
Bba 3274 qm week 5 game theory
Bba 3274 qm week 5 game theoryBba 3274 qm week 5 game theory
Bba 3274 qm week 5 game theory
 
navingameppt-191018085333.pdf
navingameppt-191018085333.pdfnavingameppt-191018085333.pdf
navingameppt-191018085333.pdf
 
Gametheory 110125221603-phpapp02
Gametheory 110125221603-phpapp02Gametheory 110125221603-phpapp02
Gametheory 110125221603-phpapp02
 
game THEORY ppt
game THEORY pptgame THEORY ppt
game THEORY ppt
 
Module 3 Game Theory (1).pptx
Module 3 Game Theory (1).pptxModule 3 Game Theory (1).pptx
Module 3 Game Theory (1).pptx
 
Gametheoryofeconomicsformanagersmba.pptx
Gametheoryofeconomicsformanagersmba.pptxGametheoryofeconomicsformanagersmba.pptx
Gametheoryofeconomicsformanagersmba.pptx
 
The Minority Game: Individual and Social Learning
The Minority Game: Individual and Social LearningThe Minority Game: Individual and Social Learning
The Minority Game: Individual and Social Learning
 
Game theory
Game theoryGame theory
Game theory
 
AI Strategies for Solving Poker Texas Hold'em
AI Strategies for Solving Poker Texas Hold'emAI Strategies for Solving Poker Texas Hold'em
AI Strategies for Solving Poker Texas Hold'em
 
Game theory2
 Game theory2 Game theory2
Game theory2
 
Game theory
Game theoryGame theory
Game theory
 
Game Theory Operation Research
Game Theory Operation ResearchGame Theory Operation Research
Game Theory Operation Research
 

Mehr von webuploader

Michael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_NetworkingMichael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_Networkingwebuploader
 
cyberSecurity_Milliron
cyberSecurity_MillironcyberSecurity_Milliron
cyberSecurity_Millironwebuploader
 
LiveseyMotleyPresentation
LiveseyMotleyPresentationLiveseyMotleyPresentation
LiveseyMotleyPresentationwebuploader
 
FairShare_Morningstar_022607
FairShare_Morningstar_022607FairShare_Morningstar_022607
FairShare_Morningstar_022607webuploader
 
3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling3_System_Requirements_and_Scaling
3_System_Requirements_and_Scalingwebuploader
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailabilitywebuploader
 
scale_perf_best_practices
scale_perf_best_practicesscale_perf_best_practices
scale_perf_best_practiceswebuploader
 
7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summitwebuploader
 
FreeBSD - LinuxExpo
FreeBSD - LinuxExpoFreeBSD - LinuxExpo
FreeBSD - LinuxExpowebuploader
 

Mehr von webuploader (20)

Michael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_NetworkingMichael_Hulme_Banff_Social_Networking
Michael_Hulme_Banff_Social_Networking
 
socialpref
socialprefsocialpref
socialpref
 
cyberSecurity_Milliron
cyberSecurity_MillironcyberSecurity_Milliron
cyberSecurity_Milliron
 
PJO-3B
PJO-3BPJO-3B
PJO-3B
 
LiveseyMotleyPresentation
LiveseyMotleyPresentationLiveseyMotleyPresentation
LiveseyMotleyPresentation
 
FairShare_Morningstar_022607
FairShare_Morningstar_022607FairShare_Morningstar_022607
FairShare_Morningstar_022607
 
saito_porcupine
saito_porcupinesaito_porcupine
saito_porcupine
 
3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling3_System_Requirements_and_Scaling
3_System_Requirements_and_Scaling
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailability
 
scale_perf_best_practices
scale_perf_best_practicesscale_perf_best_practices
scale_perf_best_practices
 
7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit7496_Hall 070204 Research Faculty Summit
7496_Hall 070204 Research Faculty Summit
 
Chapter5
Chapter5Chapter5
Chapter5
 
Mak3
Mak3Mak3
Mak3
 
visagie_freebsd
visagie_freebsdvisagie_freebsd
visagie_freebsd
 
freebsd-watitis
freebsd-watitisfreebsd-watitis
freebsd-watitis
 
BPotter-L1-05
BPotter-L1-05BPotter-L1-05
BPotter-L1-05
 
FreeBSD - LinuxExpo
FreeBSD - LinuxExpoFreeBSD - LinuxExpo
FreeBSD - LinuxExpo
 
CLI313
CLI313CLI313
CLI313
 
CFInterop
CFInteropCFInterop
CFInterop
 
WCE031_WH06
WCE031_WH06WCE031_WH06
WCE031_WH06
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

file1

  • 1. Introduction to Game Theory and its Applications in Computer Networks John C.S. Lui Dept. of Computer Science & Engineering The Chinese University of Hong Kong Daniel R. Figueiredo School of Computer and Communication Sciences Swiss Federal Institute of Technology – Lausanne (EPFL) ACM SIGMETRICS / IFIP Performance June 2006
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Title