A Hierarchical Spatial Game over Licenced Resources

Size: px
Start display at page:

Download "A Hierarchical Spatial Game over Licenced Resources"

Transcription

1 A Hierarchical Spatial Game over icenced Resources Gaurav S. Kasbekar, Eitan Altman and Saswati Sarkar Abstract We consider a scenario in which a regulator owns the spectrum in a region. Two service providers lease spectrum from the regulator and set up a base station each to serve mobile subscribers. This lea to a hierarchical game with players at two levels- the mobile subscribers at level and the service providers at level 2. In the game at level, each mobile subscriber chooses a service provider to subscribe to and whether to be a primary subscriber of its service provider and receive high-priority service or to be a secondary subscriber and receive low-priority service. In the game at level 2, each service provider chooses the quantity of spectrum to lease from the regulator and the rates at which to charge its mobile subscribers for the throughput they receive. We first analyze the game at level for different models and in each case show the existence of a threshold-type Wardrop equilibrium, in which there exist threshol that divide the region into sets of mobile subscribers that make the same decision at equilibrium. Next, assuming that the mobile subscribers act so as to give rise to the equilibrium found above, we analyze the game at level 2 and show the existence of a Nash equilibrium. I. INTRODUCTION We consider a scenario in which a regulator owns the spectrum in a certain region. A number of service providers lease spectrum from the regulator. Each service provider sets up a base station to serve mobile subscribers in the region. We examine the interactions between the regulator, service providers and mobile subscribers using a hierarchical game. In this hierarchical game, there are games at two levels: the game at level or game in which the mobile subscribers are players and the game at level 2 or game 2 in which the service providers are players. In game, each mobile subscriber chooses the service provider to receive service from and whether to be a primary user of its service provider and receive high-priority service or to be a secondary user and receive low-priority service. Owing to spectrum limitations, the rate allocated to each mobile subscriber depen on the sets of mobile subscribers that subscribe to different service providers as primary and as secondary users. Game 2 investigates the interactions among service providers. Each service provider i chooses the quantity β i of spectrum to lease from the regulator. It also chooses at what rate to charge its mobile subscribers for the throughput they receive. The quantity β i chosen by service provider i determines its leasing cost. Now, since there are multiple service providers competing for the same set of mobile G. Kasbekar and S. Sarkar are with the Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA. E. Altman is with INRIA, Sophia-Antipolis, France. Their addresses are: kgaurav@seas.upenn.edu, Eitan.Altman@sophia.inria.fr and swati@seas.upenn.edu. subscribers, if a service provider i charges a very high rate to its subscribers or offers poor quality of service (which occurs if it chooses a small β i ), then only a few mobile subscribers would choose service provider i. On the other hand, if it charges a very low rate to its subscribers or chooses a very high β i, then its revenues from the subscribers would be low or its leasing cost would be high respectively. We analyze this setup as a hierarchical game. That is, we analyze the games at levels and 2 in that order and find an equilibrium in each case. In particular, first, we fix the amount of spectrum β i purchased by each service provider i and the rate at which the service providers charge the mobile subscribers. For these fixed quantities, we look for a Wardrop equilibrium in game. Next, assuming that for a given set of values of β i and usage-based charges, the mobile subscribers will act so as to give rise to the Wardrop equilibrium found above, we analyze game 2 and look for a Nash equilibrium. A. Related Work Hotelling 5 introduced hierarchical games in which competing firms choose their locations and the prices of goo, which determines an equilibrium allocation of customers to the firms. Mazalov and Sakaguchi 4 analyzed a hierarchical game in which two firms have customers in a city. For fixed locations of the firms in the city, a customer chooses the firm from whom to purchase goo based on the prices of the goo set by the firms and its distances from the firms. An equilibrium allocation of the customers to the two firms is obtained. Next, equilibrium locations of the two firms are found that maximize their gains in the induced equilibrium of customer allocations. A recent paper that is closely related to our paper is by Altman et. al 6, which considers a hierarchical game with players at two levels base stations and mobile subscribers. For given locations of the base stations, each mobile chooses the base station to associate with so as to maximize its Signal to Interference and Noise Ratio (SINR). Then, the locations of base stations are determined so as to maximize the revenues from the associated mobiles. One of the aspects in which our work differs from 6 is that each base station chooses the amount of spectrum to purchase from the regulator, whereas the base stations in 6 do not make this choice. On the other hand, locations of base stations are fixed in our paper, unlike 6. B. Outline of Paper Throughout the paper, we consider the case in which two base stations serve mobile subscribers located on a straight line. We describe the system model in Section II.

2 Sections III and IV consider the game described above. In Section III, we consider a scenario with two fixed populations of mobile subscribers of the two base stations. Each mobile can choose whether to be a primary or secondary mobile of its service provider. In Section III-A, with rate-fair access (see Section II) for the primary mobiles, we show that a Wardrop equilibrium exists and has a threshold-type structure in which, in the cell of each base station, mobile subscribers on one side of the threshold choose to be primary and on the other side choose to be secondary. In Section III-B, we repeat the process in Section III-A for the case of time-fair access (see Section II) for primaries. In Section IV, we analyze the case of migration in which a mobile can choose the service provider that it wants to join. In Section IV-A, we consider the simple case in which each mobile has two choices to be primary of service provider or to be primary of service provider 2. We show that a threshold-type Wardrop equilibrium exists in which mobiles on the left of the threshold become primaries of service provider and mobiles on the right become primaries of service provider 2. In Section IV-B, we analyze the general case in which each mobile can choose to be a primary or secondary of service provider or a primary or secondary of service provider 2. We show that a threshold-type Wardrop equilibrium exists in which there are three threshol which divide the set of mobile subscribers into secondaries of service provider, primaries of service provider, primaries of service provider 2 and secondaries of service provider 2. Section V considers game 2. In Section V-A, we formulate game 2 in a general scenario, which includes as special cases the level 2 games corresponding to all the previous sections. In Section V-B, we find Nash equilibria for the simple case of migration in Section IV-A. II. THE MODE Consider two neighboring cells on the line (that coincides with the horizontal axis x) of length and 2 respectively. The cells contain a large number of mobiles continuously distributed with a distribution of λ (x) and λ 2 (x) mobiles per meter, respectively. et λ i : C i λ i (x)dx. Mobiles in cell C and C 2 are subscribed to service provider and 2, respectively, and are served by the Base Stations (BS) located at point (y, R) (BS ) and (z,r) (BS 2) respectively (see Fig. ). BS i is assumed to purchase prioritized access for a fraction β i of the time from the regulator. During that fraction of time it is guaranteed to have no interference from the other BS. Mobiles in that cell that communicate with the BS during that time are called primary. The rest of the mobiles are called secondary. In each cell, secondary users communicate during the remaining fraction β β 2 of the time. Consider the downlink and assume that whenever BS i transmits, it uses power P i. We assume that at each time BS i transmits with all its power to a single mobile. The power received at a mobile located at point (x, 0) from BS i is given by P i h i (x) where h i (x) is the gain. We Fig.. The cells and base stations shall assume that it correspon to the path loss given by h (x) (R 2 +(x y) 2 ) ξ/2, h 2 (x) (R 2 +(x z) 2 ) ξ/2 where ξ is the path loss exponent 7. The SINR (Signal to Interference and Noise Ratio) at x C experienced by the secondary users is given by: SINR(x) s P h (x) σ 2 + P 2 h 2 (x). () where σ 2 is the noise power and that experienced by the primary users at x C is given by: SINR p (x) P h (x) σ 2. Similar expressions hold for primary and secondary users at x C 2. et μ i (x) be the density of mobiles at x C i that are primary. We have of course 0 μ i (x) λ i (x) for all x C i.et μ i : C i μ i (x)dx. We assume that the instantaneous throughput of both primary and secondary mobiles is given by the following expression, which is based on Shannon s capacity theorem 2: θ i (x) log( + SINR i (x)) Rate of secondary mobiles Assume that each BS devotes an equal fraction of time for transmission to each of its secondary mobile subscribers. We call this the time fair allocation policy. The number of secondary users in C i is λ i μ i and the fraction of time available for their transmission is β β 2. Thus the average throughput of a secondary user located at x C i is: Θ i (x) β β 2 λ i μ i log( + SINR s i (x)) (2) Rate of primary mobiles We shall consider two policies for serving primary users: a rate fair and a time fair. Under the time fair policy, each BS devotes an equal fraction of time for transmission to each of its primary mobile subscribers. In the rate fair policy, the fraction of time allotted to a primary mobile is set in a way that the average transmission rate to each primary mobile is the same (within each cell).

