arxiv: v2 [q-bio.pe] 23 Nov 2017

Size: px
Start display at page:

Download "arxiv: v2 [q-bio.pe] 23 Nov 2017"

Transcription

1 Zero-determinant strategies in finitely repeated games Genki Ichinose and Naoki Masuda 2 arxiv: v2 [q-bio.pe] 23 Nov 207 Department of Mathematical and Systems Engineering, Shizuoka University, 3-5- Johoku, Naka-ku, Hamamatsu, , Japan 2 Department of Engineering Mathematics, University of Bristol, Merchant Venturers Building, Woodland Road, Clifton, Bristol BS8 UB, United Kingdom Corresponding author (naoki.masuda@bristol.ac.uk) Abstract November 27, 207 Direct reciprocity is a mechanism for sustaining mutual cooperation in repeated social dilemma games, here a player ould keep cooperation to avoid being retaliated by a co-player in the future. So-called zero-determinant (ZD) strategies enable a player to unilaterally set a linear relationship beteen the player s on payoff and the co-player s payoff regardless of the strategy of the co-player. In the present study, e analytically study zero-determinant strategies in finitely repeated (to-person) prisoner s dilemma games ith a general payoff matrix. Our results are as follos. First, e present the forms of solutions that extend the knon results for infinitely repeated games (ith a discount factor of unity) to the case of finitely repeated games (0 < < ). Second, for the three most prominent ZD strategies, the equalizers, extortioners, and generous strategies, e derive the threshold value of above hich the ZD strategies exist. Third, e sho that the only strategies that enforce a linear relationship beteen the to players payoffs are either the ZD strategies or unconditional strategies, here the latter independently cooperates ith a fixed probability in each round of the game, proving a conjecture previously made for infinitely repeated games. Keyords Prisoner s dilemma game; Cooperation; Direct reciprocity; Discount factor Introduction The prisoner s dilemma game models situations in hich to individuals are involved in a social dilemma and each individual selects either cooperation (C) and defection (D) in the simplest setting. Although an individual obtains a larger payoff by selecting D regardless of the choice of the other individual, mutual defection, hich is the unique Nash equilibrium of the game, yields a smaller benefit to both players than mutual cooperation does. We no kno various mechanisms that enable mutual cooperation in the prisoner s dilemma game and other social dilemma games [ 3], hich inform us ho cooperation is probably sustained in society of humans and animals and ho to design cooperative organisations and society. One of the mechanisms enabling mutual cooperation in social dilemma games is direct reciprocity, i.e., repeated interaction, in hich the same to individuals play the game multiple times. An individual that defects ould be retaliated by the co-player in the succeeding rounds. Therefore, the rational decision for both players in the repeated prisoner s dilemma game is to keep mutual cooperation if the number of iteration is sufficiently large [, 4, 5]. Generous tit-for-tat [6] and in-stay lose-shift (often called Pavlov) [7, 8] strategies are strong competitors in evolutionary dynamics of the repeated prisoner s dilemma game under noise, and a population composed of them realizes a high level of mutual cooperation. In 202, hen the study of direct reciprocity seemed to be matured, Press and Dyson proposed a novel class of strategies in the repeated prisoner s dilemma game, called zero-determinant (ZD) strategies [9]. ZD strategies impose a linear relationship beteen the payoff obtained by a focal individual and its co-player regardless of the strategy that the co-player implements. A special case of the ZD strategies is the equalizer, ith hich

2 the focal individual unilaterally determines the payoff that the co-player gains regardless of hat the co-player does, ithin a permitted range of the co-player s payoff value (see [2, 0] for the previous accounts for this strategy). As a different special case, the focal individual can set an extortionate share of the payoff that the individual gains as compared to the co-player s payoff. The advent of the ZD strategies has spurred ne lines of investigations of direct reciprocity. They include the examination and extension of ZD strategies such as their evolution [ 22], multiplayer games [20, 23 26], continuous action spaces [25 28], alternating games [28], human reactions to computerized ZD strategies [29, 30], and human-human experiments [25, 3]. Most of the aforementioned mathematical and computational studies of the ZD strategies have been conducted under the assumption of infinitely repeated games. While mathematically more elegant and advantageous, finitely repeated games are more realistic than infinitely repeated games and comply ith experimental studies. In the present study, e examine the ZD strategies in the finitely repeated prisoner s dilemma game. There are a fe studies that have investigated ZD strategies in finitely repeated games. Hilbe and colleagues defined and mathematically characterized ZD strategies in finitely repeated games [32] (also see [29]). McAvoy and Hauert analyzed ZD strategies in the finitely repeated donation game (i.e., a special case of the prisoner s dilemma game) in a continuous strategy space [27, 28]. Given these studies, our main contributions in the present article are summarized as follos. First, e derive expressions for ZD strategies in finitely repeated games that are straightforard extensions of those previously found for the infinitely repeated game. Second, for the three most studied ZD strategies, e derive the threshold discount factor (i.e., ho likely the next round of the game occurs in the finitely repeated game) above hich the ZD strategy can exist. Third, e prove that imposing a linear relationship beteen the to individuals payoffs implies that the focal player takes either the ZD strategy defined for finitely repeated games[32] or an unconditional strategy(e.g., unconditional cooperation and unconditional defection), proving the conjecture in [5] in the case of finitely repeated games. 2 Preliminaries In this section, e explain the finitely repeated prisoner s dilemma game, the strategies of interest (i.e., memoryone strategies), and the expected payoffs. More thorough discussion of them is found in Refs. [2, 32, 33]. We consider the symmetric to-person prisoner s dilemma game hose payoff matrix is given by ( C D ) C R S. () D T P The entries represent the payoffs that the focal player, denoted by X, gains in a single round of a repeated game. Each ro and column represents the action of the focal player, X, and the co-player (denoted by Y), respectively. We assume that T > R > P > S, (2) hich dictates the prisoner s dilemma game. Both players obtain a larger payoff by selecting D than C because T > R and P > S. We also assume that 2R > T +S, (3) hich guarantees that mutual cooperation is more beneficial than the to players alternating C and D in the opposite phase, i.e., CD, DC, CD, DC,..., here the first and second letter represent the actions selected by X and Y, respectively [5,34]. The to players repeat the game hose payoff matrix in each round is given by Eq. (). A next round given the current round takes place ith probability (0 < < ), hich is called the discount factor. Consider to players X and Y that adopt memory-one strategies, ith hich they use only the outcome of the last round to decide the action to be submitted in the current round. A memory-one strategy is specified by a 5-tuple; X s strategy is given by a combination of p = (p CC,p CD,p DC,p DD ) (4) and p 0, here 0 p CC,p CD,p DC,p DD,p 0. In Eq. (4), p CC is the conditional probability that X cooperates hen both X and Y cooperated in the last round, p CD is the conditional probability that X cooperates hen X cooperated and Y defected in the last round, p DC is the conditional probability that X cooperates hen X defected and Y cooperated in the last round, and p DD is the conditional probability that X cooperates hen both X and Y defected in the last round. Finally, p 0 is the probability that X cooperates in the first round. Similarly, Y s strategy is specified by a combination of q = (q CC,q CD,q DC,q DD ) (5) 2

3 and the probability to cooperate in the first round, q 0, here 0 q CC,q CD,q DC,q DD,q 0. We refer to the first round of the repeated game as round 0. Because both players have been assumed to use a memory-one strategy, the stochastic state of the to players in round t (t 0) is specified by v(t) = (v CC (t),v CD (t),v DC (t),v DD (t)), (6) here v CC (t) is the probability that both players cooperate in round t, v CD (t) is the probability that X cooperates and Y defects in round t, and so forth. The normalization is given by v CC (t)+v CD (t)+v DC (t)+v DD (t) = (t = 0,,...). The initial condition is given by v(0) = (p 0 q 0,p 0 ( q 0 ),( p 0 )q 0,( p 0 )( q 0 )). (7) Because the expected payoff to player X in round t is given by v(t)s X, here the expected per-round payoff to player X in the repeated game is given by S X = (R,S,T,P), (8) π X = ( ) t v(t)sx. (9) The transition-probability matrix for v(t) is given by p CC q CC p CC ( q CC ) ( p CC )q CC ( p CC )( q CC ) M = p CD q DC p CD ( q DC ) ( p CD )q DC ( p CD )( q DC ) p DC q CD p DC ( q CD ) ( p DC )q CD ( p DC )( q CD ). (0) p DD q DD p DD ( q DD ) ( p DD )q DD ( p DD )( q DD ) t=0 By substituting in Eq. (9), one obtains v(t) = v(0)m t () π X =( )v(0) (M) t SX =( )v(0)(i M) SX, (2) here I is the 4 4 identity matrix. Similarly, the expected per-round payoff to player Y is given by π Y = ( )v(0)(i M) SY, (3) t=0 here S Y = (R,T,S,P). (4) 3 Results We search player X s strategies that impose a linear relationship beteen the to players payoffs, i.e., When α 0, e set χ = β/α and κ = γ/(α+β) to transform Eq. (5) to 3. Equalizer 3.. Expression απ X +βπ Y +γ = 0. (5) π X κ = χ(π Y κ). (6) By definition, the equalizer unilaterally sets the co-player s payoff, π Y, to a constant value irrespectively of the co-player s strategy [2, 9, 0]. To derive an expression for the equalizer strategies in the finitely repeated game, e proceed along the folloing idea: If a strategy p ensures that the payoffs of the to players are on a horizontal line in the π X -π Y space, irrespective of the co-player s strategy, then the payoffs must be on 3

