A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Algorithms for finding coalitions exploiting a new reciprocity condition
2009
Logic Journal of the IGPL
Moreover, we provide an algorithm to search all the sub-coalitions of a given coalition satisfying the new property. ...
We introduce a reciprocity criterion for coalition formation among goal-directed agents, which we call the indecomposable do-ut-des property. ...
Algorithms for finding coalitions exploiting a new reciprocity condition 23 arises from the fact that agents prefer to form small coalitions because, as coalitions spring from unanimously agreements, the ...
doi:10.1093/jigpal/jzp008
fatcat:5uiw72dqjbg7zhgeqnsx7iqu4q
Social trust and social reciprocity based cooperative D2D communications
2013
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '13
With this insight, we develop a coalitional game theoretic framework to devise social-tie based cooperation strategies for device-to-device communications. ...
Figure 1: An illustration of cooperative D2D communication for cooperative networking. In subfigure (a), device R serves as the relay for the D2D communication between devices S and D. ...
Recall that the reciprocal relay selection cycle finding algorithm in Algorithm 2 has a complexity of O(|Mt|). ...
doi:10.1145/2491288.2491302
dblp:conf/mobihoc/ChenPGZ13
fatcat:bpmtgoc4kbfxbeoujmlopo5lou
Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays
2018
IEEE Transactions on Wireless Communications
Physical layer security (PLS) is a promising technology in device-to-device (D2D) communications by exploiting reciprocity and randomness of wireless channels, which attracts considerable research attention ...
The coalition game theory is further utilized to select the optimal relay pairs for improving SKGR. ...
This preference order based switching operation enables every D2D pair to find a preferred relay pair and to form a new preferable coalition. ...
doi:10.1109/twc.2018.2817607
fatcat:bprzfwgas5e2bkjpbiuybzgzpa
Cognitive adaptations forn-person exchange: the evolutionary roots of organizational behavior
2006
Managerial and Decision Economics
As a result, humans evolved mechanisms that implement an aversion to exploitation by free riding, and a strategy of conditional cooperation, supplemented by punitive sentiment towards free riders. ...
Humans have been engaging in n-person exchanges for a great enough period of evolutionary time that we appear to have evolved a distinct constellation of species-typical mechanisms specialized to solve ...
Exchange depends on conditionally delivered behavior (e.g. I will do X if you do Y), and so necessarily requires conditional reasoning for its regulation. ...
doi:10.1002/mde.1287
pmid:23814325
pmcid:PMC3693395
fatcat:m7axsbwjxbgwtchdlgdbizwngm
Implicit Coalitions in a Generalized Prisoner's Dilemma
1988
Journal of Conflict Resolution
Of course, there is a limit to magnanimity; too high a coalition action allows an algorithm to be exploited. ...
Our new strategy, named CEAVG3 (for coalition encourager, based on the average of all 3 coalition actions), is still a COALENC strategy; S og3~~~- Although the coalition actions and payoffs for the new ...
doi:10.1177/0022002788032003008
fatcat:2jt547rrjffuzml224hr7qkofq
Coalitional Games in MISO Interference Channels: Epsilon-Core and Coalition Structure Stable Set
2014
IEEE Transactions on Signal Processing
The ϵ-core is a solution concept for coalitional games which takes into account the overhead required in coalition deviation. ...
We provide necessary and sufficient conditions for the strong and weak ϵ-core of our coalitional game not to be empty with zero forcing transmission. ...
Algorithm 2 provides a structured method to find a possible mergings between coalitions by exploiting the algorithm in [43, Section 4.4] . ...
doi:10.1109/tsp.2014.2367466
fatcat:ea3qbm2jgvcr3mssujwck45aom
Emergent Reciprocity and Team Formation from Randomized Uncertain Social Preferences
[article]
2020
arXiv
pre-print
In this work, we show evidence of emergent direct reciprocity, indirect reciprocity and reputation, and team formation when training agents with randomized uncertain social preferences (RUSP), a novel ...
There has been much prior work in cooperative game theory on coalition formation (31) such as how to divide rewards within a coalition, (32, 33, 34) how to find coalitions in cooperative graphs, ( ...
We find that RUSP agents are indeed reciprocal and will punish players for defecting against them. ...
arXiv:2011.05373v1
fatcat:s2vlosrsz5hzlomxt4o5bzcvca
Improving Macrocell - Small Cell Coexistence through Adaptive Interference Draining
[article]
2012
arXiv
pre-print
experiences the best channel and interference conditions. ...