3 Consider the rate fair policy for the primary users. et r i be the fixed rate of primary users in cell C i. The fraction of time that a primary mobile at x C i receives positive throughput is r i log( + SINR p i (x)) r i is then the solution to β i C i r i log( + SINR p i (x))μ i(x)dx and is thus given by ( ) r i β i C i log( + SINR p i (x))μ i(x)dx (3) III. DECENTRAIZED CHOICE OF CASS In this section, we assume that each mobile decides whether to become a primary or secondary subscriber of its service provider. Assume that there is a cost per throughput unit of γ p and γ s for the primary and secondary users. We assume that 0 < γ i <, i p, s}. A. Rate-Fair Policy for Primaries In this subsection, we assume that the rate-fair policy is used for primary users. The utilities U p i (x) and U i s (x) for a mobile at x C i of choosing to be primary or secondary respectively, are then given by U p i (x) r i( γ p ), (4) Ui s (x) β β 2 log( + SINRi s (x))( γ s ) (5) λ i μ i We seek a Wardrop equilibrium 3 in the game in which each mobile chooses whether to be a primary or secondary mobile. A Wardrop equilibrium is the analog of a Nash equilibrium for the case of a large number of small players, as is the case with mobiles in our setup. Now, note that U p i (x) and U i s (x) are functions of the spatial decision pattern μ i (x) :x C i }. The pattern μ i (x) :x C i } is a Wardrop equilibrium if at each point x: μ i (x) 0 if U p i (x) <Us i (x) μ i (x) λ i (x) if U p i (x) >Us i (x) (6) 0 <μ i (x) <λ i (x) only if U p i (x) U i s(x) We now characterize the structure of the Wardrop equilibrium. Assume that μ (.) is an equilibrium. Then by (4), (5) and (6): where μ (x) 0 if SINR s (x) >c, λ (x) if SINR(x) s <c c c(μ )exp( r ( γ p )( λ μ ) ( γ s )( β β 2 ) From (): μ (x) 0 if W (x) > 0 λ (x) if W (x) < 0 (7) where W (x) P (R 2 +(x y) 2 ) ξ/2 c(σ 2 + P 2 (R 2 +(x z) 2 ) ξ/2 ) emma 3.: Assume that for some x C such that y< x<z, μ (x) λ (x). Then μ (x )λ (x ) for all x x, 2z x C. Proof: The term (R 2 +(x y) 2 ) ξ/2 decreases in x for x>y.theterm c(σ 2 +(R 2 +(x z) 2 ) ξ/2 ) decreases in x at x<zso that c(σ 2 +(R 2 +(x z) 2 ) ξ/2 ) > c(σ 2 +(R 2 +(x z) 2 ) ξ/2 ) (8) for x < x < z. Finally, for z < x < 2z x we set s 2z x and we note that x<s<zand that c(σ 2 +(R 2 +(x z) 2 ) ξ/2 ) c(σ 2 +(R 2 +(s z) 2 ) ξ/2 ) and hence (8) hol for x<x < 2z x. Similarly we get emma 3.2: Assume that for some x C such that y< x<z, μ (x) 0. Then μ (x )0for all x 2y x, x C. emma 3.3: Assume that μ (.) is an equilibrium. et ζ : ( ) c(μ)σ /ξ. 2 P Then for all x / y ζ,y + ζ we have μ (x) λ (x). Proof: x/ y ζ,y + ζ implies that: Hence, (x y) 2 > ζ 2 P (x y) 2 + R 2 ξ/2 < c(μ )σ 2 ζ 2 R 2 ( c(μ )σ 2 ) 2/ξ R 2 P c(μ )σ 2 + P 2 (R 2 +(x z) 2 ) ξ/2 That is, W (x) < 0 and hence μ (x) λ (x) by (7). Note that if BS is located at y inf(x C ) then for x C, 2y x inf(x C ) and hence emma 3.2 implies that μ (x) has a threshold structure: it either equals λ (x) for all x C or it is 0 everywhere or there is a threshold t such that for x<t, μ (x) 0and for x>t, μ (x) λ (x) for x C. Similar results hold for cell C 2. In the next subsection we shall show that the same structure is obtained with the time fair policy for primaries as long as we are in the low SINR regime. B. Time Fair Policy for Primaries We now assume that each base station serves all its primaries for equal amount of time. Thus, the average throughput at x for a primary of base station i is β i / μ i log( + S i (x)/σ 2 ) and for a secondary of base station i is ( β β 2 )/( λ i μ i ) log( + S i (x)/i i (x)) where S i (x) is the

4 signal power and I i (x) is the sum of the interference and noise power experienced by a mobile at x C i. Consider cell C. et the left endpoint of C be the origin and the right endpoint be the point (, 0). Assume that z>. We will show that a threshold-type Wardrop equilibrium exists. Suppose the density is of the following form: λ (x) if x>t μ (x) (9) 0 if x<t where t 0, will be chosen later. By (6), for μ (x) to be a Wardrop equilibrium, μ (x) λ (x) if: ( + S (x)/σ 2 ) ( γp)β/ μ > ( + S (x)/i (x)) ( γs)( β β2)/( λ μ ). For large σ 2, since I (x) σ 2, using Taylor series expansion, the relation becomes That is, where: ( γ p )β S (x)/σ 2 μ > ( γ s )( β β 2 )S (x)/( λ μ )I (x), μ (x) λ (x) if I (x) >T (t ) (0) T (t ) ( γ s)( β β 2 )σ 2 μ ( γ p )β ( λ μ ) Recall that I (x) σ 2 + P 2 (R 2 +(x z) 2 ) ξ/2 () Since I (x) is a continuous function of x, by the intermediate value theorem (Fact 4. in Section IV-B), either there exists a value of x such that I (x) T (t ),ori (x) <T (t ) x 0, or I (x) >T (t ) x 0,.etf(t ) be the value of x that satisfies I (x) T (t ), if a solution exists, else let f(t ) if I (x) <T (t ) x 0, and f(t )0if I (x) >T (t ) x 0,. Note that I (x) is an increasing function of x. Hence, by (0), for μ (x) to be a Wardrop equilibrium, it must satisfy: λ (x) if x>f(t μ (x) ) (2) 0 if x<f(t ) Recall that μ t λ (x)dx. Hence, as t increases, μ decreases and λ μ increases. So by (), T (t ) is a decreasing function of t. Also, since I (x) is a continuous, increasing function of x, by definition of f(.), it follows that f(t ) is a decreasing function of t. Also, note that f(t ) is a continuous function of t.et f(t )f(t ) t.if f(0) f(0) 0 and f( )f( ) 0, then by the intermediate value theorem (Fact 4. in Section IV-B), there exists a value of t,sayt, such that f(t )0, that is f(t )t. From (9) and (2), it follows that the density in (9) with t t is a Wardrop equilibrium. If f(0) < 0 (respectively, if f( ) > 0), then since f(.) is decreasing, f( ) < 0 (respectively, f(0) > 0). Also, f(0) f(0) < 0 (respectively, f( ) f( )+ > ) and hence by (9) and (2), the density in (9) with t 0 (respectively, t ) is a Wardrop equilibrium. Thus, a threshold-type Wardrop equilibrium exists in all cases. A symmetrical argument shows that a threshold-type Wardrop equilibrium exists in cell C 2. IV. MIGRATION So far, we have considered two fixed populations of mobile subscribers each connecting to a different operator. We next consider the possibility of choosing to which BS to connect. At each point x, a mobile can decide to be primary or secondary of BS or primary or secondary of BS2. In Section IV-B, we show the existence of a thresholdtype Wardrop equilibrium for this scenario. Before that, in Section IV-A, we consider the simple case in which there are no secondary mobiles and each mobile chooses whether to be a primary of BS or BS 2 and show the existence of a Wardrop equilibrium. A. Simple Case Suppose mobiles are located on the x-axis from x 0to x with a density function λ(x). Moreover, BS and 2 are located at (, 0) and ( +, 0) respectively. Each mobile decides whether to become a primary user of BS or a primary user of BS 2. et μ(x) be the density of mobiles at x that are primaries of BS. Suppose both base stations employ rate-fair access. et r and r 2 be the rate of each mobile with BS and BS 2 respectively. et SNR (x) and SNR 2 (x) be the signal to noise ratios of the users of BS and BS 2 respectively at x. Wehave: SNR (x) P (x +) ξ σ 2 SNR 2 (x) P 2( + x) ξ σ 2 We use the low-snr approximation of throughput, i.e. the throughput of a mobile at x is log( + SNR i (x)) SNR i (x). From (3), we get: r 0 β μ(x)σ 2 P (x +) ξ dx β 2 (3) r 2 (4) (λ(x) μ(x))σ 2 0 P 2 ( + x) ξ dx The utilities of mobiles associated with BS and BS 2 are respectively: U p (x) r ( γ,p ) (5) U p 2 (x) r 2( γ 2,p ) (6) where γ,p and γ 2,p are the costs per throughput unit of primary mobiles associated with BS and BS 2 respectively. A density μ(x) :0 x } is a Wardrop equilibrium if μ(x) λ(x) only at points x such that U p (x) U p 2 (x) and μ(x) 0only at points x such that U p (x) U p 2 (x).