4 that horizontal line if the co-player uses unconditional cooperation or unconditional defection. Substituting the co-player s unconditional cooperation and unconditional defection into the payoff formulas gives necessary conditions imposed on X s strategy. A straightforard computation then shos that these necessary conditions are in fact often sufficient; even if the co-player uses strategies that are not unconditional cooperation or defection, the to payoffs lie on the same line. We ill use the same idea in section 3.2 as ell. Because the equalizer is equivalent to α = 0 in Eq. (5) and hence not covered by Eq. (6), e start by reriting Eq. (3) as follos: here π Y =( )v(0)u eq =( )(p 0 q 0,p 0 ( q 0 ),( p 0 )q 0,( p 0 )( q 0 )) u eq u eq 2 u eq 3 u eq 4 =( )[p 0 q 0 u eq +p 0( q 0 )u eq 2 +( p 0)q 0 u eq 3 +( p 0)( q 0 )u eq 4 ], (7) u eq = u eq u eq 2 u eq 3 u eq 4 (I M) SY. (8) We denote u eq hen Y s strategy is q = (0,0,0,0) by u eq,0000. Note that u eq,0000 is independent of the probability that Y cooperates in the initial round, i.e., q 0. We denote by π Y,0000 the payoff of Y hen q = (0,0,0,0). Similarly, e denote u eq hen Y s strategy is q = (,,,) by u eq, and by π Y, the payoff of Y hen q = (,,,). The expressions of u eq,0000, π Y,0000, u eq,, and π Y, are given in Appendix A. If X applies an equalizer strategy, π Y,0000 = π Y, must hold true regardless of q 0. Therefore, e obtain [ ] ( ) p 0 q 0 u eq,0000 +p 0 ( q 0 )u eq, ( p 0 )q 0 u eq, ( p 0 )( q 0 )u eq, [ ] =( ) p 0 q 0 u eq, +p 0 ( q 0 )u eq, 2 +( p 0 )q 0 u eq, 3 +( p 0 )( q 0 )u eq, 4, (9) hich leads to [ ] q 0 p 0 (u eq,0000 u eq, ) p 0 (u eq, u eq, 2 )+( p 0 )(u eq, u eq, 3 ) ( p 0 )(u eq, u eq, 4 ) [ ] + p 0 (u eq, u eq, 2 )+( p 0 )(u eq, u eq, 4 ) = 0. (20) Equation (20) must hold true for arbitrary 0 q 0. Therefore, e obtain p 0 (u eq,0000 u eq, )+( p 0 )(u eq, u eq, 3 ) =0, (2) p 0 (u eq, u eq, 2 )+( p 0 )(u eq, u eq, 4 ) =0. (22) Combination of Eqs. (8), (2) and (22) leads to the folloing necessary conditions: p CD = p CC(T P) ( +p DD)(T R), R P (23) p DC = ( p CC)(P S)+p DD (R S), R P (24) and p CC, p DD, and p 0 are arbitrary under the constraint 0 p CC,p CD,p DC,p DD,p 0. Equations (23) and (24) extend the results previously obtained for = [9]. Surprisingly, Eqs. (23) and (24) are also sufficient for p to be an equalizer strategy. In other ords, if a strategy of player X satisfies Eqs.(23) and(24), then every co-player Y s strategy, not restricted to unconditional cooperation or unconditional defection, yields the same payoff of Y. To verify this, e substitute p = ( p CC, p CC(T P) ( +p DD)(T R), ( p CC)(P S)+p DD (R S) R P R P,p DD ) and q = (q CC,q CD,q DC,q DD ) in Eq. (8) to obtain ( p CC )P +( +p DD )R u eq = ( p CC )P +( +p DD )R ( )( p CC +p DD ) ( p CC )P +p DD R, (26) ( p CC )P +p DD R (25) 4

5 hich does not contain q. By substituting Eq. (26) in Eq. (7), e obtain π Y = ( p 0 +p 0 p CC )P +(p 0 p 0 +p DD )R p CC +p DD, (27) hich is independent of q and q 0. Therefore, the set of the equalizer strategies is given by Eq. (25), here 0 p CC,p CD,p DC,p DD, combined ith any 0 p 0. It should be noted that an equalizer does not require any condition on p 0. Hoever, Eq. (27) indicates that the payoff that an equalizer enforces on the co-player, π Y, depends on the value of p 0. Because Eq. (27) is a eighted average of P and R ith non-negative eights, an equalizer can impose any payoff value π Y such that P π Y R. If P is enforced, it holds that p 0 p 0 + p DD = 0, and hence p DD = p 0 = 0. Therefore, the equalizer is a cautious strategy (i.e., never the first to cooperate) [32]. If R is enforced, it holds that p 0 +p 0 p CC = 0, and hence p CC = p 0 =. Therefore, the equalizer is a nice strategy (i.e., never the first to detect) [32]. We remark that the equalizer is a ZD strategy for finitely repeated games as defined in Ref. [32] because it satisfies Eq. (3) of [32] ith α = Minimum discount rate In this section, e identify the condition for under hich equalizer strategies exist. Equation (25) indicates that an equalizer strategy exists if and only if ( ) 0 p CC (T P) +p DD (T R) R P (28) and 0 ( ) p CC (P S)+p DD (R S) R P (29) for some 0 p CC,p DD. Note that e used Eq. (2). Independently of, any pair of p CC and p DD satisfies the second inequality of Eq. (28) and the first inequality of Eq. (29) because they are satisfied in the most stringent case, i.e., p CC = and p DD = 0. The first inequality of Eq. (28) and the second inequality of Eq. (29) read and p DD T P T R p CC (30) p DD P S R S p CC P S R S + R P R S, (3) respectively. Equations (30) and (3) specify a p CC -p DD region in the square 0 p CC,p DD, near the corner (p CC,p DD ) = (,0) (shaded region in Fig. ). The feasible set (p CC,p DD ) monotonically enlarges as increases. Therefore, e obtain the condition under hich an equalizer exists by substituting p CC = and p DD = 0 in Eqs. (30) and (3), i.e., ( T R c max T P, P S ). (32) R S When = c, the unique equalizer strategy is given by p CC =, p DD = 0, and either p CD or p DC is equal to zero, depending on hether (T R)/(T P) is larger than (P S)/(R S) or vice versa. The condition (T R)/(T P) in Eq. (32) coincides ith that for the GRIM or tit-for-tat strategy to be stable against the unconditional defector [5]. Equation (32) is consistent ith the result for the continuous donation game [27]. Their result adapted to the caseof to discrete levels of cooperation is c = c/b, here b and c are the usual benefit and cost parameters in the donation game, respectively. We verify that Eq. (32) ith R = b c, T = b, S = c, and P = 0 yields c = c/b. 3.2 General cases All strategies but the equalizer in hich a linear relationship is imposed beteen π X and π Y are given in the form of Eq. (6). In this section, e derive expressions of X s strategy that realizes Eq. (6). 5

6 p DD 0 p CC Figure : Region in the p CC p DD space here the equalizer strategy exists (shaded region). The border line of the half plane specified by Eqs. (30) and (3) are shon by the solid and dashed lines, respectively. We set R = 3, T = 5, S = 0, P =, and = 0.8. By substituting Eqs. (2) and (3) in Eq. (6), e obtain Equation (33) yields here We set ( )v(0)(i M) S X κ = χ[ ( )v(0)(i M) S Y κ]. (33) v(0) { ( )(I M) [ SX χsy ] } +(χ )κ = 0, (34) u zd = Then, Eq. (34) is reritten as u zd u zd 2 u zd 3 u zd 4 =. (35) ( )(I M) [ SX χsy ] +(χ )κ. (36) v(0)u zd = 0, (37) hich is equivalent to [ q 0 p0 u zd p 0 u zd 2 +( p 0 )u zd 3 ( p 0 )u zd ] [ 4 + p0 u zd 2 +( p 0 )u zd ] 4 = 0. (38) Because Eq. (38) must hold true irrespectively of q 0, e require p 0 u zd +( p 0 )u zd 3 =0, (39) p 0 u zd 2 +( p 0 )u zd 4 =0. (40) Let us denote by u zd,0000 and u zd, the vector u hen q = (0,0,0,0) and q = (,,,), respectively. The expressions of u zd,0000 and u zd, are given in Appendix B. By substituting u zd,0000 and u zd, in Eqs. (39) and (40), e obtain the four necessary conditions, Eqs. (9), (92), (93), and (94), given in Appendix B. If e assume κ S +χ(t κ) 0, e can rerite Eq. (92) as p DD = ( )p 0[(χ )P +S χt]+( p CD )(χ )(κ P). (4) [κ S +χ(t κ)] 6

7 If e assume T κ+χ(κ S) 0, e can rerite Eq. (93) as p CC = ( )p 0[(χ )R+T χs]+t χs +(+p DC )(χ )κ p DC (χ )R. (42) [T κ+χ(κ S)] We ill deal ith the case κ S +χ(t κ) = 0 or T κ+χ(κ S) = 0 later in this section. By substituting Eqs. (4) and (42) in Eqs. (9), e obtain an equation containing p CD, p DC, p 0, κ, and χ as unknons. This equation can be factorized. By equating each of the to factors ith 0, e obtain to types of solutions. The one type of solution is given by ( )p 0 [(χ )R+S χt] ( p CD )(χ )R+χT S p CD (χ )κ [κ S +χ(t κ)] p CD p = ( )p 0 (χ+)(t S)+( p CD )[(χ )κ+t χs]. (43) [κ S +χ(t κ)] ( )p 0 [(χ )P +S χt]+( p CD )(χ )(κ P) [κ S +χ(t κ)] Equation (43) also satisfies Eq. (94). To verify that Eq. (43) is sufficient, e substitute Eq. (43) in Eq. (36) to obtain p 0 u zd ( )[S +(χ )κ χt] = p 0 p CD ( )p 0 p 0, (44) p 0 hich does not contain q. Using Eqs. (7) and (44), e verify Eq. (37). Therefore, Eq. (43) is a set of strategies that impose the linear relationship beteen the payoff of the to players, i.e., Eq. (6). The strategies given by Eq. (43) are ZD strategies for < as defined in Ref. [32], hich is verified as follos. Assume that α 0 in Eq. (3) of [32] because α = 0 corresponds to the equalizer. Then, let us substitute α = φ, β = φχ, and γ = φ(χ )κ in Eq. (3) of [32] ithout loss of generality. Note that this transformation is a bijection because (i) φ > 0 and (ii) either χ > or χ < 0 is required (in the notation of Ref. [32], φ > 0 and χ < because their χ is defined as the reciprocal of our χ). Then, e obtain φ(χ )(R κ) ( )p 0 +φ[(χ )κ χt +S] ( )p 0 p =, (45) φ[(χ )κ+t χs] ( )p 0 φ(χ )(κ P) ( )p 0 hich is equivalent to Eq. (33) of [32]. Equation (45) combined ith φ = p CD p 0 ( ) κ S +χ(t κ) (46) is equivalent to Eq. (43). It should also be noted that Eq. (45) extends Eq. (9) of [6], hich has been obtained for =, to general, R, and P values. The other type of solution that e obtain by substituting Eqs. (4) and (42) in Eq. (9) is given by p 0 [T R+χ(R S)] = T κ+χ(κ S). (47) Substitution of Eqs. (4) and (42) in Eq. (94) yields either Eq. (43) or The combination of Eqs. (47) and (48) is equivalent to that of p 0 [P S +χ(t P)] = (χ )(κ P). (48) κ = p 2 0R+p 0 ( p 0 )(T +S)+( p 0 ) 2 P (49) 7