At the macrocell side, we consider a modified water-filling policy for the power allocation that allows each macrocell user (MUE) to focus the transmissions on the degrees of freedom over which the MUE ...
The coalition formation becomes even more preferable when the SBSs can exploit the frequency dimension as it extends the limitation of condition (5). ...
arXiv:1212.3170v1
fatcat:sdo34wu6j5dxdhc3nt4jzghxwi
Partner selection for decode-and-forward cooperative relaying: A matching theoretic approach
2013
2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
Each agent aims here at finding a "good" partner in order to exploit efficiently the spatial diversity achieved with cooperation. ...
We adapt Irving's algorithm [3] for determining the partners of each player. ...
Each agent aims here at finding a "good" partner in order to exploit efficiently the spatial diversity achieved with cooperation. This process can be identified as a matching problem. ...
doi:10.1109/pimrc.2013.6666523
dblp:conf/pimrc/HasanAG13
fatcat:tq4p3pph3bb4fgiim2jvsdozse
Emergent Management Morality: Explaining Corporate Corruption
2003
Emergence
and committed to expansive growth and gain created an environment of unparalleled opportunity for executive exploitation. ...
A company's moral posture is established where its diverse attractors, as proxies for core values, intersect with the algorithmic impulses of the firm's dominant managerial coalition. ...
doi:10.1207/s15327000em0501_04
fatcat:hcdijjnjhzbwxk5rotoesmy4bu
Improving Macrocell-Small Cell Coexistence Through Adaptive Interference Draining
2014
IEEE Transactions on Wireless Communications
experiences the best channel and interference conditions. ...
a network with 150 MUEs and 200 SBSs. ...
The coalition formation becomes even more preferable when the SBSs can exploit the frequency dimension as it extends the limitation of condition (5). ...
doi:10.1109/twc.2013.120613.130617
fatcat:q75dfieiwzekrianisijoryd6a
Breaking the Dynamics of Emotions and Fear in Conflict and Reconstruction
2014
Peace Economics, Peace Science and Public Policy
This paper is all about the construction of a new analytical framework to understand conflict and cooperation both at the international and at the domestic level with the aim of then finding mechanisms ...
Thus we have here developed an Article note: The research presented here was supported through a grant from SNIS the Swiss Network for International Studies. ...
Since we are again witnessing a deterioration of these conditions especially in South Sudan, it is not surprising that now this new country in in turn torn apart by a civil war. ...
doi:10.1515/peps-2014-0015
fatcat:fqc4td5y3zedflrtr5y36tcz5y
Incentive Mechanisms in P2P Media Streaming Systems
2011
IEEE Internet Computing
Using a P2P network reduces the load on servers by exploiting bandwidths from participating peers. ...
In live streaming, a user views a live event broadcasted in real time, for instance, watching President Obamas swearing-in ceremony while it was occurring. ...
Similar to tit-for-tat schemes, it takes time for reputation to be established for new peers. An initial grace period is granted for new peers that can be exploited to free ride the system. ...
doi:10.1109/mic.2010.105
fatcat:44ea37vn3rebxmkfslh2zdi7z4
Trust dynamics in multi-agent coalition formation
2011
Unmanned Systems Technology XIII
We present a rigorous treatment of coalition formation based on trust interactions in multi-agent systems. ...
We rigorously justify the behaviors of agents for different classes of games, and discuss ways to exploit the formal properties of these games for specific applications, such as unmanned cooperative control ...
Using (32) and our definitions in (40) and (41) , the trust payoff values for a coalition in the convoy trust game is: ...
doi:10.1117/12.883333
fatcat:l2xyidp6uzb4bi3c4gvznupwlu
Multi-Beam NOMA for Hybrid mmWave Systems
[article]
2018
arXiv
pre-print
In the first stage, assuming that only analog beamforming is available, a user grouping and antenna allocation algorithm is proposed to maximize the conditional system sum-rate based on the coalition formation ...
This provides a higher flexibility for applying NOMA in mmWave communications and thus can efficiently exploit the potential multi-user diversity. ...
In this paper, we assume the use of time division duplex (TDD) and exploit the channel reciprocity, i.e., the estimated effective channel in the uplink can be used for digital precoder design in the downlink ...
arXiv:1806.04919v1
fatcat:jukinpmi5vbp7piqvs43y55v7m
« Previous
Showing results 1 — 15 out of 1,801 results