5 We show that there exists a threshold-type Wardrop equilibrium. Consider the following density μ(x): λ(x) if x<s μ(x) 0 if x>s (7) where s is chosen as a solution of U p (x) U p 2 (x), which, using (3) to (6), can be written as: ( γ,p ) λ(x)( + x) ξ dx β 2 P 2 s s ( γ 2,p ) λ(x)(x +) ξ dx (8) β P 0 We show that a solution s s to (8) exists. The quantity on the left hand side of (8) decreases from a positive number to 0 as s increases from 0 to. The quantity on the right hand side increases from 0 to a positive number as s increases from 0 to. Also, both these quantities are continuous functions of s since they are integrals and hence differentiable with respect to s. From Fact 4.2 in Section IV-B, it follows that for some s, says s, the quantity on the left hand side equals the quantity on the right hand side. Now, to show that (7) is a Wardrop equilibrium, note that with μ(x) given by (7), since U p (x) U p 2 (x) x 0,, obviously, it is weakly best for a mobile at x<s to associate with BS (since U p (x) U p 2 (x)) and for a mobile at x>s to associate with BS 2 (since U p 2 (x) U p (x)). B. General Case Again, suppose mobiles are located on the x-axis from x 0to x with a density function λ(x). Moreover, BS and 2 are located at (, 0) and ( +, 0) respectively. Assume that β + β 2 <. Each mobile decides whether to become a primary user of BS, primary user of BS 2, secondary user of BS or secondary user of BS 2. et μ (x) (respectively μ 2 (x)) be the density at x of primary mobiles associated with BS (respectively BS 2). et α (x) (respectively α 2 (x)) be the density at x of secondary mobiles associated with BS (respectively BS 2). Assume rate-fair access for primaries. Denote the utility of a primary user of BS, secondary user of BS, primary user of BS 2 and secondary user of BS 2 at x by U p (x), U s (x), U p 2 (x) and U 2 s (x) respectively. A set of densities μ (x),μ 2 (x),α (x),α 2 (x) : x 0,} constitute a Wardrop equilibrium if at any point x: ) μ (x) λ(x) (respectively, μ 2 (x) λ(x)) only if U p (x) (respectively, U p 2 (x)) is a maximum among U p (x),up 2 (x),us (x) and U2 s (x) and μ (x) 0(respectively, μ 2 (x) 0) otherwise; and 2) α (x) λ(x) (respectively, α 2 (x) λ(x)) only if U s (x) (respectively, U2 s (x)) is a maximum among U p (x),up 2 (x),us (x) and U2 s (x) and α (x) 0(respectively, α 2 (x) 0) otherwise. We show that there exists a threshold-type Wardrop equilibrium with theshol s, s 2 and s 3 where 0 <s <s 2 < s 3 <and: λ(x) if 0 x<s α (x) (9) 0 else λ(x) if s x<s μ (x) 2 0 else λ(x) if s2 x<s μ 2 (x) 3 0 else λ(x) if s3 x< α 2 (x) 0 else Fig. 2 shows the Wardrop equilibrium. secondary mobiles primary mobiles primary mobiles secondary mobiles (20) (2) (22) BS of BS of BS of BS 2 of BS 2 BS 2 0 s s 2 s 3 + Fig. 2. The threshold-type Wardrop equilibrium in Section IV-B et γ,p and γ 2,p be the costs per throughput unit of primary mobiles associated with BS and BS 2 respectively and γ,s and γ 2,s be the costs per throughput unit of secondary mobiles associated with BS and BS 2 respectively. et A (s ) s 0 λ(u)du and A 2(s 3 ) s 3 λ(u)du be the total number of secondary mobiles associated with BS and BS 2 respectively. We use the low-sinr approximation: log( + SINR i (x)) SINR i (x). Since the average throughput of a primary mobile of BS i is r i and that of a secondary mobile is given by a formula similar to (2), we have: U s (x) U p (x) r ( γ,p ) β ( γ,p ) s2 (u +) ξ du ( s λ(u)σ 2 P (23) β β 2 SINR s A (s ) (x)( γ,s ) ) ( β β 2 P (x +) ξ ) ( γ,s ) s 0 λ(u)du σ 2 + P 2 ( + x) ξ (24) U p 2 (x) r 2( γ 2,p ) β 2 ( γ 2,p ) s3 ( + u) ξ du s 2 λ(u)σ 2 P 2 (25) U2 s β β 2 (x) SINR s A 2 (s 3 ) 2(x)( γ 2,s ) β ( β 2 P2 ( + x) ξ ) ( γ 2,s ) s 3 λ(u)du σ 2 + P (x +) ξ (26) We assume that there exists a constant l such that emma 4.: The equations λ(x) l>0 x 0, (27) U s (s )U p (x) U p 2 (x) U s 2 (s 3 ) (28) have a solution s, s 2, s 3 where 0 <s <s 2 <s 3 <.

6 We prove emma 4. later. Suppose s, s 2 and s 3 are chosen as a solution of (28). Now, by (24) and (26), U s (x) (respectively U2 s (x)) is a decreasing (respectively increasing) function of x. Also, by (23) and (25), U p (x) and U p 2 (x) are constant functions of x. Hence, by (28), it follows that among U s (x), U p (x), U p 2 (x) and U2 s (x): ) U s (x) is a maximum for 0 x<s 2) U p (x) is a maximum for s x<s 2 3) U p 2 (x) is a maximum for s 2 x<s 3 4) U2 s (x) is a maximum for s 3 x< Hence, we get the following result: Theorem 4.: The densities given by (9), (20), (2) and (22) constitute a Wardrop equilibrium. Proof: Proof of emma 4. Recall the intermediate value theorem. Fact 4.: et f be a continuous real function on the interval a, b. Suppose f(a) f(b). Ifc lies between f(a) and f(b), then there is a point x a, b such that f(x) c. The following fact can be easily proved using Fact 4.. Fact 4.2: et f and h be continuous real functions on the interval a, b. Suppose f(a) > 0, f(b) 0, h(a) 0 and h(b) > 0. Then there is a point c (a, b) such that f(c) h(c). In addition, if f is strictly decreasing and h is strictly increasing, then there is a unique such point c. et g (s ) U ( s(s ) s 0 λ(u)du ) (σ 2 + P 2 ( + s ) ξ ) β β 2 P (s +) ξ (29) ( γ,s ) g 2 (s,s 2 ) g 3 (s 2,s 3 ) U p (x) s2 U p 2 (x) s3 s λ(u)σ 2 P s 2 λ(u)σ 2 P 2 (u +) ξ du β ( γ,p ) ( + u) ξ du β 2 ( γ 2,p ) (30) (3) g 4 (s 3 ) U2 s(s 3) ( ) ( s 3 λ(u)du σ 2 + P (s 3 +) ξ ) β β 2 P 2 ( + s 3 ) ξ (32) ( γ 2,s ) From (29) and (32), it follows that g (s ) strictly increases from 0 to a positive value as s increases from 0 to and that g 4 (s 3 ) strictly decreases from a positive value to 0 as s 3 increases from 0 to. Also,g and g 4 are continuous functions. From Fact 4.2, there exists a unique value s such that g (s )g 4 (s ). Also, from continuity and strict monotonicity of g and g 4,itfollowsthatforeveryt such that 0 t, there exist unique values s (t) and s 3(t) such that s (t) s, s 3(t) s, s 3(t) s (t) t and g (s (t)) g 4 (s 3(t)). Moreover, s (t) and s 3(t) are continuous functions of t. Now, from (27), (30) and (3) it follows that for 0 < t, g 2 (s (t),s 2 ) strictly increases from 0 to a positive value and that g 3 (s 2,s 3(t)) strictly decreases from a positive value to 0 as s 2 increases from s (t) to s 3(t). Moreover, g 2 (s (t),s 2 ) and g 3 (s 2,s 3(t)) are continuous functions of s 2. From Fact 4.2 it follows that there exists a unique value s 2 s 2(t) such that s (t) < s 2(t) < s 3(t) and g 2 (s (t),s 2(t)) g 3 (s 2(t),s 3(t)). emma 4.2: s 2(t) is a continuous function of t. We will prove emma 4.2 later. By emma 4.2, s (t), s 2(t) and s 3(t) are continuous functions of t, g 2 is a continuous function of s and s 2 and g 3 is a continuous function of s 2 and s 3. g and g 4 are continuous functions of s and s 3 respectively. Since the composition of continuous functions is continuous, it follows that g, g 2, g 3 and g 4 are continuous functions of t. Denote g (t) g (s (t)) etc. We have: g 2 (s (t),s 2(t)) g 3 (s 2(t),s 3(t)) t 0, g 2 (s (0),s 2(0)) 0 and g 2 (s (),s 2()) > 0 g (s (t)) g 4 (s 3(t)) t 0, g (s (0)) > 0 and g (s ()) 0 Using Fact 4.2, from the above equations and continuity of g (t) and g 2 (t), it follows that there exists a value of t, where 0 <t<and: g (s (t)) g 2 (s (t),s 2(t)) g 3 (s 2(t),s 3(t)) g 4 (s 3(t)) This completes the proof of emma 4. Proof: Proof of emma 4.2 We show that given any ɛ>0, there exists a δ>0 such that: t t <δ s 2(t ) s 2(t) <ɛ To show this, let t>0 be arbitrary. We have: g 2 (s (t),s 2(t)) g 3 (s 2(t),s 3(t)) 0 (33) et t >t. The case t <tis symmetrical. Since s (t ) and s 3(t ) are continuous functions of t, g 2 (s,s 2(t)) is a continuous function of s and g 3 (s 2(t),s 3 ) is a continuous function of s 3, by the composition rule, it follows that for fixed t, g 2 (s (t ),s 2(t)) and g 3 (s 2(t),s 3(t )) are continuous functions of t. So by (33), for any ɛ > 0, there exists a δ > 0 such that 0 <t t<δ g 2 (s (t ),s 2(t)) g 3 (s 2(t),s 3(t )) <ɛ Assume that: g 2 (s (t ),s 2(t)) g 3 (s 2(t),s 3(t )) Δ(t, t ) > 0 (34)