8 and χ = ( p 0)(T P)+p 0 (R S) ( p 0 )(P S)+p 0 (T R). (50) Hoever, Eqs. (4), (42), (49), and (50) do not provide a sufficient condition for Eq. (37) to hold true for arbitrary q and q 0. Therefore, e additionally consider the vector u zd hen q = (,0,0,0) and q = (0,0,0,), hich e denote by u zd,000 and u zd,000, respectively. The calculations shon in Appendix C lead to p 0 = p CC = p CD = p DC = p DD (0 p 0 ). (5) To verify that the unconditional strategies given by Eq. (5) are a sufficient condition for Eq. (6) to hold true for arbitrary q and q 0, e substitute Eqs. (49), (50), and (5) in Eq. (36) to obtain ( p 0 )[ ( p 0 )P +(+p 0 )R p 0 (T +S)] u zd ( )(T S) = ( p 0 )[ (2 p 0 )P +T +S +p 0 (R S T)] ( p 0 )P +S +p 0 (R S T) p 0 [ ( p 0 )P +(+p 0 )R p 0 (T +S)], (52) p 0 [ (2 p 0 )P +T +S +p 0 (R S T)] hich does not contain q. Using Eqs. (7) and (52), e verify Eq. (37). The unconditional strategy given by Eq. (5) is not a ZD strategy in the sense of [32] unless R + P = T + S (Appendix D), hich is the same condition as that for the infinitely repeated game [5]. The obtained solution, i.e., Eq. (5) combined ith Eqs.(49) and (50), is equivalent to the previously derived solution for = [5]. This set of solutions contains the unconditional cooperator and unconditional defector as special cases, and alays realizes χ < 0 (Eq. (50)). When κ S +χ(t κ) = 0 or T κ+χ(κ S) = 0, the calculations shon in Appendices E and F reveal the folloing three types of solutions: (i) a subset of the ZD strategies given by Eq. (43) (Appendix F.2), (ii) a subset of the strategies given by Eq. (5) (Appendices E., E.2, and F.2), and (iii) the set of strategies given by p = ( p CC,, p CC (χ+)(κ T) [R (χ+)t +χκ] (κ R), (κ R) ) p CC (κ P) (R P) (κ R) (κ R) (53) here 0 p CC and κ R (Appendix E.2). Although Eq. (53) is a sufficient condition and the resulting solutions are distinct from those given by Eq. (43), in fact Eq. (53) yields χ < 0 (Appendix E.2). To summarize, the set of X s strategies that enforce Eq. (6) is the union of the strategies given by the ZD strategies, Eq. (43), and the non-zd unconditional strategies, Eq. (5). In the next sections, e examine to special cases, hich have been studied in the literature, and derive c in each case. 3.3 Extortioner 3.3. Expression The extortioner is defined as a strategy that enforces an extortionate share of payoffs larger than P [9]. We obtain the extortioner by setting κ = P in Eq. (6). By setting κ = P in Eq. (43), e obtain p = ( )p 0 [(χ )R+S χt] ( p CD )(χ )R+χT S p CD (χ )P [P S +χ(t P)] p CD ( )p 0 (χ+)(t S)+( p CD )[(χ )P +T χs] [P S +χ(t P)] ( )p 0. (54) Because p DD = ( )p 0 / 0 and <, e obtain p 0 = 0 and p DD = 0, hich is consistent ith the previously obtained result [32]. Therefore, the extortioner is never the first to cooperate and hence a so-called,p 0 =, 8

9 cautious strategy [32]. By setting p 0 = 0 in Eq. (54), e obtain p = Minimum discount rate p CD (χ )P ( p CD )(χ )R S +χt [P S +χ(t P)] p CD ( p CD )[(χ )P +T χs] [P S +χ(t P)] 0. (55) By setting κ = P and p 0 = 0 in Eq. (45), e obtain φ(χ )(R P) +φ[(χ )P χt +S] p =. (56) φ[(χ )P +T χs] 0 Because p CC and <, Eq. (56) implies that φ(χ ) > 0 must hold true. We consider the case φ > 0 and χ > in this section. We can exclude the case φ < 0 and χ < because a strategy ith χ < 0 is not considered as an extortionate strategy [9,4 6,22,24,27,28,32,35] and χ < implies χ < 0 (Appendix G.). When φ > 0, the application of 0 p CC,p CD,p DC to Eq. (56) yields (χ ) R P P S +χ T P P S φ (χ )R P P S, (57) φ +χt P P S, (58) χ+ T P P S φ. (59) The condition under hich a positive φ value that satisfies Eqs. (57), (58), and (59) exists is given by (χ ) R P P S +χ T P P S Equation (60) is alays satisfied. Equations (6), (62), and (63) yield +χt P P S, (60) (χ )R P P S, (6) χ+ T P (χ )R P P S P S, (62) χ+ T P +χt P P S P S. (63) χ[(t P) (T R)] R S (P S), (64) χ[(t S) (P S)] T P (T S), (65) χ[(r S) (P S)] T P (T R), (66) respectively. The left-hand side of Eq. (65) is alays larger than that of Eq. (66), and the right-hand side of Eq. (65) is alays smaller than that of Eq. (66). Therefore, Eq. (65) is satisfied if Eq. (66) is satisfied. The right-hand sides of Eqs. (64) and (66) are positive. Therefore, (T P) (T R) > 0 and (T S) (P S) > 0 are required for χ to be positive. On the other hand, if (T P) (T R) > 0 and (T S) (P S) > 0, Eqs. (64) and (66) guarantee that χ > and that a χ(> ) value exists. Therefore, an extortioner ith χ > 9

10 exists if and only if > c, here the c value coincides ith that for the equalizer; it is given by Eq. (32). Under > c, Eqs. (64) and (66) imply ( ) R S (P S) χ χ c () max (T P) (T R), T P (T R). (67) (R S) (P S) Equation (67) gives the range of χ values for hich the extortioner strategy exists. The conditions for the existence of an extortionate strategy are easier to satisfy for large in the sense that χ c () monotonically decreases as increases. In particular, e obtain lim c+0χ c () = and lim χ c () =. For a given χ value, the substitution of R = b c, T = b, S = c, and P = 0 in Eqs. (32) yields hich is consistent ith Eq. (7) of [27]. 3.4 Generous strategy 3.4. Expression c = χc+b χb+c, (68) The generous strategy, also called compliers, is defined as a strategy that yields a larger shortfall from the mutual cooperation payoff R for the player as compared to that for the co-player [,5,35]. We obtain the generous strategy by setting κ = R in Eq. (6). By setting κ = R in Eq. (43), e obtain p 0 ( ) p CD p = ( )p 0 (χ+)(t S)+( p CD )[(χ )R+T χs]. (69) [R S +χ(t R)] ( )p 0 [(χ )P +S χt]+( p CD )(χ )(R P) [R S +χ(t R)] Because p CC = [ ( )p 0 ]/, e obtain p 0 = and p CC =, hich is consistent ith the previously obtained result [32]. Therefore, the generous strategy is never the first to detect and hence a so-called nice strategy [5,32]. By setting p 0 = in Eq. (69), e obtain p CD p = ( )(χ+)(t S)+( p CD )[(χ )R+T χs] [R S +χ(t R)] ( )[(χ )P +S χt]+( p CD )(χ )(R P) [R S +χ(t R)] p CD = +. (70) ( pcd)[(χ )R+T χs] R S+χ(T R) + ( pcd)(χ )(R P) R S+χ(T R) Minimum discount rate By applying 0 p DC,p DD to Eq. (70), e obtain ( p CD)g, (7) ( p CD)g 2, (72) 0

11 g 2 g 2 = _ g - - p CD=0 g 2 =(-)g 0 pcd= _ - _ g Figure 2: Region in the g g 2 space here the generous strategy exists (shaded region). If (g,g 2 ) is located in this region (e.g., filled circle labeled p CD = 0), the square given by / g,g 2 / intersects the line segment connecting the assumed (g,g 2 ) and the origin. Note that any point on the line segment is realized by the solution by a value of p CD (Eqs. (7) and (72)). here (χ )R+T χs g R S +χ(t R), (73) g 2 (χ )(R P) R S +χ(t R). (74) The necessary and sufficient condition for 0 p CD that satisfies Eqs. (7) and (72) to exist is given by (Fig. 2) g, (75) g 2, (76) g 2 g. (77) In the remainder of this section, e assume χ 0, hich a generous strategy requires [5,6,27,28,32,35], and examine the conditions given by Eqs. (75), (76), and (77). For mathematical interests, the analysis of the minimum discount rate for χ < 0 is presented in Appendix G.2. First, because dg /dχ > 0, hich one can derive using Eq. (3), and g is continuous for χ 0, Eq. (75) is equivalent to χ R S (T S) (T R)+(T S) (78) and > T R T S. (79)

12 When (T R)/(T S), a positive χ value that satisfies Eq. (75) does not exist. Second, because dg 2 /dχ > 0 and g 2 is continuous for χ 0, Eq. (76) is equivalent to χ R S (P S) (T R)+(T P) (80) and > T R T P. (8) When (T R)/(T P), a positive χ value that satisfies Eq. (76) does not exist. Third, because d(g 2 /g )/dχ > 0 and g 2 /g is continuous for χ 0, Eq. (77) is equivalent to χ T P (T R) (P S)+(R S) (82) and > P S R S. (83) When (P S)/(R S), a positive χ value that satisfies Eq. (77) does not exist. By combining Eqs. (79), (8), and (83), e find that a generous strategy exists if and only if > c, here c is given by Eq. (32). Therefore, the threshold value above hich a ZD strategy exists is the same for the equalizer, extortioner, and generous strategy. It should be noted that = c is alloed for the equalizer, but not for the extortioner and the generous strategy. When > c, Eq. (80) implies Eq. (78), and hence one obtains ( ) R S (P S) χ χ c () max (T R)+(T P), T P (T R). (84) (P S)+(R S) Note that χ c () > and χ c () decreases as (> c ) increases. Equation (84) implies that lim c+0χ c () = and lim χ c () =, hich are the same asymptotic as the case of the extortioner. 4 Conclusions We analyzed ZD strategies in finitely repeated prisoner s dilemma games ith general payoff matrices. Apart from the derivation of convenient expressions for ZD strategies, the novel results derived in the present article are to-fold. First, e derived the threshold discount factor value, c, above hich the ZD strategies exist for three commonly studied classes of ZD strategies, i.e., equalizer, extortioner, and generous strategies. They all share the same threshold value. Similar to the case of the condition for mutual cooperation in direct reciprocity, ZD strategies can exist only hen there are sufficiently many rounds. Second, e shoed that the memoryone strategies that impose a linear relationship beteen the payoff of the to players are either ZD strategies (Eqs. (43) and (53)) or an unconditional strategy (Eq. (5)). The latter class includes the unconditional cooperator and unconditional defector as special cases. Therefore, for finitely repeated prisoner s dilemma games (i.e., < ), e ansered affirmatively to the conjecture posed in [5]. With a continuity argument, our results also cover the infinite case, by the consideration of the limit. In other ords, if the to payoffs are in a linear relationship for any = ǫ, here ǫ, then the payoffs are also on a line as ǫ goes to 0. For a similar argument, see Eqs. (5) and (6) in Ref. [32]. The present results also hold true hen the co-player employs a longer-memory strategy, because it is straightforard to apply the proof for the infinite case [9] to the finite case. Our analytical approach is different from the previous approaches. Press and Dyson s derivation is based on the linear algebra of matrices [9]. The proof in Ref. [4] considers certain telescoping sums. The approach considered in the present study is more elementary than theirs, i.e., to derive necessary conditions and sho that they are sufficient by straightforard calculations. We mention possible directions of future research. First, e conjecture that the c value is the same for all ZD strategies because it takes the same value for the three common ZD strategies. Second, the explicit forms of our solutions (Eqs. (25) and (43)) may be useful for exploring features of ZD strategies in finitely repeated games. For example, investigation of evolutionary dynamics and extensions to multiplayer games, hich have been examined for infinitely repeated games (see section for references), in the case of finitely repeated games may benefit from the present results. 2

