We investigate the extent to which price updates can increase the revenue of a seller with little prior information on demand. We study prior-free revenue maximization for a seller with unlimited supply of n item types facing m myopic... more
. The literature review brings us closer to understanding, it is of utmost importance for the construction and analysis of knowledge. The approach to these points arises from the vision of general science and is specifically directed to... more
The views expressed are those of the authors and do not necessarily reflect those of CRESE.
In this letter, we address joint channel and power allocation in a device-to-device (D2D) network underlaying a cellular network in a time-varying environment. A fully distributed solution, which does not require information exchange, is... more
Some major financial markets are currently reporting that 50% or more of all transactions are now executed by automated trading systems (ATS). To understand the impact of ATS proliferation on the global financial markets, academic studies... more
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e.g., Target, Home Depot) are very sophisticated security attacks on critical cyber infrastructures. Such attacks are referred to as... more
The evolution of a system from the transient phase into a steady-state or asymptotic phase is an important area of study in engineering and the mathematical sciences. While analytic methods exist for determining the steady-state behavior... more
When starting a new collective venture, it is important to understand partners' motives and how strongly they commit to common goals. Arranging prior commitments or agreements on how to behave has been shown to be an evolutionary viable... more
As artificial intelligence (AI) systems are increasingly embedded in our lives, their presence leads to interactions that shape our behaviour, decision-making, and social interactions. Existing theoretical research has primarily focused... more
The mechanisms of emergence and evolution of collective behaviours in dynamical Multi-Agent Systems (MAS) of multiple interacting agents, with diverse behavioral strategies in copresence, have been undergoing mathematical study via... more
The mechanisms of emergence and evolution of collective behaviours in dynamical Multi-Agent Systems (MAS) of multiple interacting agents, with diverse behavioral strategies in co-presence, have been undergoing mathematical study via... more
Both conventional wisdom and empirical evidence suggest that arranginga priorcommitment or agreement before an interaction takes place enhances the chance of reaching mutual cooperation. Yet it is not clear what mechanisms might underlie... more
Rapid technological advancements in Artificial Intelligence (AI), as well as the growing deployment of intelligent technologies in new application domains, have generated serious anxiety and a fear of missing out among different... more
Haldane accurately anticipates the conditions under which cooperation is the favorable choice in an interaction between genetic relatives. The general condition can later be formulated as a surprisingly simple mathematical expression,... more
In Evolutionary Biology and Game Theory, there is a long history of models aimed at predicting strategies adopted by agents during resource foraging. In Artificial Life, the agentbased modeling approach allowed to simulate the evolution... more
The role of imperfect information in a principal-agent relationship subject to moral hazard is considered. A necessary and sufficient condition for imperfect information, to improve on contracts based on the payoff alone is derived, and a... more
A challenge for future user-provided networks will be reconciling potentially conflicting demands for a finite resource, such as network bandwidth. In this position paper, we discuss how this problem is tackled in an operational... more
A major evolutionary question is how reproductive sharing arises in cooperatively breeding species despite the inherent reproductive conflicts in social groups. Reproductive skew theory offers one potential solution: each group member... more
We present automatic verification techniques for the modelling and analysis of probabilistic systems that incorporate competitive behaviour. These systems are modelled as turn-based stochastic multi-player games, in which the players can... more
This paper considers one machine job scheduling situations or sequencing problems, where clients can have more than a single job to be processed in order to get a final output. Moreover, a job can be of interest for different players.... more
We consider competition between non-cooperative mobiles over several independent collision multiple-access channels or more generally, over interference channels. A mobile selects one of the channels for transmission; if the same channel... more
This paper presents a new, multidimensional comprehensive equilibrium theory that goes beyond classical theories such as Nash equilibrium and behavioral game theory equilibrium, by integrating rational factors (such as economic losses and... more