7 The case in which Δ(t, t ) < 0 is symmetrical. et s 2 < s 2(t). Then from (27) and (30): g 2 (s (t ),s 2(t)) g 2 (s (t ),s 2 ) From (27) and (3): s 2 (t) λ(u)σ 2 s 2 P (u +) ξ du β ( γ,p ) lσ 2 P β ( γ,p ) (s 2(t) s 2 ) (35) g 3 (s 2,s 3(t )) g 3 (s 2(t),s 3(t )) s 2 (t) λ(u)σ 2 s 2 P 2 ( + u) ξ du β 2 ( γ 2,p ) lσ 2 P 2 β 2 ( γ 2,p ) (s 2(t) s 2 ) (36) Adding (35) and (36), using (34) and rearranging terms, we get: g 2 (s (t ),s 2 ) g 3 (s 2,s 3(t )) Δ(t, t ) lσ 2 P β ( γ,p ) + (s P 2 β 2 ( γ 2,p ) 2(t) s 2 ) Hence, if s 2 is such that: s 2(t) s 2 lσ 2 Δ(t, t ) P + β ( γ,p) P 2β 2( γ 2,p) then g 2 (s (t ),s 2 ) g 3 (s 2,s 3(t )) 0. Now,g 2 (s (t ),s 2 ) and g 3 (s 2,s 3(t )) are continuous in s 2. Hence, it follows from (34) and Fact 4. that g 2 (s (t ),s 2 ) g 3 (s 2,s 3(t )) vanishes for some s 2 in the following interval: s Δ(t, t ) 2(t),s 2(t) lσ 2 That s 2 is s 2(t ). Hence: s 2(t ) s 2(t) lσ 2 P + β ( γ,p) P 2β 2( γ 2,p) Δ(t, t ) P + β ( γ,p) P 2β 2( γ 2,p) (37) Recall that given any ɛ > 0, there exists δ>0 such that t t <δ Δ(t, t ) <ɛ (38) Choose: ɛ ɛ 2 lσ2 P β ( γ,p ) + P 2 β 2 ( γ 2,p ) By (37) and (38): t t <δ s 2(t ) s 2(t) <ɛ Hence, s 2(t) is a continuous function of t. V. GAME 2 In this section, we analyze game 2. InSectionV-A,we formulate a general version of game 2 and in Section V-B, we find Nash equilibria for the simple version of migration described in Section IV-A. A. General Problem Formulation In all the sections above, we obtained a threshold-type Wardrop equilibrium of the mobiles. We now describe a scenario, which captures the distributions arising in the above sections as special cases. We formulate the level 2 game for this general scenario. et c (β ) and c 2 (β 2 ) be the amounts paid by BS and BS 2 to purchase fractions β and β 2. Also, let Θ p (respectively, Θ p 2 ) be the total throughput of primary mobiles of BS (respectively, BS 2) and Θ s (respectively, Θ s 2) be the total throughput of secondary mobiles of BS (respectively, BS 2). The utilities of BS and BS 2 are given by (39) and (40) respectively: U BS Θ p γ,p +Θ s γ,s c (β ) (39) U2 BS Θ p 2 γ 2,p +Θ s 2γ 2,s c 2 (β 2 ) (40) This is a game in which BS and BS 2 are the players. BS chooses β, γ,p and γ,s. BS 2 chooses β 2, γ 2,p and γ 2,s. Suppose s < s R and that mobiles are located in the interval s,s R.etλ(x) be the density of mobiles at x. et s, s 2 and s 3 be threshol such that s s s 2 s 3 s R. Suppose all mobiles in the intervals s,s ), s,s 2 ), s 2,s 3 ) and s 3,s R are secondary users of BS, primary users of BS, primary users of BS 2 and secondary users of BS 2 respectively. We now explain how the level 2 games corresponding to the level games in the previous sections are special cases of the above general game. In Sections III-A and III-B, s inf(x C ), s 2 sup(x C )inf(x C 2 ), s R sup(x C 2 ). It was shown that in each cell C i, there is a threshold such that a user of BS i is primary when it is on the same side of the threshold as the other BS and a secondary otherwise. s and s 3 are these threshol. In Section IV, s 0and s R. In Section IV-A, s 0, s 3, s 2 s. In Section IV-B, s, s 2 and s 3 are the same variables as in the general game above. et μ and μ 2 be the total number of primary users of BS and BS 2 respectively. et α and α 2 be the total number of secondary users of BS and BS 2 respectively. Next, we derive expressions for Θ p and Θp 2 under rate-fair and time-fair access for primaries and expressions for Θ s and Θ s 2. Suppose rate-fair access is used for primaries. Similar to the derivation of (3), if μ > 0 (respectively μ 2 > 0), the rate of primary mobiles of BS (respectively BS 2) is given by (4) (respectively (42)). Θ p 2 r β s2 s log(+sinr p (x))λ(x)dx (4) r 2 s3 (42) s 2 log(+sinr p (x))λ(x)dx 2 If μ > 0 (respectively μ 2 > 0), then Θ p (respectively ) is given by (43) (respectively (44)), else it is 0. Θ p r s2 β 2 s λ(x)dx (43)

8 s3 Θ p 2 r 2 λ(x)dx (44) s 2 Now suppose time-fair access is used by primaries. Since the average throughput of a primary user is given by an expression similar to (2), if μ > 0 (respectively μ 2 > 0), then Θ p (respectively Θp 2 ) is given by (45) (respectively (46)), else it is 0. Θ p β s2 λ(x)dx s s2 log( + SINR p (x))λ(x)dx (45) s s3 Θ p 2 β 2 s3 log( + SINR p 2 (x))λ(x)dx (46) s 2 λ(x)dx s 2 By (2), if α > 0 (respectively α 2 > 0), Θ s (respectively Θ s 2) is given by (47) (respectively (48)), else it is 0. Θ s β β 2 s s λ(x)dx s s log( + SINR s (x))λ(x)dx (47) sr Θ s 2 β β 2 sr log( + SINR2(x))λ(x)dx s (48) s 3 λ(x)dx s 3 Note that r, r 2, Θ p, Θp 2, Θs, Θ s 2, U BS and U2 BS are all functions of β, β 2, γ,p, γ 2,p, γ,s and γ 2,s. s, s 2 and s 3 may also be functions of these parameters. We drop the arguments for brevity. B. Nash Equilibria for Migration In this subsection, we specialize the formulation in Section V-A to the simple version of migration described in Section IV-A and find Nash equilibria in the game. In the game in Section IV-A, let s (β,β 2 ) denote the threshold s and r (β,β 2 ) and r 2 (β,β 2 ) denote the rates r and r 2 with fractions β and β 2. The total throughputs of mobiles associated with BS and BS 2 are respectively given by: Θ (β,β 2 )r (β,β 2 ) s (β,β 2) 0 λ(x)dx (49) Θ 2 (β,β 2 )r 2 (β,β 2 ) λ(x)dx (50) s (β,β 2) The net profits of BS and BS 2 are: U BS (β,β 2 )Θ (β,β 2 )γ,p c (β ) (5) U2 BS (β,β 2 )Θ 2 (β,β 2 )γ 2,p c 2 (β 2 ) (52) Substituting Θ i (β,β 2 ) and r i (β,β 2 ) from (3), (4), (49) and (50) into the above equations and using (7), we get: (β,β 2 ) γ s,pβ (β,β 2) λ(x)dx 0 σ 2 s (β,β 2) P λ(x)(x +) 0 ξ dx c (β ) U BS U BS 2 (β,β 2 ) γ 2,p β 2 s (β,β 2) λ(x)dx (53) σ 2 P 2 s (β λ(x)( + x)ξ,β 2) dx c 2(β 2 ) (54) For brevity, in the sequel, we denote s (β,β 2 ) simply by s. We assume that λ(x), x 0, and that ξ is an integer. Also, we consider the case c i (β i )c i β i,i, 2} for non-negative constants c,c 2. Finally, we assume that γ,p and γ 2,p are constants and BS i chooses β i for i, 2 such that β,β 2 0 and β + β 2. et K(, ξ) ( +)ξ+ 2 ( +) ξ (ξ +) 3. ( + 2( +)+3( +) ξ( +) ξ ) (55) The following theorem identifies a set of conditions under which (β,β 2) is a Nash equilibrium. Theorem 5.: Suppose: ) β,β 2 0, β + β2 2) ( c max 0, γ,pp (ξ +) σ 2. ( +) ξ+ P ) ( γ,p ) P 2 ( γ 2,p ) K(, ξ)β β2 (56) and 3) ( c 2 max 0, γ 2,pP 2 (ξ +) σ 2. ( +) ξ+ P ) 2( γ 2,p ) P ( γ,p ) K(, ξ)β 2 β (57) Then (β,β 2) is a Nash equilibrium. Intuitively, if β + β2, and the costs c,c 2 for leasing spectrum are small enough, then U BS (β,β2) (respectively, U2 BS (β,β 2 )) is an increasing function of β (respectively, β 2 ). So when BS 2 chooses β2, the best response for BS is β β2 since β + β2. Similarly, when BS chooses β, the best response for BS 2 is β2 β since β + β 2. Hence, (β,β 2) is a Nash equilibrium. Proof: Substituting λ(x) and evaluating the integrals in (53) we get: U BS (β,β 2 ) γ,pp (ξ +) σ 2 β s (s +) ξ+ c β γ,pp (ξ +) σ 2 β h(s) c β (58) where: s h(s) (s +) ξ+ (59) Note that h(.) is a function of s s (β,β 2 ), which in turn is a function of β for fixed β 2. For brevity, in the sequel, we denote h(.) by h(s) or h(β ) or simply by h. We next find dh(β) dβ by evaluating dh(s) and dβ and using the chain rule : dh(β ) dβ dh(s) (60) dβ

