Filters








1,801 Hits in 5.7 sec

Algorithms for finding coalitions exploiting a new reciprocity condition

G. Boella, L. Sauro, L. van der Torre
2009 Logic Journal of the IGPL  
Moreover, we provide an algorithm to search all the sub-coalitions of a given coalition satisfying the new property.  ...  We introduce a reciprocity criterion for coalition formation among goal-directed agents, which we call the indecomposable do-ut-des property.  ...  Algorithms for finding coalitions exploiting a new reciprocity condition 23 arises from the fact that agents prefer to form small coalitions because, as coalitions spring from unanimously agreements, the  ... 
doi:10.1093/jigpal/jzp008 fatcat:5uiw72dqjbg7zhgeqnsx7iqu4q

Social trust and social reciprocity based cooperative D2D communications

Xu Chen, Brian Proulx, Xiaowen Gong, Junshan Zhang
2013 Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '13  
With this insight, we develop a coalitional game theoretic framework to devise social-tie based cooperation strategies for device-to-device communications.  ...  Figure 1: An illustration of cooperative D2D communication for cooperative networking. In subfigure (a), device R serves as the relay for the D2D communication between devices S and D.  ...  Recall that the reciprocal relay selection cycle finding algorithm in Algorithm 2 has a complexity of O(|Mt|).  ... 
doi:10.1145/2491288.2491302 dblp:conf/mobihoc/ChenPGZ13 fatcat:bpmtgoc4kbfxbeoujmlopo5lou

Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays

Muhammad Waqas, Manzoor Ahmed, Yong Li, Depeng Jin, Sheng Chen
2018 IEEE Transactions on Wireless Communications  
Physical layer security (PLS) is a promising technology in device-to-device (D2D) communications by exploiting reciprocity and randomness of wireless channels, which attracts considerable research attention  ...  The coalition game theory is further utilized to select the optimal relay pairs for improving SKGR.  ...  This preference order based switching operation enables every D2D pair to find a preferred relay pair and to form a new preferable coalition.  ... 
doi:10.1109/twc.2018.2817607 fatcat:bprzfwgas5e2bkjpbiuybzgzpa

Cognitive adaptations forn-person exchange: the evolutionary roots of organizational behavior

John Tooby, Leda Cosmides, Michael E. Price
2006 Managerial and Decision Economics  
As a result, humans evolved mechanisms that implement an aversion to exploitation by free riding, and a strategy of conditional cooperation, supplemented by punitive sentiment towards free riders.  ...  Humans have been engaging in n-person exchanges for a great enough period of evolutionary time that we appear to have evolved a distinct constellation of species-typical mechanisms specialized to solve  ...  Exchange depends on conditionally delivered behavior (e.g. I will do X if you do Y), and so necessarily requires conditional reasoning for its regulation.  ... 
doi:10.1002/mde.1287 pmid:23814325 pmcid:PMC3693395 fatcat:m7axsbwjxbgwtchdlgdbizwngm

Implicit Coalitions in a Generalized Prisoner's Dilemma

Peter S. Fader, John R. Hauser
1988 Journal of Conflict Resolution  
Of course, there is a limit to magnanimity; too high a coalition action allows an algorithm to be exploited.  ...  Our new strategy, named CEAVG3 (for coalition encourager, based on the average of all 3 coalition actions), is still a COALENC strategy; S og3~~~- Although the coalition actions and payoffs for the new  ... 
doi:10.1177/0022002788032003008 fatcat:2jt547rrjffuzml224hr7qkofq

Coalitional Games in MISO Interference Channels: Epsilon-Core and Coalition Structure Stable Set

Rami Mochaourab, Eduard A. Jorswieck
2014 IEEE Transactions on Signal Processing  
The ϵ-core is a solution concept for coalitional games which takes into account the overhead required in coalition deviation.  ...  We provide necessary and sufficient conditions for the strong and weak ϵ-core of our coalitional game not to be empty with zero forcing transmission.  ...  Algorithm 2 provides a structured method to find a possible mergings between coalitions by exploiting the algorithm in [43, Section 4.4] .  ... 
doi:10.1109/tsp.2014.2367466 fatcat:ea3qbm2jgvcr3mssujwck45aom

Emergent Reciprocity and Team Formation from Randomized Uncertain Social Preferences [article]

