Transformation of the Network Model with Complete Information of the Network Structure into a Network Model with Incomplete Information of the Network Structure - A Game Theory Approach
Journal Title: Computer Science and Mathematical Modelling - Year 2011, Vol 0, Issue 7
Abstract
In this paper we consider the formation of directed networks, i.e. networks represented by directed graphs. By information (a rather common use of this term) we mean good information that flows in the network. Each member of the network is endowed with some amount of resources and has also a payoff function, which depends positively on the amount of information he has access to. Knowing the network structure players can gain access to the information possessed by others by creating links. The problem is to specify which network structures can be a strategic equilibrium and whether they are optimal (effective) [3], [2].Further on we introduced a model in which players do not have a complete knowledge of the network structure, but only a part of it. Decisions they make base on incomplete information. The problem is to define the equilibrium and to find out what strategies can lead to the equilibrium.
Authors and Affiliations
Adam Misztak
Transformation of the Network Model with Complete Information of the Network Structure into a Network Model with Incomplete Information of the Network Structure - A Game Theory Approach
In this paper we consider the formation of directed networks, i.e. networks represented by directed graphs. By information (a rather common use of this term) we mean good information that flows in the network. Each membe...
Use case driven scheduling method of information technology project
In this article, requirements-oriented project scheduling method is presented. The method is use-case-oriented and shows how to prioritize use cases and schedule realization of information system. The method can be usefu...
Model procesu pokonywania wielostrefowej ochrony obiektu stacjonarnego przez intruza
W artykule rozpatruje się model procesu pokonywania wielostrefowej ochrony obiektu stacjonarnego (zabudowania wraz z przyległym terenem) przez pasywnego intruza zdeterminowanego, co oznacza intruza nie oddziałującego czy...
Podstawy działania komputera kwantowego wykorzystującego zjawisko jądrowego rezonansu magnetycznego
Referat zawiera informacje dotyczące teoretycznych podstaw budowy komputera kwantowego. W ramach implementacji takiego urządzenia proponowane są różne metody. Tu przybliżony został pomysł wykorzystania zjawiska jądrowego...
Enterprise architecture management method
In this article manner of enterprise architecture management was described. This approach encompasses software development methodology, fashion of description and tools support. Rational Unified Process (RUP) software de...