9 Evaluating the integrals in (8) using λ(x), we find that s is the solution of the equation: (s +) ξ+ β P ( γ,p ) ( s +)ξ+ (6) β 2 P 2 ( γ 2,p ) Solving for β : β β 2P 2 ( γ 2,p ) P ( γ,p ) (s +) ξ+ ( s +) ξ+ (62) We differentiate this expression with respect to s to get dβ and use the fact that dβ dβ (see ) to give: ( ) P ( γ,p ). dβ β 2 P 2 ( γ 2,p ) ξ + ( s +) ξ+ 2 ( + 2)( s +) ξ (s +) ξ (s +) ξ ( s +) ξ (63) Note that the denominator of the second factor in the right hand side is positive for all s 0, (see (7)) and hence dβ 0. Now, differentiating (59) with respect to s, we get: dh(s) (s +)ξ ( ξs) (s +) ξ+ 2 (64) et t s+. Since s 0,, wehavet,+. Then: dh(s) Now, by factorization, we get: and ξtξ+ + t ξ ( + ξ) (t ξ+ ) 2 (65) ξt ξ+ + t ξ ( + ξ) (t ) 2 (ξt ξ +(ξ )t ξ t +) (66) (t ξ+ ) 2 (t ) 2 (t ξ + t ξ t +) 2 (67) By (65), (66) and (67), we get: dh(s) (ξtξ +(ξ )t ξ t +) (t ξ + t ξ t +) 2 (68) Now, by (60), (63) and (68), we get: ( ) dh P ( γ,p ). dβ β 2 P 2 ( γ 2,p ) ξ + ( s +) ξ+ 2 ( + 2)( s +) ξ (s +) ξ (s +) ξ ( s +) ξ. (ξt ξ +(ξ )t ξ t +) (t ξ + t ξ t +) 2 (69) Next, we upper bound dh dβ by bounding the different factors in the above expression. ( s +) ξ+ 2 ( +) ξ+ 2 (70) since s 0,. Now, ( + 2)( s +) ξ (s +) ξ (s +) ξ ( s +) ξ ( s +) ξ (s +) ξ +( s +) ξ (s +) ξ +(s +) ξ ( s +) ξ ( +) ξ (7) since the second and third terms are nonnegative and the first term attains a minimum value of ( +) ξ on s 0, at s 0and s. Also, since t,+, ξt ξ +(ξ )t ξ t + ξ( +) ξ +(ξ )( +) ξ ( +)+ (72) and (t ξ + t ξ t +) 2 (ξ +) 2 (73) From (69), (70), (7), (72), (73) and (55), we get: dh dβ P ( γ,p ) K(, ξ) (74) β 2 P 2 ( γ 2,p ) dh(s) From (68), it follows that < 0 and hence h(s) decreases with increase in s. Soh(s) takes its minimum value on s 0, at s. Therefore, h(s) h() ( +) ξ+, s 0, (75) Now, suppose β and β2 satisfy β +β2. Suppose BS 2 selects β 2 β2. Then BS must select β β β2. We show that U BS (β,β 2) U BS (β,β 2) for all β <β. From this it will follow that β is a best response to β2. et β <β. From (58), we get: U BS (β,β 2) U BS (β,β 2) γ,p P (ξ +) σ 2 βh(β ) β h(β ) c (β β ) (76) γ,p P (ξ +) σ 2 β(h(β ) h(β )) +h(β )(β β ) c (β β ) (77) γ,p P (ξ +) β(β β )h (α) +h(β )(β β ) c (β β ) (78) (β β ) γ,p P (ξ +) β P ( γ,p ) σ 2 β2 P K(, ξ) 2( γ 2,p ) } + ( +) ξ+ c (79) In (78), we used the fact that: σ 2 h(β ) h(β )h (α)(β β ) (80)

10 for some α (β,β ), which is a consequence of the mean value theorem. Equation (79) follows from (74) and (75). From (79), we get the following result: emma 5.: If c γ,pp (ξ +) σ 2. ( +) ξ+ P ( γ,p ) P 2 ( γ 2,p ) K(, ξ)β β2 then U BS (β,β 2) U BS (β,β 2). Now, if c 0, then U BS (β,β2) γ,pp (ξ +) σ 2 β h(β ) (8) emma 5.2: U BS (β,β2) in (8) is an increasing function of β. We prove emma 5.2 later. Now, from emma 5.2, it follows that if c 0, then β β is a best response to β2. Combining this fact with emma 5., we conclude that if the condition (56) is true, then β is a best response of BS tothestrategyβ2 of BS 2. By symmetry, it follows that if the condition (57) is true, then β2 is a best response of BS 2 to the strategy β of BS. Hence, under the conditions in Theorem 5., (β,β 2) is a Nash equilibrium. This concludes the proof of Theorem 5.. Note that for small enough β β, the second entry in the 2 max function in (56) is positive and hence we get the nontrivial result that if c is positive and less than this number and the other conditions in Theorem 5. are satisfied, then (β,β 2) is a Nash equilibrium. Proof: Proof of emma 5.2 Putting (59) in (8), we get: U BS (β,β2) γ,pp (ξ +) β σ 2 s (s +) ξ+ (82) By the remark after (63), s is an increasing function of β. β So it is sufficient to prove that is an increasing (s+) ξ+ function of β. By (62): β (s +) ξ+ β 2P 2 ( γ 2,p ) P ( γ,p ) ( s +) ξ+ (83) The expression on the right hand side is an increasing function of β because s is an increasing function of β. This concludes the proof. VI. CONCUSIONS AND FUTURE WORK We analyzed a hierarchical game with players at two levels mobile subscribers and service providers. Under different models, we showed the existence of a thresholdtype Wardrop equilibrium for the game at level. We also formulated a general game at level 2 that includes as special cases the level 2 games corresponding to the different level games we considered. Also, we found a Nash equilibrium corresponding to the simple version of the migration model. As part of future work, the existence of Nash equilibria can be shown for the level 2 games corresponding to the other level games we described. Also, we assumed fixed functions c i (β i ) for the leasing costs charged by the regulator to the service providers. As future work, these functions can be considered as variables to be optimized. Assuming that for given functions c i (β i ), the base stations and mobile subscribers act so as to give rise to the Nash equilibria found at level 2, optimal functions c i (β i ) can be found that achieve socially beneficial equilibria in some suitably defined sense. VII. ACKNOWEDGMENTS The contributions of G. Kasbekar and S. Sarkar have been supported by NSF grants NCR , CNS , ECS REFERENCES W. Rudin, Principles of Mathematical Analysis, Mc-Graw Hill, Third Edition, T. Cover, J. Thomas Elements of Information Theory, Wiley, M. Patriksson The Traffic Assignment Problem Models and Metho, VSP, V. Mazalov, M. Sakaguchi ocation Game on the Plane International Game Theory Review, H. Hotelling Stability in Competition Economic Journal, 39:4-57, E. Altman, A. Kumar, C. Singh, R. Sundaresan Spatial SINR Games Combining Base Station Placement and Mobile Association To appear in Proceedings of Infocom, Rio De Janeiro, Brazil, T. Rappaport Wireless Communications: Principles and Practice, 2nd edition, Prentice Hall, 2002.