13 Appendix A Expression of u eq,0000, π Y,0000, u eq,, and π Y, By substituting q = (0,0,0,0) in Eq. (0) and then substituting the obtained M in Eq. (8), e obtain u eq,0000 = ( )( p CD +p DD ) ( )( p CD +p DD )R+( p CC +p CC p CD )P +(p CC p CC +p DD )T ( p CD )P +( +p DD )T, ( )( p CD +p DD )S +( p DC p CD +p DC )P +(p DC p DC +p DD )T ( p CD )P +p DD T (85) hich leads to π Y,0000 = ( )v(0)u eq,0000. (86) Similarly, by substituting q = (,,,) in Eq. (0) and then substituting the obtained M in Eq. (8), e obtain u eq, = ( )( p CC +p DC ) ( p CC )S +( +p DC )R ( )( p CC +p DC )T +( p CD p CC +p CD )S +(p CD p CD +p DC )R, ( p CC )S +p DC R ( )( p CC +p DC )P +( p DD p CC +p DD )S +(p DD +p DC p DD )R (87) hich leads to π Y, = ( )v(0)u eq,. (88) Appendix B Expression of u zd,0000 and u zd,, and four necessary conditions in section 3.2 By substituting q = (0,0,0,0) in Eq. (0) and then substituting the obtained M in Eq. (36), e obtain ( p CC +p CC p CD )(χ )P +(p CC p CC +p DD )(S χt) +(χ )κ ( )(χ )R p CD +p DD ( p CD )(χ )P +( +p DD )(S χt) +(χ )κ p CD +p DD u zd,0000 =. ( p DC p CD +p DC )(χ )P +(p DC p DC +p DD )(S χt) +(χ )κ+( )(T χs) p CD +p DD ( p CD )(χ )P +p DD (S χt) +(χ )κ p CD +p DD (89) 3

14 By substituting q = (,,,) in Eq. (0) and then substituting the obtained M in Eq. (36), e obtain ( p CC )(T χs) ( +p DC )(χ )R +(χ )κ p CC +p DC ( p CD p CC +p CD )(T χs) (p CD p CD +p DC )(χ )R +(χ )κ+( )(S χt) p CC +p DC u zd, =. ( p CC )(T χs) p DC (χ )R +(χ )κ p CC +p DC ( p DD p CC +p DD )(T χs) (p DD +p DC p DD )(χ )R +(χ )κ ( )(χ )P p CC +p DC (90) Note that the denominator on the right-hand side of Eqs. (89) and (90) is positive. By substituting Eq. (89) in Eq. (39), e obtain ( )p 0 {( p CD +p DD )[ (χ )R T +χs]+(p CC p DC )[(χ )P +S χt]} +( p CD +p DD )[(χ )κ+( )(T χs)]+[ ( p DC p CD +p DC )(χ )P By substituting Eq. (89) in Eq. (40), e obtain +(p DC p DC +p DD )(S χt)] = 0. (9) ( )p 0 [(χ )P +S χt] ( p CD )(χ )P +p DD (S χt) By substituting Eq. (90) in Eq. (39), e obtain +( p CD +p DD )(χ )κ = 0. (92) ( )p 0 [ (χ )R T +χs] +( p CC )(T χs) p DC (χ )R+( p CC +p DC )(χ )κ = 0. (93) By substituting Eq. (90) in Eq. (40), e obtain ( )p 0 {( p CC +p DC )[(χ )P +S χt]+(p CD p DD )[ (χ )R T +χs]} +( p CC +p DC )(χ )[κ ( )P]+[( p DD p CC +p DD )(T χs) Appendix C Derivation of Eq. (5) (p DD +p DC p DD )(χ )R] = 0. (94) In this section, e derive Eq. (5) from Eqs. (49) and (50). We obtain ( p CC )( p CD +p DD ) {{ ( )( p CD +p DD )R 2 ( p CC )[ ( )p DC p CD ]P } (χ ) +( p CC ){( )( p CD +p DD )(T χs)+[( )p DC +p DD ](S χt)}}+(χ )κ ( p u zd,000 CD )(χ )P +( +p DD )(S χt) = +(χ )κ p CD +p DD. ( p DC p CD +p DC )(χ )P +(p DC p DC +p DD )(S χt) +(χ )κ+( )(T χs) p CD +p DD ( p CD )(χ )P +p DD (S χt) +(χ )κ p CD +p DD (95) 4

15 Note that the denominator on the right-hand side of Eq. (95) is positive. By substituting Eq. (95) in Eq. (40), e obtain Eq. (92). By substituting Eq. (95) in Eq. (39), e obtain p 0 ( ){{ ( p CD +p DD )R+[ ( )p DC p CD ]P}(χ ) ( )( p CD +p DD )(T χs) [( )p DC +p DD ](S χt)} +( p CC ){ [ ( )p DC p CD ](χ )P +[( )p DC +p DD ](S χt)} +( p CC )( p CD +p DD )(χ )κ+( p CC )( p CD +p DD )( )(T χs) = 0. (96) Substitution of Eqs. (4) and (42) in Eq. (96) yields either the third entry of Eq. (43) or (p 0 p DC )(κ R)( )(χ )[(χ )P +S χt] [T κ+χ(κ S)][κ S +χ(t κ)] = 0. (97) The case in hich the denominator on the right-hand side of Eq. (97) is equal to 0 is covered in Appendices E and F. We note that χ because χ = substituted in Eq. (50) yields T = S, hich contradicts Eq. (2). By combining this observation ith 0 < <, e obtain (p 0 p DC )(κ R)[(χ )P +S χt] = 0. (98) By substituting Eqs. (49) and (50) in Eq. (98), e obtain the folloing four possible cases: p 0 = p DC, p 0 =, p 0 = (R P)/(T +S R P), and p 0 = (T +S 2P)/(T +S R P). First, assume that p 0 = p DC. By substituting p 0 = p DC and Eq. (47) in Eq. (93), e obtain (p CC p DC )[T κ+χ(κ S)] = 0. Because e have excluded the case T κ+χ(κ S) = 0, hich e deal ith in Appendix E, e obtain p CC = p DC. Therefore, e obtain p 0 = p CC = p DC. (99) Second, assume that p 0 =. Substitution of p 0 = in Eq. (49) yields κ = R. Substitution of p 0 = and κ = R in Eq. (42) yields p CC =. Substitution of p 0 = in Eq. (50) yields χ = (R S)/(T R). Substitution of p 0 =, χ = (R S)/(T R), and κ = R in Eq. (92) yields ( p CD )(T S)(R P) = 0, hich implies p CD =. Therefore, p 0 = combined ith Eqs. (49) and (50) results in p 0 = p CC = p CD =. (00) Third, e note that R P p 0 (0) T +S R P because combination of p 0 = (R P)/(T + S R P) and 0 p 0 leads to T + S R P > 0 and 2R T +S, and the latter inequality contradicts Eq. (3). Fourth, assumethat p 0 = (T+S 2P)/(T+S R P). By substituting p 0 = (T+S 2P)/(T+S R P)in Eqs. (49)and (50), e obtainχ = (P S)/(T P) and κ = P, respectively. Then, e obtainκ S+χ(T κ) = 0, hich e have decided to deal ith later. To summarize, Eq. (98) leads to either Eq. (99) or (00). We obtain u zd,000 =(χ )κ + (+)( p CD )+ 2 [p DC ( p DD )+p CC p DD )] {[ +pcd + 2 ( p DC )( p DD ) 3 (p CD p DC )( p DD ) ] R +[ +( )p CC +p CD ]P}(χ )+{( p DD )[( p CD ) ( )p CC ](T χs) +[p CC 2 ( p DD )(p CC p DC )](S χt) } ( p CD )[ (P +p DD R)(χ )+( p DD )(T χs)] +[ 2 ( p DC p CC p DD +p DC p DD )](S χt). [ +p CD +( )p DC ](P +p DD R)(χ ) + { 2 p DD [ ( )p CC ] p CD ( 2 p DD ) } (T χs)+[p DC + 2 (p CC p DC )p DD ](S χt) [( p CD )P +p DD ( p CD )R](χ )+{( p DD )( p CD )(T χs) +(p DC +p CC p DD p DC p DD )(S χt)} (02) 5

16 Note that the denominator on the right-hand side of Eq. (02) is positive. By substituting Eq. (02) in Eq. (40), e obtain ( )p 0 {(P +p DD R)(χ ) ( p DD )(T χs)+(+)(s χt)} [( p CD )P +p DD ( p CD )R](χ )+{( p DD )( p CD )(T χs)+[p DC +p DD (p CC p DC )](S χt)} + { +( p CD ) 2 [p CD p DC p DD (p CC p DC )] } (χ )κ = 0. (03) Substitution of Eqs. (4) and (42) in Eq. (03) yields either the third entry of Eq. (43) or [T κ+χ(κ S)][κ S +χ(t κ)] { (χ ) 2 κ 2 [ ( )p 0 p CD ](χ )[T R+χ(R S)]P +{(T χs)+( )p 0 [T R+χ(R S)]}(S χt) { ( p CD )(χ )R [+( p CD χ)]t +[χ ( χ+p CD χ)]s}(χ )κ} = 0. (04) We examine the case in hich the denominator on the right-hand side of Eq. (04) is zero in Appendices E and F. Therefore, e ignore the denominator and substitute Eqs. (49) and (50) in Eq. (04) to obtain p 0 = p CD, p 0 = 0, p 0 = (R P)/(T +S R P), or p 0 = (T +S 2P)/(T +S R P). Among these four possible options, e have excluded p 0 = (R P)/(T +S R P) and p 0 = (T +S 2P)/(T +S R P) in the course of the analysis of u zd,000. First, assume that p 0 = p CD. By substituting p 0 = p CD and Eq. (48) in Eq. (92), e obtain (p CD p DD )[κ S +χ(t κ)] = 0. Because e have excluded the case κ S +χ(t κ) = 0, hich e deal ith in Appendix E, e obtain p DD = p CD. Therefore, e obtain p 0 = p CD = p DD. (05) Second, assume that p 0 = 0. Substitution of p 0 = 0 in Eq. (49) yields κ = P. Substitution of p 0 = 0 and κ = P in Eq. (4) yields p DD = 0. Substitution of p 0 = 0 in Eq. (50) yields χ = (T P)/(P S). Substitution of p 0 = 0, χ = (T P)/(P S), and κ = P in Eq. (93) yields p DC (R P) = 0, hich implies p DC = 0. Therefore, p 0 = 0 combined ith Eqs. (49) and (50) results in p 0 = p DC = p DD = 0. (06) A solution must simultaneously satisfy either Eq. (99) or (00), and either Eq. (05) or (06). The combination of Eqs. (99) and (05) provides the set of unconditional strategies, i.e., Eq. (5). The combination of Eqs. (99) and (06) provides a subset of the strategies given by Eq. (5). The combination of Eqs. (00) and (05) also provides a subset of the strategies given by Eq. (5). Equations (00) and (06) are inconsistent ith each other. Therefore, the set of solutions is given by Eq. (5). Appendix D An unconditional strategy is not a ZD strategy unless R+P = T +S In this section, e sho that the unconditional strategy given by Eq. (5) is not a ZD strategy in the sense of [32] if R+P T +S. By substituting p DC = p DD in Eq. (45), e obtain hich leads to φ[(χ )κ+t χs] ( )p 0 φ[(χ )κ+t χs] = φ(χ )(κ P). = φ(χ )(κ P) ( )p 0, (07) If φ = 0, e substitute φ = 0 in the expression of p DD in Eq. (45) to obtain p DD = ( )p 0 /. This equation holds true if and only if p 0 = p DD = 0. Next, e substitute φ = 0 in the expression of p CC in Eq. (45) to obtain p CC = [ ( )p 0 ]/. This equation holds true if and only if p 0 = p CC =, hich contradicts p 0 = 0. Therefore, e obtain φ 0. Given φ 0, Eq. (07) implies χ = T P P S. (08) 6

