2008
DOI: 10.2200/s00108ed1v01y200802aim003
|View full text |Cite
|
Sign up to set email alerts
|

Essentials of Game Theory: A Concise Multidisciplinary Introduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
253
0
7

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 265 publications
(260 citation statements)
references
References 24 publications
0
253
0
7
Order By: Relevance
“…We define this problem in equation 6 in order to find Lk * . We also find Ck * as an agent in the network of a friend of agent a that upon joining, would maximize a's P oC in equation 7 and similarly CLk * as an agent that maximizes the combination of agent a's LRep and P oC values in equation 8.…”
Section: υ ∪ {B}|mentioning
confidence: 73%
“…We define this problem in equation 6 in order to find Lk * . We also find Ck * as an agent in the network of a friend of agent a that upon joining, would maximize a's P oC in equation 7 and similarly CLk * as an agent that maximizes the combination of agent a's LRep and P oC values in equation 8.…”
Section: υ ∪ {B}|mentioning
confidence: 73%
“…According to the American Mathematical Society, game theory is an official mathematical discipline (Peters, 2008;Leyton-Brown & Shoham, 2008;Rasmusen, 2007;Osborne & Rubinstein, 1994). This theory is widely used in some modern social and economic theories: "In modern graduate microeconomics, game theory has almost completely replaced calculus as the central modelling apparatus" (Colander, 2000, p. 136).…”
Section: Unsatisfactory Results Of Using Game Theory In Modern Microementioning
confidence: 99%
“…If players have some information about the choices of other players, the game is usually presented in extensive form. Every extensive-form game has an equivalent normal-form game, however the transformation to normal form may result in an exponential blowup in the size of the representation, making it computationally impractical [21].…”
Section: Access Control Attacks (Address Masquerading)mentioning
confidence: 99%