Spatial SINR Games of Base Station Placement and Mobile Association

Spatial SINR Games of Base Station Placement and Mobile Association Spatial SINR Games of Base Station Placement and Mobile Association Eitan Altman, Fellow, IEEE, Anurag Kumar, Fellow, IEEE, Chandramani Singh, Student Member, IEEE, and Rajesh Sundaresan, Senior Member,

More information

Optimal mobile association on hybrid networks: centralized and decentralized case

Optimal mobile association on hybrid networks: centralized and decentralized case Optimal mobile association on hybrid networks: centralized and decentralized case Alonso Silva, Eitan Altman, Mérouane ebbah, Tembine Hamidou, Chloé Jimenez INRIA, Sophia-Antipolis, France Alcatel-Lucent

More information

An Evolutionary Game Perspective to ALOHA with power control

An Evolutionary Game Perspective to ALOHA with power control An Evolutionary Game Perspective to ALOHA with power control E. Altman a, N. Bonneau a, M. Debbah b and G. Caire b a MAESTRO, INRIA Sophia-Antipolis, 004 Route des Lucioles, B.P.93, 0690 Sophia-Antipolis,

More information

Routing Games : From Altruism to Egoism

Routing Games : From Altruism to Egoism : From Altruism to Egoism Amar Prakash Azad INRIA Sophia Antipolis/LIA University of Avignon. Joint work with Eitan Altman, Rachid El-Azouzi October 9, 2009 1 / 36 Outline 1 2 3 4 5 6 7 2 / 36 General

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Pierre Coucheney, Corinne Touati, Bruno Gaujal INRIA Alcatel-Lucent, LIG Infocom 2009 Pierre Coucheney (INRIA)

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Quality Sensitive Price Competition in. Spectrum Oligopoly-Part 1

Quality Sensitive Price Competition in. Spectrum Oligopoly-Part 1 Quality Sensitive Price Competition in 1 Spectrum Oligopoly-Part 1 Arnob Ghosh and Saswati Sarkar arxiv:1404.2514v4 [cs.gt] 21 May 2015 Abstract We investigate a spectrum oligopoly market where each primary

More information

Wireless Network Pricing Chapter 6: Oligopoly Pricing

Wireless Network Pricing Chapter 6: Oligopoly Pricing Wireless Network Pricing Chapter 6: Oligopoly Pricing Jianwei Huang & Lin Gao Network Communications and Economics Lab (NCEL) Information Engineering Department The Chinese University of Hong Kong Huang

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users

Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 6, JUNE 2002 917 Nash Equilibria for Combined Flow Control and Routing in Networks: Asymptotic Behavior for a Large Number of Users Eitan Altman, Senior

More information

Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma

Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma Congestion Equilibrium for Differentiated Service Classes Richard T. B. Ma School of Computing National University of Singapore Allerton Conference 2011 Outline Characterize Congestion Equilibrium Modeling

More information

Battery-State Dependent Power Control as a Dynamic Game

Battery-State Dependent Power Control as a Dynamic Game 1 Battery-State Dependent Power Control as a Dynamic Game Ishai Menache and Eitan Altman Faculty of Electrical Engineering, Technion, Haifa 32000, Israel INRIA, Sophia-Antipolis, 2004 Route des Lucioles,

More information

Spectrum Pricing Games with Arbitrary Bandwidth Availability Probabilities

Spectrum Pricing Games with Arbitrary Bandwidth Availability Probabilities Spectrum Pricing Games with Arbitrary Bandwidth Availability Probabilities Gaurav S. Kasbekar and Saswati Sarkar Abstract We consider price competition among multiple primary users in a Cognitive Radio

More information

ALOHA Performs Optimal Power Control in Poisson Networks

ALOHA Performs Optimal Power Control in Poisson Networks ALOHA erforms Optimal ower Control in oisson Networks Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu

More information

Dynamic Discrete Power Control in Cellular Networks

Dynamic Discrete Power Control in Cellular Networks 1 Dynamic Discrete Power Control in Cellular Networks Eitan Altman, Konstantin Avrachenkov, Ishai Menache, Gregory Miller, Balakrishna J. Prabhu, and Adam Shwartz Abstract We consider an uplink power control

More information

The Value of Sharing Intermittent Spectrum

The Value of Sharing Intermittent Spectrum The Value of Sharing Intermittent Spectrum R. erry, M. Honig, T. Nguyen, V. Subramanian & R. V. Vohra Abstract We consider a model of Cournot competition with congestion motivated by recent initiatives

More information

Dynamic discrete power control in cellular networks

Dynamic discrete power control in cellular networks Dynamic discrete power control in cellular networks Eitan Altman Konstantin Avrachenkov Ishai Menache Gregory Miller Balakrishna Prabhu Adam Shwartz December 2007 Abstract We consider an uplink power control

More information

EQUILIBRIUM STRATEGIES IN AN M/M/1 QUEUE WITH SETUP TIMES AND A SINGLE VACATION POLICY

EQUILIBRIUM STRATEGIES IN AN M/M/1 QUEUE WITH SETUP TIMES AND A SINGLE VACATION POLICY EQUILIBRIUM STRATEGIES IN AN M/M/1 QUEUE WITH SETUP TIMES AND A SINGLE VACATION POLICY Dequan Yue 1, Ruiling Tian 1, Wuyi Yue 2, Yaling Qin 3 1 College of Sciences, Yanshan University, Qinhuangdao 066004,

More information

OSNR Optimization in Optical Networks: Extension for Capacity Constraints

OSNR Optimization in Optical Networks: Extension for Capacity Constraints 5 American Control Conference June 8-5. Portland OR USA ThB3.6 OSNR Optimization in Optical Networks: Extension for Capacity Constraints Yan Pan and Lacra Pavel Abstract This paper builds on the OSNR model

More information

Network Non-Neutrality through Preferential Signaling

Network Non-Neutrality through Preferential Signaling Network Non-Neutrality through Preferential Signaling Manjesh Kumar Hanawal and Eitan Altman INRIA BP93, 2004 Route des Lucioles 06902 Sophia-Antipolis Cedex, France LIA, University of Avignon, 339, chemin

More information

Fixed Point Theorems

Fixed Point Theorems Fixed Point Theorems Definition: Let X be a set and let f : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation

More information

arxiv: v2 [cs.ni] 8 Apr 2014

arxiv: v2 [cs.ni] 8 Apr 2014 Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model Mohammad Hassan Lotfi ESE Department University of Pennsylvania Philadelphia, PA, 1910 lotfm@seas.upenn.edu

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Dynamic Bertrand and Cournot Competition

Dynamic Bertrand and Cournot Competition Dynamic Bertrand and Cournot Competition Effects of Product Differentiation Andrew Ledvina Department of Operations Research and Financial Engineering Princeton University Joint with Ronnie Sircar Princeton-Lausanne

More information

NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION. Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar

NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION. Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar Working Paper 12804 http://www.nber.org/papers/w12804 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts

More information

Numerical Differentiation & Integration. Numerical Differentiation II

Numerical Differentiation & Integration. Numerical Differentiation II Numerical Differentiation & Integration Numerical Differentiation II Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University

More information

Basics of Game Theory

Basics of Game Theory Basics of Game Theory Giacomo Bacci and Luca Sanguinetti Department of Information Engineering University of Pisa, Pisa, Italy {giacomo.bacci,luca.sanguinetti}@iet.unipi.it April - May, 2010 G. Bacci and

More information

MS&E 246: Lecture 18 Network routing. Ramesh Johari

MS&E 246: Lecture 18 Network routing. Ramesh Johari MS&E 246: Lecture 18 Network routing Ramesh Johari Network routing Last lecture: a model where N is finite Now: assume N is very large Formally: Represent the set of users as a continuous interval, [0,

More information

Flow Control, Routing, and Performance with a For-profit Service Provider

Flow Control, Routing, and Performance with a For-profit Service Provider November 2004 Flow Control, Routing, and Performance with a For-profit Service Provider by Daron Acemoglu 1 and Asuman Ozdaglar 2 Abstract We consider a game theoretic framework to analyze traffic in a

More information

Price and Capacity Competition

Price and Capacity Competition Price and Capacity Competition Daron Acemoglu, Kostas Bimpikis, and Asuman Ozdaglar October 9, 2007 Abstract We study the efficiency of oligopoly equilibria in a model where firms compete over capacities

More information

Intermediate Value Theorem

Intermediate Value Theorem Stewart Section 2.5 Continuity p. 1/ Intermediate Value Theorem The intermediate value theorem states that, if a function f is continuous on a closed interval [a,b] (that is, an interval that includes

More information

Advanced Microeconomics

Advanced Microeconomics Advanced Microeconomics Leonardo Felli EC441: Room D.106, Z.332, D.109 Lecture 8 bis: 24 November 2004 Monopoly Consider now the pricing behavior of a profit maximizing monopolist: a firm that is the only

More information

Cell Design to Maximize Capacity in CDMA Networks. Robert Akl, D.Sc.