17 By setting p CC = p CD in Eq. (45) and using φ 0, e obtain By combining Eqs. (08) and (09), e obtain χ = R S T R. (09) R+P = T +S. (0) Equation (0) is a sufficient condition for the unconditional strategy to be a ZD because substitution of Eqs. (49), (50), (0) and T R φ = () (T S)(R P) in Eq. (45) yields Eq. (5). Appendix E Case κ S +χ(t κ) = 0 In this section, e assume and derive the set of strategies that satisfy Eq. (6). By substituting Eq. (2) in Eq. (92), e obtain κ S +χ(t κ) = 0 (2) (χ )(κ P)[( )p 0 +p CD ] = 0. (3) Equation (2) does not allo χ = because substitution of χ = in Eq. (2) yields T = S, hich contradicts Eq. (2). Substitution of κ = P in Eq. (2) yields χ = (P S)/(T P). Alternatively, if e set ( )p 0 +p CD = 0, e obtain p 0 = p CD =. Therefore, e consider the folloing to subcases, i.e., subcase (A) specified by κ = P (4) and and subcase (B) specified by and E. Subcase (A): κ = P and χ = (P S)/(T P) By substituting Eqs. (4) and (5) in Eq. (9), e obtain χ = P S T P, (5) κ S +χ(t κ) = 0 (6) p 0 = p CD =. (7) ( )[ (p CD p DD )][ p 0 (T +S R P)+T +S 2P](T S) T P = 0. (8) Because T > P > S, 0 < <, and there exists no pair of p CD and p DD (0 p CD,p DD ) that satisfies p CD p DD = /, e obtain p 0 (T +S R P) = T +S 2P. (9) If e set T + S R P = 0, e obtain T + S 2P = R P > 0, hich contradicts Eq. (9). Therefore, Eq. (9) leads to T +S R P 0, and hence p 0 = T +S 2P T +S R P. (20) If T + S R P > 0, the condition p 0 applied to Eq. (20) yields R P, hich contradicts Eq. (2). Therefore, e obtain T +S R P < 0 and hence T +S 2P 0. By substituting Eqs. (4) and (5) in Eq. (96), e obtain ( )[ (p CD p DD )]{p 0 [R ( )(T +S)]+( p CC )(T +S) [2 ( 2)p 0 2p CC ]P}(T S) = 0. T P (2) 7

18 Because (p CD p DD ) > 0, Eq. (2) implies p 0 [R ( )(T +S)]+( p CC )(T +S) [2 ( 2)p 0 2p CC ]P = 0. (22) Substitution of Eq. (20) in Eq. (22) yields [ p CC (T +S R P)+T +S 2P](T +S 2P) T +S R P = 0. (23) We ill deal ith the case T +S 2P = 0 later in this section. Therefore, by assuming T +S 2P < 0, e obtain T +S 2P p CC = T +S R P. (24) By substituting Eqs. (4) and (5) in Eq. (93), e obtain {( )p 0 (R S T)+p DC R p CC (T +S) [2 ( )p 0 2p CC +p DC ]P +T +S}(T S) = 0. T P (25) By substituting p 0 = p CC = (T +S 2P)/(T +S R P) in Eq. (25), e obtain hich leads to [ p DC (T +S R P)+T +S 2P](P R)(T S) (T P)(T +S R P) p DC = By substituting Eqs. (4) and (5) in Eq. (03), e obtain = 0, (26) T +S 2P T +S R P. (27) [ p CD ( )p 0 ][ p DD (T +S R P)+T +S 2P](T S) T P = 0. (28) If p CD ( )p 0 = 0, e obtain p 0 = p CD =, hich contradicts Eq. (20). Therefore, Eq. (28) implies p DD = T +S 2P T +S R P. (29) To derive another condition, e use the vector u hen player Y adopts the tit-for-tat strategy, i.e., q = (,0,,0). This vector, denoted by u zd,00, is given by u zd,00 =(χ )κ + ( p CC )( 2 p DC )+ 2 p CD p DC ( )+(+)p DD ( p CC )+ 3 p CD p DD { [ ( pdd ) 2 p DC ( p CD )+ 3 ( p CD )(p DC p DD )]R 2 ( p CC )( p DC )P }(χ )+( p CC )[ ( p DD )](T χs) + 2 ( p CC )[p DC (p DC p DD )](S χt) { 2 ( p DC )[ ( )p CD p CC ]P p CD [ ( p DD )]R } (χ ) +[ ( )p CD p CC ][ ( p DD )](T χs)+( p CC )[ ( p DD )](S χt). { ( p DC )( p CC )P p CD [( )p DC +p DD ]R}(χ ) +( p CC )[ ( p DD )](T χs)+[( )p DC +p DD ]( p CC )(S χt) { { 2 p DC [ p CD ( )] p CC ( 2 p DC )}P 2 p CD p DD R } (χ ) + 2 p DD [ p CD ( ) p CC ](T χs)+p DD ( p CC )(S χt) (30) 8

19 Note that the denominator on the right-hand side of Eq. (30) is positive. By substituting Eq. (30) in Eq. (40), e obtain ( )p 0 {{ pcd R+[+( p CC ) 2 (p CC p CD )]P } (χ )+[ ( )p CD p CC ](T χs) +( p CC )(S χt)}+ { { + 2 p DC [ ( )p CD ]+p CC ( 2 p DC )}P 2 p CD p DD R } (χ ) + 2 p DD [ ( )p CD p CC ](T χs)+p DD ( p CC )(S χt) +{ 2 p DC +( ) 2 p CD p DC +p DD (++ 2 p CD ) p CC [ 2 p DC +(+)p DD ]}(χ )κ = 0. (3) By substituting κ = P and χ = (P S)/(T P) in Eq. (3), e obtain [( )p 0 +p DD ]{p CD [R ( )(T +S)]+( p CC )(T +S) [2 p CD 2(p CC p CD )]P}(T S) = 0. T P (32) By substituting p 0 = p CC = p DD = (T +S 2P)/(T +S R P) in Eq. (32), e obtain [ p CD (T +S R P)+T +S 2P][ (T +S 2P)+T +S R P](T +S 2P) (T +S R P) 2 = 0. (33) If (T +S 2P)+T +S R P = 0, Eq. (20) implies that = /p 0, i.e., = p 0 =, hich contradicts 0 < <. Because e decided to treat the case T +S 2P = 0 later, Eq. (33), implies p CD = T +S 2P T +S R P. (34) In sum, e obtain p 0 = p CC = p CD = p DC = p DD = (T + S 2P)/(T + S R P) if T + S 2P < 0. Substitution ofp 0 ineqs.(49)and(50) yieldsχ = (P S)/(T P)and κ = P, respectively, coincidingith the condition forsubcase(a). Therefore,the strategyp 0 = p CC = p CD = p DC = p DD = (T+S 2P)/(T+S R P), here T +S 2P < 0, is a special case of Eq. (5). Finally, let us consider the case T + S 2P = 0. By combining this condition ith Eq. (20), e obtain p 0 = 0. By substituting T +S 2P = 0 and p 0 = 0 in Eq. (25), e obtain (R P)p DC = 0, hich implies that p DC = 0. By substituting T +S 2P = 0 and p 0 = 0 in Eq. (28), e obtain ( p CD )(R P)p DD = 0, hich implies that p DD = 0. Because p 0 = p DC = p DD = 0, the focal player X never uses p CC and p CD. Therefore, p 0 = p DC = p DD = 0 specifies a strategy. By substituting p 0 = 0 in Eqs. (49) and (50) and using T+S 2P = 0, e obtain χ = (T P)/(P S) = (P S)/(T P) = and κ = P, respectively, coinciding ith the condition for subcase (A). Therefore, the strategy p 0 = p DC = p DD = 0 is a special case of Eq. (5). E.2 Subcase (B): κ S +χ(t κ) = 0 and p 0 = p CD = By substituting Eqs. (6) and (7) in Eq. (9), e obtain ( )(χ )[p DD (κ R) p CC (κ P)+(R P)+κ R] = 0. (35) Note that 0 < <. Because χ = is inconsistent ith κ S +χ(t κ) = 0, Eq. (35) yields p DD = p CC(κ P) (R P) (κ R) (κ R) (36) provided that κ R. We ill deal ith the case κ = R later in this section. By substituting Eqs. (6) and (7) in Eq. (93), e obtain hich yields (χ ){p DC (κ R) p CC (χ+)(κ T)+[R (χ+)t +χκ]+κ R} = 0, (37) p DC = p CC(χ+)(κ T) [R (χ+)t +χκ] (κ R) (κ R) provided that κ R. Therefore, e obtain ( p CC (χ+)(κ T) [R (χ+)t +χκ] (κ R) p = p CC,,, (κ R) (38) ) p CC (κ P) (R P) (κ R),p 0 =, (κ R) (39) 9