In this thesis, we study the problems of risk measurement, valuation and hedging of financial positions in incomplete markets when an insufficient number of assets are available for investment (real options). We work closely with three... more
In the context of voting with ranked ballots, an important class of voting rules is the class of margin-based rules (also called pairwise rules). A voting rule is margin-based if whenever two elections generate the same head-to-head... more
In this thesis, we study the problems of risk measurement, valuation and hedging of financial positions in incomplete markets when an insufficient number of assets are available for investment (real options). We work closely with three... more
A handlebody link is a union of handlebodies of positive genus embedded in 3-space, which generalizes the notion of links in classical knot theory. In this paper, we consider handlebody links with one genus 2 handlebody and n−1 solid... more
We report on an experiment comparing two institutions for determining spending on public goods. Two parties bargain over how to divide a dollar between a public and two private accounts, one for each party. Each party attaches a different... more
introduce the weakest link against the best shot property to the Colonel Blotto game where the defendant has to win all the battle fields while the attacker only needs to win at least one battlefield. They characterize the Nash... more
Clark and Konrad (2007) introduce the weakest link against the best shot property to the Colonel Blotto game where the defendant has to win all the battle fields while the attacker only needs to win at least one battlefield. They... more
and A 2 decide to invest simultaneously. b.-Companies A 1 and A 2 decide to wait. c.-Company A 1 (the leader) decides to invest and company A 2 (the follower) decides to wait. And d.-Company A 1 decides to wait and company A 2 decides to... more
The Shapley value for nonatomic games is used to determine the shares of equity and risky debt in the value of a firm facing uncertain growth opportunities. We include the "voting power" attached to equity holdings and focus on the... more
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences. Game theory can be applied to the... more
In evolutionary game theory, a relative comparison of the cost and benefit associated with obtaining a resource, called payoff, is used as an indicator of fitness of an organism. Such payoff matrices are used to understand complex... more
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things... more
Game Theory acts as a suitable tool offering promising solutions to security -related concerns in Mobile Ad Hoc Networks (i.e., MANETs ). In MANETs , security forms a prominent concern as it includes nodes which are usually portable and... more
The progressively ubiquitous connectivity in the present information systems pose newer challenges to security. The conventional security mechanisms have come a long way in securing the well-defined objectives of confidentiality,... more
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario, where dynamic host movement results in frequent topology changes. In MANET, nodes cooperate during route establishment, and the data packet must travel... more
a b s t r a c t 29 Intratumoral heterogeneity (ITH) has been regarded as a key cause of the failure and resistance of cancer 30 therapy, but how it behaves and functions remains unclear. Advances in single-cell analysis have facili-31... more
Linked econometric models can often be viewed upon as a difference game. In this paper we study linear quadratic difference games. The Pareto optimal strategies and sufficient conditions for the Nash optimal strategy to be Pareto optimal... more
In this work, an integrated Game Theory (GT) approach is developed for the coordination of multienterprise Supply Chains (SCs) in a competitive uncertain environment. The conflicting goals of the different participants are solved through... more
In this paper, we model socially-embedded games. We use non-cooperative game forms with pure strategy Nash equilibria and embed them through framing structures. These frames alter how players perceive the game, or rule out the choice of... more
In this paper, we model socially-embedded games. We use non-cooperative game forms with pure strategy Nash equilibria and embed them through framing structures. These frames alter how players perceive the game, or rule out the choice of... more
This paper presents new cooperative path planning algorithms for multiple unmanned aerial vehicles (UAVs) using Game theory-based particle swarm optimization (GPSO). First, the formation path planning is formulated into the minimization... more
In this paper we shall formulate some open problems, conjectures in the field of number theory. Some of them were formulated earlier in one of my papers [1], [2], [3], [4].
Along with rapid economic growth in Indonesia, Container throughput of Indonesia's Port also increasing. The container throughput of Tanjung Priok decrease on average 7.8% 2012 -2015. The CAGR of container throughput 2015 -2016 is 9.5%.... more