Cell Design to Maximize Capacity in CDMA Networks. Robert Akl, D.Sc. Cell Design to Maximize Capacity in CDMA Networks Robert Akl, D.Sc. Outline CDMA inter-cell effects Capacity region Base station location Pilot-signal power Transmission power of the mobiles Maximize network

More information

Price and Capacity Competition

Price and Capacity Competition Price and Capacity Competition Daron Acemoglu a, Kostas Bimpikis b Asuman Ozdaglar c a Department of Economics, MIT, Cambridge, MA b Operations Research Center, MIT, Cambridge, MA c Department of Electrical

More information

Wireless Network Pricing Chapter 6: Oligopoly Pricing

Wireless Network Pricing Chapter 6: Oligopoly Pricing Wireless Network Pricing Chapter 6: Oligopoly Pricing Jianwei Huang & Lin Gao Network Communications and Economics Lab (NCEL) Information Engineering Department The Chinese University of Hong Kong Huang

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Zero-sum constrained stochastic games with independent state processes

Zero-sum constrained stochastic games with independent state processes Math. Meth. Oper. Res. (2005) 62: 375 386 DOI 10.1007/s00186-005-0034-4 ORIGINAL ARTICLE Eitan Altman Konstantin Avrachenkov Richard Marquez Gregory Miller Zero-sum constrained stochastic games with independent

More information

An empirical model of firm entry with endogenous product-type choices

An empirical model of firm entry with endogenous product-type choices and An empirical model of firm entry with endogenous product-type choices, RAND Journal of Economics 31 Jan 2013 Introduction and Before : entry model, identical products In this paper : entry with simultaneous

More information

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours.

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. University of Warwick, Department of Economics Spring 2012 EC941: Game Theory Prof. Francesco Squintani Final Exam Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. 1. Consider

More information

The Water-Filling Game in Fading Multiple Access Channels

The Water-Filling Game in Fading Multiple Access Channels The Water-Filling Game in Fading Multiple Access Channels Lifeng Lai and Hesham El Gamal arxiv:cs/05203v [cs.it] 3 Dec 2005 February, 2008 Abstract We adopt a game theoretic approach for the design and

More information

Are innocuous Minimum Quality Standards really innocuous?

Are innocuous Minimum Quality Standards really innocuous? Are innocuous Minimum Quality Standards really innocuous? Paolo G. Garella University of Bologna 14 July 004 Abstract The present note shows that innocuous Minimum Quality Standards, namely standards that

More information

Network Optimization: Notes and Exercises

Network Optimization: Notes and Exercises SPRING 2016 1 Network Optimization: Notes and Exercises Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely Abstract These notes provide a tutorial treatment of topics of

More information

Supermodular Games. Ichiro Obara. February 6, 2012 UCLA. Obara (UCLA) Supermodular Games February 6, / 21

Supermodular Games. Ichiro Obara. February 6, 2012 UCLA. Obara (UCLA) Supermodular Games February 6, / 21 Supermodular Games Ichiro Obara UCLA February 6, 2012 Obara (UCLA) Supermodular Games February 6, 2012 1 / 21 We study a class of strategic games called supermodular game, which is useful in many applications

More information

Optimal Pricing Effect on Equilibrium. Behaviors of Delay-Sensitive Users in Cognitive Radio Networks

Optimal Pricing Effect on Equilibrium. Behaviors of Delay-Sensitive Users in Cognitive Radio Networks Optimal Pricing Effect on Equilibrium 1 Behaviors of Delay-Sensitive Users in Cognitive Radio Networks arxiv:1212.3381v1 [cs.ni] 14 Dec 212 Nguyen H. Tran, Member, IEEE, Choong Seon Hong, Senior Member,

More information

The general programming problem is the nonlinear programming problem where a given function is maximized subject to a set of inequality constraints.

The general programming problem is the nonlinear programming problem where a given function is maximized subject to a set of inequality constraints. 1 Optimization Mathematical programming refers to the basic mathematical problem of finding a maximum to a function, f, subject to some constraints. 1 In other words, the objective is to find a point,

More information

1 Lattices and Tarski s Theorem

1 Lattices and Tarski s Theorem MS&E 336 Lecture 8: Supermodular games Ramesh Johari April 30, 2007 In this lecture, we develop the theory of supermodular games; key references are the papers of Topkis [7], Vives [8], and Milgrom and

More information

A Stackelberg Network Game with a Large Number of Followers 1,2,3

A Stackelberg Network Game with a Large Number of Followers 1,2,3 A Stackelberg Network Game with a Large Number of Followers,,3 T. BAŞAR 4 and R. SRIKANT 5 Communicated by M. Simaan Abstract. We consider a hierarchical network game with multiple links, a single service

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2016

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2016 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2016 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Efficiency and Braess Paradox under Pricing

Efficiency and Braess Paradox under Pricing Efficiency and Braess Paradox under Pricing Asuman Ozdaglar Joint work with Xin Huang, [EECS, MIT], Daron Acemoglu [Economics, MIT] October, 2004 Electrical Engineering and Computer Science Dept. Massachusetts

More information

Remote Estimation Games over Shared Networks

Remote Estimation Games over Shared Networks October st, 04 Remote Estimation Games over Shared Networks Marcos Vasconcelos & Nuno Martins marcos@umd.edu Dept. of Electrical and Computer Engineering Institute of Systems Research University of Maryland,

More information

Chapter 8: Taylor s theorem and L Hospital s rule

Chapter 8: Taylor s theorem and L Hospital s rule Chapter 8: Taylor s theorem and L Hospital s rule Theorem: [Inverse Mapping Theorem] Suppose that a < b and f : [a, b] R. Given that f (x) > 0 for all x (a, b) then f 1 is differentiable on (f(a), f(b))

More information

Final Project Report for EE599 (Special Topics: Decision Making in Networked Systems)

Final Project Report for EE599 (Special Topics: Decision Making in Networked Systems) Final Project Report for EE599 (Special Topics: Decision Making in Networked Systems) Project Title: Applications of Dynamic Games in Queues Shivasadat Navabi Sohi navabiso@usc.edu This report was prepared

More information

In the Name of God. Sharif University of Technology. Microeconomics 1. Graduate School of Management and Economics. Dr. S.

In the Name of God. Sharif University of Technology. Microeconomics 1. Graduate School of Management and Economics. Dr. S. In the Name of God Sharif University of Technology Graduate School of Management and Economics Microeconomics 1 44715 (1396-97 1 st term) - Group 1 Dr. S. Farshad Fatemi Chapter 10: Competitive Markets

More information

Supplementary appendix to the paper Hierarchical cheap talk Not for publication

Supplementary appendix to the paper Hierarchical cheap talk Not for publication Supplementary appendix to the paper Hierarchical cheap talk Not for publication Attila Ambrus, Eduardo M. Azevedo, and Yuichiro Kamada December 3, 011 1 Monotonicity of the set of pure-strategy equilibria

More information

ECON2285: Mathematical Economics

ECON2285: Mathematical Economics ECON2285: Mathematical Economics Yulei Luo Economics, HKU September 17, 2018 Luo, Y. (Economics, HKU) ME September 17, 2018 1 / 46 Static Optimization and Extreme Values In this topic, we will study goal

More information

Calculus in Business. By Frederic A. Palmliden December 7, 1999

Calculus in Business. By Frederic A. Palmliden December 7, 1999 Calculus in Business By Frederic A. Palmliden December 7, 999 Optimization Linear Programming Game Theory Optimization The quest for the best Definition of goal equilibrium: The equilibrium state is defined

More information

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games 6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Asu Ozdaglar MIT March 2, 2010 1 Introduction Outline Review of Supermodular Games Reading: Fudenberg and Tirole, Section 12.3.