20 i.e., Eq. (53), as a necessary condition for the linear relationship beteen the payoff of the to players, i.e., Eq. (6). To verify that Eq. (53) is sufficient, e substitute Eq. (53) (i.e., Eq. (39)) in Eq. (36) to obtain ( u zd = 0, 0, ( )(χ )(κ R), ( )(χ )(κ R) ), (40) ( p CC ) ( p CC ) hich is independent of q. By combining Eqs. (7), (40), and p 0 =, e obtain v(0)u zd = 0, i.e., Eq. (37). Therefore, Eq. (53) is a solution that satisfies Eq. (6). ThestrategygivenbyEq.(53)isexpressedintheformofEq.(45)ifesetφ = ( p CC )/[(κ R)(χ )] (and use κ S + χ(t κ) = 0 and p 0 = ). As an example, e consider the repeated PD game defined by R = 3, T = 5, S = 2, P =, and = 0.8. We set κ = 2. Because this solution requires κ S+χ(T κ) = 0 (Eq. (6)), e obtain χ = 4/3. If e set p CC = 0, e obtain p = (0,, 3/4, 3/4) and p 0 =. This solution cannot be represented in the form of Eq. (43) because Eq. (43) requires κ S +χ(t κ) 0. Consistent ith this example, Eq. (45) combined ith φ = ( p CC )/[(κ R)(χ )], κ S +χ(t κ) = 0, and p 0 = yields χ < 0. This can be shon as follos. By substituting κ S +χ(t κ) = 0 and p 0 = in Eq. (45), e obtain Because p CC must hold true in Eq. (4), e obtain Because p DD 0 must hold true in Eq. (4), e obtain φ(χ )(R κ) p = + φ[(χ )κ+t χs]. (4) + φ(χ )(κ P) φ(χ )(R κ) 0. (42) φ(χ )(κ P) 0. (43) Given φ(χ ) 0 (section 3.2) and R > P, e find that P κ R must hold true for Eqs. (42) and (43) to be simultaneously satisfied. Therefore, using κ S +χ(t κ) = 0 e obtain χ = (κ S)/(T κ) < 0. Finally, let us consider the case κ = R. By substituting κ = R in Eq. (35), e obtain p CC (R P) = (R P), hich implies that p CC =. By combining this result ith Eq. (7), e obtain p 0 = p CC = p CD =, hich implies that player X never uses p DC and p DD. Therefore, p 0 = p CC = p CD = specifies a strategy. By substituting p 0 = in Eqs. (49) and (50), e obtain χ = (R S)/(T R) and κ = R, respectively, and the former equality coincides ith Eq. (7) hen κ = R. Therefore, the strategy p 0 = p CC = p CD = is a special case of Eq. (5). Appendix F Case T κ+χ(κ S) = 0 In this section, e assume and derive the set of strategies that satisfy Eq. (6). By substituting Eq. (44) in Eq. (93), e obtain T κ+χ(κ S) = 0 (44) (χ )(κ R)[( )p 0 +p DC ] = 0. (45) Equation (44) does not allo χ = because substitution of χ = in Eq. (44) yields T = S, hich contradicts Eq. (2). Substitution of κ = R in Eq. (44) yields χ = (T R)/(R S). Alternatively, if e set ( )p 0 + p DC = 0, e obtain p 0 = p DC = 0. Therefore, e consider the folloing to subcases, i.e., subcase (C) specified by κ = R (46) and χ = T R R S, (47) 20

21 and subcase (D) specified by and T κ+χ(κ S) = 0 (48) p 0 = p DC = 0. (49) F. Subcase (C): κ = R and χ = (T R)/(R S) By substituting Eqs. (46) and (47) in Eq. (94), e obtain ( )[ (p CC p DC )][ p 0 (T +S R P)+R P](T S) R S = 0. (50) Equation (50) does not hold true because 0 < <, (R P) p 0 (T +S R P) 0 due to Eq. (0), and (p CC p DC ) > 0. Therefore there is no solution in this case. F.2 Subcase (D): T κ+χ(κ S) = 0 and p 0 = p DC = 0 By substituting Eqs. (48) and (49) in Eq. (9), e obtain (χ )[p DD (κ S)(χ+)+( p CD )(κ P)] = 0. (5) We obtain χ because χ = substituted in Eq. (48) yields T = S, hich contradicts Eq. (2). Therefore, Eq. (5) implies p CD = p DD(χ+)(κ S)+κ P (52) (κ P) provided that κ P. We ill deal ith the case κ = P later in this section. By substituting Eqs. (48) and (49) in Eq. (94), e obtain Because 0 < < and χ, e obtain (χ )( )[p DD (κ R)+( p CC )(κ P)] = 0. (53) p CC = p DD(κ R)+κ P (κ P) (54) provided that κ P. Therefore, e obtain ( pdd (κ R)+κ P p =, (κ P) ) p DD (χ+)(κ S)+κ P, 0, p DD, p 0 = 0, (55) (κ P) here 0 p DD is a necessary condition for the linear relationship beteen the payoff of the to players, i.e., Eq. (6). In fact, e substitute p CD given by Eq. (55) in p CD given by Eq. (43) and use Eqs. (48) and (49) to find that p CC, p DC, p DD given by Eq. (43) coincide ith those given by Eq. (55). Therefore, Eq. (55) is a special case of ZD strategies given by Eq. (43). Finally, let us consider the case κ = P. By substituting κ = P in Eq. (53), e obtain p DD (R P) = 0, hich implies that p DD = 0. By combining this result ith Eq. (49), e obtain p 0 = p DC = p DD = 0, hich implies that player X never uses p CC and p CD. Therefore, p 0 = p DC = p DD = 0 specifies a strategy. By substituting p 0 = 0 in Eqs. (49) and (50), e obtain χ = (T P)/(P S) and κ = P, respectively, and the former equality coincides ith Eq. (5) hen κ = P. Therefore, the strategy p 0 = p DC = p DD = 0 is a special case of Eq. (5). 2

22 Appendix G Minimum discount rate for χ < 0 G. ZD strategies ith κ = P Let us consider Eq. (56) under φ < 0 and χ <. In this case, e obtain Eqs. (57), (58), and (59), but ith all the inequalities flipped (i.e., instead of ). Then, e obtain Equations (56) (59) yield (χ ) R P P S +χ T P P S +χt P P S, (56) (χ )R P P S, (57) χ+ T P (χ )R P P S P S, (58) χ+ T P +χt P P S P S. (59) χ P S +( )(R P) T R+(R P) < 0, (60) [(R P) ( )(T P)]χ R P +( )(P S), (6) [(R P) ( )(P S)]χ (R P)+( )(T P), (62) [ (P S)+(T S)]χ (P S)+( )(T P), (63) respectively. When is sufficiently large, the coefficients of χ on the left-hand sides of Eqs. (6), (62), and (63) are positive. In this situation, Eqs. (60) (63) are satisfied by a sufficiently negative large χ(< 0). This result is consistent ith the previously obtained result [32]. G.2 ZD strategies ith κ = R In this section, e examine Eqs. (75), (76), and (77) under the assumption that χ < 0. First, because dg 2 /dχ > 0, g 2 is discontinuous at χ = (R S)/(T R), and g 2 < 0 for (R S)/(T R) < χ < 0, Eq. (76) is equivalent to χ < R S (64) T R if (T R)/(T P) and R S (P S) (T R)+(T P) < χ < R S T R if < (T R)/(T P). Second, using Eq. (64), dg /dχ > 0, and that g is discontinuous at χ = (R S)/(T R), e find that Eq. (64) implies Eq. (75) if (T R)/(T S) and that Eq. (75) is equivalent to (65) R S (T S) (T R)+(T S) < χ < R S T R (66) if < (T R)/(T S). Third, because d(g 2 /g )/dχ > 0, g 2 /g is discontinuous at χ = (T R)/(R S), and g 2 /g < 0 for (T R)/(R S) < χ < 0, Eq. (77) is equivalent to χ < T R R S (67) if (P S)/(R S) and T P (T R) R χ < T (P S)+(R S) R S if < (P S)/(R S). To summarize these results, if c, generous strategies ith ( χ < min R S ) R, T < (69) T R R S 22 (68)

Prisoner s Dilemma. Veronica Ciocanel. February 25, 2013

Prisoner s Dilemma. Veronica Ciocanel. February 25, 2013 n-person February 25, 2013 n-person Table of contents 1 Equations 5.4, 5.6 2 3 Types of dilemmas 4 n-person n-person GRIM, GRIM, ALLD Useful to think of equations 5.4 and 5.6 in terms of cooperation and

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

VII. Cooperation & Competition

VII. Cooperation & Competition VII. Cooperation & Competition A. The Iterated Prisoner s Dilemma Read Flake, ch. 17 4/23/18 1 The Prisoners Dilemma Devised by Melvin Dresher & Merrill Flood in 1950 at RAND Corporation Further developed

More information

Understanding and Solving Societal Problems with Modeling and Simulation

Understanding and Solving Societal Problems with Modeling and Simulation Understanding and Solving Societal Problems with Modeling and Simulation Lecture 8: The Breakdown of Cooperation ETH Zurich April 15, 2013 Dr. Thomas Chadefaux Why Cooperation is Hard The Tragedy of the

More information

1 AUTOCRATIC STRATEGIES

1 AUTOCRATIC STRATEGIES AUTOCRATIC STRATEGIES. ORIGINAL DISCOVERY Recall that the transition matrix M for two interacting players X and Y with memory-one strategies p and q, respectively, is given by p R q R p R ( q R ) ( p R

More information

Social Network Games

Social Network Games CWI and University of Amsterdam Based on joint orks ith Evangelos Markakis and Sunil Simon The model Social netork ([Apt, Markakis 2011]) Weighted directed graph: G = (V,,), here V: a finite set of agents,

More information

arxiv: v1 [cs.gt] 18 Dec 2017

arxiv: v1 [cs.gt] 18 Dec 2017 Invincible Strategies of Iterated Prisoner s Dilemma Shiheng Wang and Fangzhen Lin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay,Kowloon,Hong Kong arxiv:1712.06488v1

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

The Stability for Tit-for-Tat

The Stability for Tit-for-Tat e-issn:31-6190 p-issn:347-94 The Stability for Tit-for-Tat Shun Kurokawa 1,* 1 Kyoto University, Oiwake-cho, Kitashirakawa, Sakyo-ku, Kyoto, Japan Key Lab of Animal Ecology and Conservation Biology, Institute

More information

arxiv:math/ v1 [math.oc] 29 Jun 2004

arxiv:math/ v1 [math.oc] 29 Jun 2004 Putting the Prisoner s Dilemma in Context L. A. Khodarinova and J. N. Webb Magnetic Resonance Centre, School of Physics and Astronomy, University of Nottingham, Nottingham, England NG7 RD, e-mail: LarisaKhodarinova@hotmail.com

More information

arxiv: v2 [q-bio.pe] 18 Dec 2007

arxiv: v2 [q-bio.pe] 18 Dec 2007 The Effect of a Random Drift on Mixed and Pure Strategies in the Snowdrift Game arxiv:0711.3249v2 [q-bio.pe] 18 Dec 2007 André C. R. Martins and Renato Vicente GRIFE, Escola de Artes, Ciências e Humanidades,

More information

Extortion and Evolution in the Iterated Prisoner s Dilemma

Extortion and Evolution in the Iterated Prisoner s Dilemma Extortion and Evolution in the Iterated Prisoner s Dilemma Michael Earnest Nicholas Pippenger, Advisor Francis Su, Reader May, 2013 Department of Mathematics Copyright c 2013 Michael Earnest. The author

More information

Econ 201: Problem Set 3 Answers

Econ 201: Problem Set 3 Answers Econ 20: Problem Set 3 Ansers Instructor: Alexandre Sollaci T.A.: Ryan Hughes Winter 208 Question a) The firm s fixed cost is F C = a and variable costs are T V Cq) = 2 bq2. b) As seen in class, the optimal

More information

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance International Journal of Statistics and Probability; Vol. 5, No. 4; July 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education The Probability of Pathogenicity in Clinical

More information

EVOLUTIONARY STABILITY FOR TWO-STAGE HAWK-DOVE GAMES

EVOLUTIONARY STABILITY FOR TWO-STAGE HAWK-DOVE GAMES ROCKY MOUNTAIN JOURNAL OF MATHEMATICS olume 25, Number 1, Winter 1995 EOLUTIONARY STABILITY FOR TWO-STAGE HAWK-DOE GAMES R. CRESSMAN ABSTRACT. Although two individuals in a biological species often interact

More information

Minimize Cost of Materials

Minimize Cost of Materials Question 1: Ho do you find the optimal dimensions of a product? The size and shape of a product influences its functionality as ell as the cost to construct the product. If the dimensions of a product

More information

Outline of lectures 3-6

Outline of lectures 3-6 GENOME 453 J. Felsenstein Evolutionary Genetics Autumn, 013 Population genetics Outline of lectures 3-6 1. We ant to kno hat theory says about the reproduction of genotypes in a population. This results

More information

Computational Problems Related to Graph Structures in Evolution

Computational Problems Related to Graph Structures in Evolution BACHELOR THESIS Štěpán Šimsa Computational Problems Related to Graph Structures in Evolution Department of Applied Mathematics Supervisor of the bachelor thesis: Study programme: Study branch: Prof. Krishnendu

More information

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity

More information

The Iterated Prisoner s Dilemma: Good Strategies and Their Dynamics

The Iterated Prisoner s Dilemma: Good Strategies and Their Dynamics arxiv:1211.0969v3 [math.ds] 25 Apr 2017 The Iterated Prisoner s Dilemma: Good Strategies and Their Dynamics Ethan Akin Mathematics Department The City College 137 Street and Convent Avenue New York City,

More information

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism

Towards a Theory of Societal Co-Evolution: Individualism versus Collectivism Toards a Theory of Societal Co-Evolution: Individualism versus Collectivism Kartik Ahuja, Simpson Zhang and Mihaela van der Schaar Department of Electrical Engineering, Department of Economics, UCLA Theorem

More information

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing

More information

Internalization. a Game-Theoretic Approach. Rolf Ziegler Institute of Sociology University of Munich

Internalization. a Game-Theoretic Approach. Rolf Ziegler Institute of Sociology University of Munich Sanctioning Strategies and Internalization a Game-Theoretic Approach Rolf Ziegler Institute of Sociology University of Munich Rational Choice Sociology: Theory and Empirical Applications Venice International

More information

Quantum Games. Quantum Strategies in Classical Games. Presented by Yaniv Carmeli

Quantum Games. Quantum Strategies in Classical Games. Presented by Yaniv Carmeli Quantum Games Quantum Strategies in Classical Games Presented by Yaniv Carmeli 1 Talk Outline Introduction Game Theory Why quantum games? PQ Games PQ penny flip 2x2 Games Quantum strategies 2 Game Theory

More information

The Robustness of Zero-Determinant Strategies in Iterated Prisoner s Dilemma Games

The Robustness of Zero-Determinant Strategies in Iterated Prisoner s Dilemma Games The Robustness of Zero-Determinant Strategies in Iterated Prisoner s Dilemma Games Jing Chen,a and Aleksey Zinger b a Department of Computer Science, Stony Brook University, Stony Brook, NY 11794, USA

More information

Game Theory. Professor Peter Cramton Economics 300

Game Theory. Professor Peter Cramton Economics 300 Game Theory Professor Peter Cramton Economics 300 Definition Game theory is the study of mathematical models of conflict and cooperation between intelligent and rational decision makers. Rational: each

More information

First Prev Next Last Go Back Full Screen Close Quit. Game Theory. Giorgio Fagiolo

First Prev Next Last Go Back Full Screen Close Quit. Game Theory. Giorgio Fagiolo Game Theory Giorgio Fagiolo giorgio.fagiolo@univr.it https://mail.sssup.it/ fagiolo/welcome.html Academic Year 2005-2006 University of Verona Summary 1. Why Game Theory? 2. Cooperative vs. Noncooperative

More information

MMSE Equalizer Design

MMSE Equalizer Design MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)

More information

Camera Calibration. (Trucco, Chapter 6) -Toproduce an estimate of the extrinsic and intrinsic camera parameters.

Camera Calibration. (Trucco, Chapter 6) -Toproduce an estimate of the extrinsic and intrinsic camera parameters. Camera Calibration (Trucco, Chapter 6) What is the goal of camera calibration? -Toproduce an estimate of the extrinsic and intrinsic camera parameters. Procedure -Given the correspondences beteen a set

More information

(1) Sensitivity = 10 0 g x. (2) m Size = Frequency = s (4) Slenderness = 10w (5)

(1) Sensitivity = 10 0 g x. (2) m Size = Frequency = s (4) Slenderness = 10w (5) 1 ME 26 Jan. May 2010, Homeork #1 Solution; G.K. Ananthasuresh, IISc, Bangalore Figure 1 shos the top-vie of the accelerometer. We need to determine the values of, l, and s such that the specified requirements

More information

MATCHING STRUCTURE AND THE EVOLUTION OF COOPERATION IN THE PRISONER S DILEMMA

MATCHING STRUCTURE AND THE EVOLUTION OF COOPERATION IN THE PRISONER S DILEMMA MATCHING STRUCTURE AN THE EVOLUTION OF COOPERATION IN THE PRISONER S ILEMMA Noureddine Bouhmala 1 and Jon Reiersen 2 1 epartment of Technology, Vestfold University College, Norway noureddine.bouhmala@hive.no

More information

Consider this problem. A person s utility function depends on consumption and leisure. Of his market time (the complement to leisure), h t

Consider this problem. A person s utility function depends on consumption and leisure. Of his market time (the complement to leisure), h t VI. INEQUALITY CONSTRAINED OPTIMIZATION Application of the Kuhn-Tucker conditions to inequality constrained optimization problems is another very, very important skill to your career as an economist. If

More information

Chapter 3. Systems of Linear Equations: Geometry

Chapter 3. Systems of Linear Equations: Geometry Chapter 3 Systems of Linear Equations: Geometry Motiation We ant to think about the algebra in linear algebra (systems of equations and their solution sets) in terms of geometry (points, lines, planes,

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation

More information

Pareto-Improving Congestion Pricing on General Transportation Networks

Pareto-Improving Congestion Pricing on General Transportation Networks Transportation Seminar at University of South Florida, 02/06/2009 Pareto-Improving Congestion Pricing on General Transportation Netorks Yafeng Yin Transportation Research Center Department of Civil and

More information

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a

More information

N-bit Parity Neural Networks with minimum number of threshold neurons

N-bit Parity Neural Networks with minimum number of threshold neurons Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037

More information

On Acyclicity of Games with Cycles

On Acyclicity of Games with Cycles On Acyclicity of Games with Cycles Daniel Andersson, Vladimir Gurvich, and Thomas Dueholm Hansen Dept. of Computer Science, Aarhus University, {koda,tdh}@cs.au.dk RUTCOR, Rutgers University, gurvich@rutcor.rutgers.edu

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

Synthesis weakness of standard approach. Rational Synthesis

Synthesis weakness of standard approach. Rational Synthesis 1 Synthesis weakness of standard approach Rational Synthesis 3 Overview Introduction to formal verification Reactive systems Verification Synthesis Introduction to Formal Verification of Reactive Systems

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

Bivariate Uniqueness in the Logistic Recursive Distributional Equation

Bivariate Uniqueness in the Logistic Recursive Distributional Equation Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860

More information

Evolution & Learning in Games

Evolution & Learning in Games 1 / 27 Evolution & Learning in Games Econ 243B Jean-Paul Carvalho Lecture 2. Foundations of Evolution & Learning in Games II 2 / 27 Outline In this lecture, we shall: Take a first look at local stability.

More information

Quantum model of strategic decision-making in Prisoner s Dilemma game: quantitative predictions and new empirical results

Quantum model of strategic decision-making in Prisoner s Dilemma game: quantitative predictions and new empirical results Quantum model of strategic decision-making in Prisoner s Dilemma game: quantitative predictions and new empirical results Jakub Tesař, Charles University in Prague, Institute of Political Studies, jakub.tesar@fsv.cuni.cz

More information

Théorie Analytique des Probabilités

Théorie Analytique des Probabilités Théorie Analytique des Probabilités Pierre Simon Laplace Book II 5 9. pp. 203 228 5. An urn being supposed to contain the number B of balls, e dra from it a part or the totality, and e ask the probability

More information

Bucket handles and Solenoids Notes by Carl Eberhart, March 2004

Bucket handles and Solenoids Notes by Carl Eberhart, March 2004 Bucket handles and Solenoids Notes by Carl Eberhart, March 004 1. Introduction A continuum is a nonempty, compact, connected metric space. A nonempty compact connected subspace of a continuum X is called

More information

Artificial Neural Networks. Part 2

Artificial Neural Networks. Part 2 Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological

More information

Belief-based Learning

Belief-based Learning Belief-based Learning Algorithmic Game Theory Marcello Restelli Lecture Outline Introdutcion to multi-agent learning Belief-based learning Cournot adjustment Fictitious play Bayesian learning Equilibrium

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;

More information

arxiv: v4 [cs.dm] 20 Nov 2017

arxiv: v4 [cs.dm] 20 Nov 2017 THE SPREAD OF COOPERATIVE STRATEGIES ON GRIDS WITH RANDOM ASYNCHRONOUS UPDATING CHRISTOPHER DUFFY 1 AND JEANNETTE JANSSEN 2 1 DEPARTMENT OF MATHEMATICS AND STATISTICS UNIVERSITY OF SASKATCHEWAN 2 DEPARTMENT

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;

More information

6.891 Games, Decision, and Computation February 5, Lecture 2

6.891 Games, Decision, and Computation February 5, Lecture 2 6.891 Games, Decision, and Computation February 5, 2015 Lecture 2 Lecturer: Constantinos Daskalakis Scribe: Constantinos Daskalakis We formally define games and the solution concepts overviewed in Lecture

More information

Neural Networks. Associative memory 12/30/2015. Associative memories. Associative memories

Neural Networks. Associative memory 12/30/2015. Associative memories. Associative memories //5 Neural Netors Associative memory Lecture Associative memories Associative memories The massively parallel models of associative or content associative memory have been developed. Some of these models

More information

arxiv: v3 [q-bio.pe] 11 Apr 2016

arxiv: v3 [q-bio.pe] 11 Apr 2016 AUTOCRATIC STRATEGIES FOR ITERATED GAMES WITH ARBITRARY ACTION SPACES ALEX MCAVOY AND CHRISTOPH HAUERT arxiv:1510.09073v3 [q-bio.pe] 11 Apr 2016 Abstract. The recent discovery of zero-determinant strategies

More information

Evolutionary Game Theory

Evolutionary Game Theory Evolutionary Game Theory ISI 330 Lecture 18 1 ISI 330 Lecture 18 Outline A bit about historical origins of Evolutionary Game Theory Main (competing) theories about how cooperation evolves P and other social

More information

Solving Linear and Rational Inequalities Algebraically. Definition 22.1 Two inequalities are equivalent if they have the same solution set.