More information

For general queries, contact

For general queries, contact PART I INTRODUCTION LECTURE Noncooperative Games This lecture uses several examples to introduce the key principles of noncooperative game theory Elements of a Game Cooperative vs Noncooperative Games:

More information

Competition between Virtual Operators in a Two-sided Telecommunication Market

Competition between Virtual Operators in a Two-sided Telecommunication Market Competition between Virtual Operators in a Two-sided Telecommunication Market Julia V. Chirkova Jaimie W. Lien Vladimir V. Mazalov Jie Zheng July 30, 017 Abstract Consider a market where two large companies

More information

Theory of Value Fall 2017

Theory of Value Fall 2017 Division of the Humanities and Social Sciences Ec 121a KC Border Theory of Value Fall 2017 Lecture 2: Profit Maximization 2.1 Market equilibria as maximizers For a smooth function f, if its derivative

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

Price of Stability in Survivable Network Design

Price of Stability in Survivable Network Design Noname manuscript No. (will be inserted by the editor) Price of Stability in Survivable Network Design Elliot Anshelevich Bugra Caskurlu Received: January 2010 / Accepted: Abstract We study the survivable

More information

Spring 2016 Network Science

Spring 2016 Network Science Spring 206 Network Science Sample Problems for Quiz I Problem [The Application of An one-imensional Poisson Process] Suppose that the number of typographical errors in a new text is Poisson istribute with

More information

Oblivious Equilibrium: A Mean Field Approximation for Large-Scale Dynamic Games

Oblivious Equilibrium: A Mean Field Approximation for Large-Scale Dynamic Games Oblivious Equilibrium: A Mean Field Approximation for Large-Scale Dynamic Games Gabriel Y. Weintraub, Lanier Benkard, and Benjamin Van Roy Stanford University {gweintra,lanierb,bvr}@stanford.edu Abstract

More information

Non-Cooperative Association Of Mobiles To Access Points Revisited

Non-Cooperative Association Of Mobiles To Access Points Revisited Non-Cooperative Association Of Mobiles To Access Points Revisited Cengis Hasan, Eitan Altman, Jean-Marie Gorce, Majed Haddad To cite this version: Cengis Hasan, Eitan Altman, Jean-Marie Gorce, Majed Haddad.

More information

MS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari

MS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari MS&E 246: Lecture 12 Static games of incomplete information Ramesh Johari Incomplete information Complete information means the entire structure of the game is common knowledge Incomplete information means

More information

Equilibrium solutions in the observable M/M/1 queue with overtaking

Equilibrium solutions in the observable M/M/1 queue with overtaking TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF MATHEMATICAL SCIENCES, DEPARTMENT OF STATISTICS AND OPERATION RESEARCH Equilibrium solutions in the observable M/M/ queue

More information

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-

More information

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

Equilibrium in Factors Market: Properties

Equilibrium in Factors Market: Properties Equilibrium in Factors Market: Properties Ram Singh Microeconomic Theory Lecture 12 Ram Singh: (DSE) Factor Prices Lecture 12 1 / 17 Questions What is the relationship between output prices and the wage

More information

The Mean Value Theorem

The Mean Value Theorem Math 31A Discussion Session Week 6 Notes February 9 and 11, 2016 This week we ll discuss some (unsurprising) properties of the derivative, and then try to use some of these properties to solve a real-world

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Free and Second-best Entry in Oligopolies with Network

Free and Second-best Entry in Oligopolies with Network Free and Second-best Entry in Oligopolies with Network Effects Adriana Gama Mario Samano September 7, 218 Abstract We establish an important difference between Cournot oligopolies with and without positive

More information

Strategic Properties of Heterogeneous Serial Cost Sharing

Strategic Properties of Heterogeneous Serial Cost Sharing Strategic Properties of Heterogeneous Serial Cost Sharing Eric J. Friedman Department of Economics, Rutgers University New Brunswick, NJ 08903. January 27, 2000 Abstract We show that serial cost sharing

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

A Jamming game in wireless networks with transmission cost

A Jamming game in wireless networks with transmission cost A Jamming game in wireless networks with transmission cost E. Altman 1, K. Avrachenkov 1, and A.Garnaev 2 1 INRIA Sophia Antipolis, France {altman,k.avrachenkov}@sophia.inria.fr 2 St. Petersburg State

More information

Functions. A function is a rule that gives exactly one output number to each input number.

Functions. A function is a rule that gives exactly one output number to each input number. Functions A function is a rule that gives exactly one output number to each input number. Why it is important to us? The set of all input numbers to which the rule applies is called the domain of the function.

More information

Price Competition with Elastic Traffic

Price Competition with Elastic Traffic Price Competition with Elastic Traffic Asuman Ozdaglar Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology August 7, 2006 Abstract In this paper, we present

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

A technical appendix for multihoming and compatibility

A technical appendix for multihoming and compatibility A technical appendix for multihoming and compatibility Toker Doganoglu and Julian Wright July 19, 2005 We would like to thank two anonymous referees and our editor, Simon Anderson, for their very helpful

More information

Connections between spectral properties of asymptotic mappings and solutions to wireless network problems

Connections between spectral properties of asymptotic mappings and solutions to wireless network problems 1 Connections between spectral properties of asymptotic mappings and solutions to wireless network problems R. L. G. Cavalcante, Member, IEEE, Qi Liao, Member, IEEE, and S. Stańczak, Senior Member, IEEE

More information

On Hotelling s Stability in Competition

On Hotelling s Stability in Competition On Hotelling s Stability in Competition Claude d Aspremont, Jean Jaskold Gabszewicz and Jacques-François Thisse Manuscript received March, 1978; revision received June, 1978 Abstract The purpose of this

More information

A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition

A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition Anna Nagurney John F. Smith Memorial Professor Dong Michelle Li PhD candidate Tilman Wolf Professor of Electrical

More information

6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games

6.254 : Game Theory with Engineering Applications Lecture 7: Supermodular Games 6.254 : Game Theory with Engineering Applications Lecture 7: Asu Ozdaglar MIT February 25, 2010 1 Introduction Outline Uniqueness of a Pure Nash Equilibrium for Continuous Games Reading: Rosen J.B., Existence

More information

Introduction to Game Theory Lecture Note 2: Strategic-Form Games and Nash Equilibrium (2)

Introduction to Game Theory Lecture Note 2: Strategic-Form Games and Nash Equilibrium (2) Introduction to Game Theory Lecture Note 2: Strategic-Form Games and Nash Equilibrium (2) Haifeng Huang University of California, Merced Best response functions: example In simple games we can examine

More information

Performance Planning, Quality-of-Service and Pricing under Competition

Performance Planning, Quality-of-Service and Pricing under Competition Performance Planning, Quality-of-Service and Pricing under Competition Corinne Touati 1, Parijat Dube, and Laura Wynter 1 Institute of Information Sciences and Electronics, University of Tsukuba, 1-1-1

More information

arxiv: v2 [cs.ni] 16 Jun 2009

arxiv: v2 [cs.ni] 16 Jun 2009 On Oligopoly Spectrum Allocation Game in Cognitive Radio Networks with Capacity Constraints Yuedong Xu a, John C.S. Lui,a, Dah-Ming Chiu b a Department of Computer Science & Engineering, The Chinese University

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Quality of Real-Time Streaming in Wireless Cellular Networks : Stochastic Modeling and Analysis

Quality of Real-Time Streaming in Wireless Cellular Networks : Stochastic Modeling and Analysis Quality of Real-Time Streaming in Wireless Cellular Networs : Stochastic Modeling and Analysis B. Blaszczyszyn, M. Jovanovic and M. K. Karray Based on paper [1] WiOpt/WiVid Mai 16th, 2014 Outline Introduction

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information

Aftermarket Power and Basic Market Competition

Aftermarket Power and Basic Market Competition Aftermarket Power and Basic Market Competition Luís Cabral IESE Business School and CEPR September 009 Abstract I revisit the issue of aftermarkets by developing an infinite period model with overlapping

More information

Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption *

Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption * ANNALS OF ECONOMICS AND FINANCE 16-1, 231 253 (2015) Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption * Hongkun Ma School of Economics, Shandong University,

More information

Product differences and prices

Product differences and prices Product differences and prices Claude d Aspremont, Jean Jaskold Gabszewicz and Jacques-François Thisse Abstract Under assumptions following Hotelling s 1929 paper Stability in Competition, the possibility

More information

1 Functions and Graphs

1 Functions and Graphs 1 Functions and Graphs 1.1 Functions Cartesian Coordinate System A Cartesian or rectangular coordinate system is formed by the intersection of a horizontal real number line, usually called the x axis,

More information

Mathematical Appendix. Ramsey Pricing

Mathematical Appendix. Ramsey Pricing Mathematical Appendix Ramsey Pricing PROOF OF THEOREM : I maximize social welfare V subject to π > K. The Lagrangian is V + κπ K the associated first-order conditions are that for each I + κ P I C I cn

More information

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden 1 Selecting Efficient Correlated Equilibria Through Distributed Learning Jason R. Marden Abstract A learning rule is completely uncoupled if each player s behavior is conditioned only on his own realized

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

THE dramatically increased mobile traffic can easily lead

THE dramatically increased mobile traffic can easily lead IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 12, DECEMBER 2016 3127 Dynamic Base Station Operation in Large-Scale Green Cellular Networks Yue Ling Che, Member, IEEE, Lingjie Duan, Member,

More information