Solving Linear and Rational Inequalities Algebraically. Definition 22.1 Two inequalities are equivalent if they have the same solution set. Inequalities Concepts: Equivalent Inequalities Solving Linear and Rational Inequalities Algebraically Approximating Solutions to Inequalities Graphically (Section 4.4).1 Equivalent Inequalities Definition.1

More information

1. Suppose preferences are represented by the Cobb-Douglas utility function, u(x1,x2) = Ax 1 a x 2

1. Suppose preferences are represented by the Cobb-Douglas utility function, u(x1,x2) = Ax 1 a x 2 Additional questions for chapter 7 1. Suppose preferences are represented by the Cobb-Douglas utility function ux1x2 = Ax 1 a x 2 1-a 0 < a < 1 &A > 0. Assuming an interior solution solve for the Marshallian

More information

Early & Quick COSMIC-FFP Analysis using Analytic Hierarchy Process

Early & Quick COSMIC-FFP Analysis using Analytic Hierarchy Process Early & Quick COSMIC-FFP Analysis using Analytic Hierarchy Process uca Santillo (luca.santillo@gmail.com) Abstract COSMIC-FFP is a rigorous measurement method that makes possible to measure the functional

More information

Ch. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding

Ch. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding Ch. 2 Math Preliminaries for Lossless Compression Section 2.4 Coding Some General Considerations Definition: An Instantaneous Code maps each symbol into a codeord Notation: a i φ (a i ) Ex. : a 0 For Ex.

More information

Algebra II Solutions

Algebra II Solutions 202 High School Math Contest 6 Algebra II Eam 2 Lenoir-Rhyne University Donald and Helen Schort School of Mathematics and Computing Sciences Algebra II Solutions This eam has been prepared by the folloing

More information

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University Long run input use-input price relations and the cost function Hessian Ian Steedman Manchester Metropolitan University Abstract By definition, to compare alternative long run equilibria is to compare alternative

More information

Announcements Wednesday, September 06

Announcements Wednesday, September 06 Announcements Wednesday, September 06 WeBWorK due on Wednesday at 11:59pm. The quiz on Friday coers through 1.2 (last eek s material). My office is Skiles 244 and my office hours are Monday, 1 3pm and

More information

Lecture Notes: Self-enforcing agreements

Lecture Notes: Self-enforcing agreements Lecture Notes: Self-enforcing agreements Bård Harstad ECON 4910 March 2016 Bård Harstad (ECON 4910) Self-enforcing agreements March 2016 1 / 34 1. Motivation Many environmental problems are international

More information

6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks

6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks 6.207/14.15: Networks Lecture 16: Cooperation and Trust in Networks Daron Acemoglu and Asu Ozdaglar MIT November 4, 2009 1 Introduction Outline The role of networks in cooperation A model of social norms

More information

and sinθ = cosb =, and we know a and b are acute angles, find cos( a+ b) Trigonometry Topics Accuplacer Review revised July 2016 sin.

and sinθ = cosb =, and we know a and b are acute angles, find cos( a+ b) Trigonometry Topics Accuplacer Review revised July 2016 sin. Trigonometry Topics Accuplacer Revie revised July 0 You ill not be alloed to use a calculator on the Accuplacer Trigonometry test For more information, see the JCCC Testing Services ebsite at http://jcccedu/testing/

More information

Bargaining Efficiency and the Repeated Prisoners Dilemma. Bhaskar Chakravorti* and John Conley**

Bargaining Efficiency and the Repeated Prisoners Dilemma. Bhaskar Chakravorti* and John Conley** Bargaining Efficiency and the Repeated Prisoners Dilemma Bhaskar Chakravorti* and John Conley** Published as: Bhaskar Chakravorti and John P. Conley (2004) Bargaining Efficiency and the repeated Prisoners

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

Complex Numbers and the Complex Exponential

Complex Numbers and the Complex Exponential Complex Numbers and the Complex Exponential φ (2+i) i 2 θ φ 2+i θ 1 2 1. Complex numbers The equation x 2 + 1 0 has no solutions, because for any real number x the square x 2 is nonnegative, and so x 2

More information

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden

Selecting Efficient Correlated Equilibria Through Distributed Learning. Jason R. Marden 1 Selecting Efficient Correlated Equilibria Through Distributed Learning Jason R. Marden Abstract A learning rule is completely uncoupled if each player s behavior is conditioned only on his own realized

More information

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic

More information

A proof of topological completeness for S4 in (0,1)

A proof of topological completeness for S4 in (0,1) A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu

More information

Solving Extensive Form Games

Solving Extensive Form Games Chapter 8 Solving Extensive Form Games 8.1 The Extensive Form of a Game The extensive form of a game contains the following information: (1) the set of players (2) the order of moves (that is, who moves

More information

The Cross Entropy Method for the N-Persons Iterated Prisoner s Dilemma

The Cross Entropy Method for the N-Persons Iterated Prisoner s Dilemma The Cross Entropy Method for the N-Persons Iterated Prisoner s Dilemma Tzai-Der Wang Artificial Intelligence Economic Research Centre, National Chengchi University, Taipei, Taiwan. email: dougwang@nccu.edu.tw

More information

Basic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria

Basic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria Basic Game Theory University of Waterloo January 7, 2013 Outline 1 2 3 What is game theory? The study of games! Bluffing in poker What move to make in chess How to play Rock-Scissors-Paper Also study of

More information

N-Player Prisoner s Dilemma

N-Player Prisoner s Dilemma ALTRUISM, THE PRISONER S DILEMMA, AND THE COMPONENTS OF SELECTION Abstract The n-player prisoner s dilemma (PD) is a useful model of multilevel selection for altruistic traits. It highlights the non zero-sum

More information

Lecture notes for Analysis of Algorithms : Markov decision processes

Lecture notes for Analysis of Algorithms : Markov decision processes Lecture notes for Analysis of Algorithms : Markov decision processes Lecturer: Thomas Dueholm Hansen June 6, 013 Abstract We give an introduction to infinite-horizon Markov decision processes (MDPs) with

More information

The effect of learning on membership and welfare in an International Environmental Agreement

The effect of learning on membership and welfare in an International Environmental Agreement Climatic Change (202) 0:499 505 DOI 0007/s0584-0-034-5 The effect of learning on membership and welfare in an International Environmental Agreement Larry Karp Received: 7 March 200 / Accepted: 20 April

More information

Institut für Höhere Studien (IHS), Wien Institute for Advanced Studies, Vienna

Institut für Höhere Studien (IHS), Wien Institute for Advanced Studies, Vienna Institut für Höhere Studien (IHS), Wien Institute for Advanced Studies, Vienna Reihe Ökonomie / Economics Series No. 67 Siblings, Strangers, and the Surge of Altruism Oded Stark Siblings, Strangers, and

More information

Nash-solvable bidirected cyclic two-person game forms

Nash-solvable bidirected cyclic two-person game forms DIMACS Technical Report 2008-13 November 2008 Nash-solvable bidirected cyclic two-person game forms by Endre Boros 1 RUTCOR, Rutgers University 640 Bartholomew Road, Piscataway NJ 08854-8003 boros@rutcor.rutgers.edu

More information

Evolution of Cooperation in the Snowdrift Game with Incomplete Information and Heterogeneous Population

Evolution of Cooperation in the Snowdrift Game with Incomplete Information and Heterogeneous Population DEPARTMENT OF ECONOMICS Evolution of Cooperation in the Snowdrift Game with Incomplete Information and Heterogeneous Population André Barreira da Silva Rocha, University of Leicester, UK Annick Laruelle,

More information

Computation of Efficient Nash Equilibria for experimental economic games

Computation of Efficient Nash Equilibria for experimental economic games International Journal of Mathematics and Soft Computing Vol.5, No.2 (2015), 197-212. ISSN Print : 2249-3328 ISSN Online: 2319-5215 Computation of Efficient Nash Equilibria for experimental economic games

More information

Math 3338: Probability (Fall 2006)

Math 3338: Probability (Fall 2006) Math 3338: Probability (Fall 2006) Jiwen He Section Number: 10853 http://math.uh.edu/ jiwenhe/math3338fall06.html Probability p.1/8 Chapter Two: Probability (I) Probability p.2/8 2.1 Sample Spaces and

More information

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours.

University of Warwick, Department of Economics Spring Final Exam. Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. University of Warwick, Department of Economics Spring 2012 EC941: Game Theory Prof. Francesco Squintani Final Exam Answer TWO questions. All questions carry equal weight. Time allowed 2 hours. 1. Consider

More information

Asymmetric Social Norms

Asymmetric Social Norms Asymmetric Social Norms Gabriele Camera Chapman University University of Basel Alessandro Gioffré Goethe University December 8, 2016 Abstract Studies of cooperation in infinitely repeated matching games

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

Interacting Vehicles: Rules of the Game

Interacting Vehicles: Rules of the Game Chapter 7 Interacting Vehicles: Rules of the Game In previous chapters, we introduced an intelligent control method for autonomous navigation and path planning. The decision system mainly uses local information,

More information

Effi ciency in Repeated Games with Local Monitoring

Effi ciency in Repeated Games with Local Monitoring Effi ciency in Repeated Games with Local Monitoring Francesco Nava and Michele Piccione London School of Economics April 2013 Nava & Piccione (LSE) Local Monitoring April 2013 1 / 68 General Motivation

More information

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games A Polynomial-time Nash Equilibrium Algorithm for Repeated Games Michael L. Littman mlittman@cs.rutgers.edu Rutgers University Peter Stone pstone@cs.utexas.edu The University of Texas at Austin Main Result

More information

Possible Cosmic Influences on the 1966 Tashkent Earthquake and its Largest Aftershocks

Possible Cosmic Influences on the 1966 Tashkent Earthquake and its Largest Aftershocks Geophys. J. R. mtr. Sac. (1974) 38, 423-429. Possible Cosmic Influences on the 1966 Tashkent Earthquake and its Largest Aftershocks G. P. Tamrazyan (Received 1971 August 13)* Summary I present evidence

More information

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be

More information

Lecture 4: Labour Economics and Wage-Setting Theory

Lecture 4: Labour Economics and Wage-Setting Theory ecture 4: abour Economics and Wage-Setting Theory Spring 203 ars Calmfors iterature: Chapter 5 Cahuc-Zylberberg (pp 257-26) Chapter 7 Cahuc-Zylberberg (pp 369-390 and 393-397) Topics The monopsony model

More information

Coalitional Structure of the Muller-Satterthwaite Theorem

Coalitional Structure of the Muller-Satterthwaite Theorem Coalitional Structure of the Muller-Satterthwaite Theorem Pingzhong Tang and Tuomas Sandholm Computer Science Department Carnegie Mellon University {kenshin,sandholm}@cscmuedu Abstract The Muller-Satterthwaite

More information

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7. Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also

More information

Lecture Notes 8

Lecture Notes 8 14.451 Lecture Notes 8 Guido Lorenzoni Fall 29 1 Stochastic dynamic programming: an example We no turn to analyze problems ith uncertainty, in discrete time. We begin ith an example that illustrates the

More information

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function

More information

Known Unknowns: Power Shifts, Uncertainty, and War.

Known Unknowns: Power Shifts, Uncertainty, and War. Known Unknowns: Power Shifts, Uncertainty, and War. Online Appendix Alexandre Debs and Nuno P. Monteiro May 10, 2016 he Appendix is structured as follows. Section 1 offers proofs of the formal results

More information

1 Effects of Regularization For this problem, you are required to implement everything by yourself and submit code.

1 Effects of Regularization For this problem, you are required to implement everything by yourself and submit code. This set is due pm, January 9 th, via Moodle. You are free to collaborate on all of the problems, subject to the collaboration policy stated in the syllabus. Please include any code ith your submission.

More information