Bowen Baker
2020 arXiv   pre-print
In this work, we show evidence of emergent direct reciprocity, indirect reciprocity and reputation, and team formation when training agents with randomized uncertain social preferences (RUSP), a novel  ...  There has been much prior work in cooperative game theory on coalition formation (31) such as how to divide rewards within a coalition, (32, 33, 34) how to find coalitions in cooperative graphs, (  ...  We find that RUSP agents are indeed reciprocal and will punish players for defecting against them.  ... 
arXiv:2011.05373v1 fatcat:s2vlosrsz5hzlomxt4o5bzcvca

Improving Macrocell - Small Cell Coexistence through Adaptive Interference Draining [article]

Francesco Pantisano, Mehdi Bennis, Walid Saad, Merouane Debbah, Matti Latva-aho
2012 arXiv   pre-print
experiences the best channel and interference conditions.  ...  At the macrocell side, we consider a modified water-filling policy for the power allocation that allows each macrocell user (MUE) to focus the transmissions on the degrees of freedom over which the MUE  ...  The coalition formation becomes even more preferable when the SBSs can exploit the frequency dimension as it extends the limitation of condition (5).  ... 
arXiv:1212.3170v1 fatcat:sdo34wu6j5dxdhc3nt4jzghxwi

Partner selection for decode-and-forward cooperative relaying: A matching theoretic approach

Cengis Hasan, Eitan Altman, Jean-Marie Gorce
2013 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)  
Each agent aims here at finding a "good" partner in order to exploit efficiently the spatial diversity achieved with cooperation.  ...  We adapt Irving's algorithm [3] for determining the partners of each player.  ...  Each agent aims here at finding a "good" partner in order to exploit efficiently the spatial diversity achieved with cooperation. This process can be identified as a matching problem.  ... 
doi:10.1109/pimrc.2013.6666523 dblp:conf/pimrc/HasanAG13 fatcat:tq4p3pph3bb4fgiim2jvsdozse

Emergent Management Morality: Explaining Corporate Corruption

William C. Frederick
2003 Emergence  
and committed to expansive growth and gain created an environment of unparalleled opportunity for executive exploitation.  ...  A company's moral posture is established where its diverse attractors, as proxies for core values, intersect with the algorithmic impulses of the firm's dominant managerial coalition.  ... 
doi:10.1207/s15327000em0501_04 fatcat:hcdijjnjhzbwxk5rotoesmy4bu

Improving Macrocell-Small Cell Coexistence Through Adaptive Interference Draining

Francesco Pantisano, Mehdi Bennis, Walid Saad, Merouane Debbah, Matti Latva-aho
2014 IEEE Transactions on Wireless Communications  
experiences the best channel and interference conditions.  ...  a network with 150 MUEs and 200 SBSs.  ...  The coalition formation becomes even more preferable when the SBSs can exploit the frequency dimension as it extends the limitation of condition (5).  ... 
doi:10.1109/twc.2013.120613.130617 fatcat:q75dfieiwzekrianisijoryd6a

Breaking the Dynamics of Emotions and Fear in Conflict and Reconstruction

Urs Luterbacher, Carmen Sandi
2014 Peace Economics, Peace Science and Public Policy  
This paper is all about the construction of a new analytical framework to understand conflict and cooperation both at the international and at the domestic level with the aim of then finding mechanisms  ...  Thus we have here developed an Article note: The research presented here was supported through a grant from SNIS the Swiss Network for International Studies.  ...  Since we are again witnessing a deterioration of these conditions especially in South Sudan, it is not surprising that now this new country in in turn torn apart by a civil war.  ... 
doi:10.1515/peps-2014-0015 fatcat:fqc4td5y3zedflrtr5y36tcz5y

Incentive Mechanisms in P2P Media Streaming Systems

Xiao Su, Suchreet Dhaliwal
2011 IEEE Internet Computing  
Using a P2P network reduces the load on servers by exploiting bandwidths from participating peers.  ...  In live streaming, a user views a live event broadcasted in real time, for instance, watching President Obamas swearing-in ceremony while it was occurring.  ...  Similar to tit-for-tat schemes, it takes time for reputation to be established for new peers. An initial grace period is granted for new peers that can be exploited to free ride the system.  ... 
doi:10.1109/mic.2010.105 fatcat:44ea37vn3rebxmkfslh2zdi7z4

Trust dynamics in multi-agent coalition formation

Dariusz G. Mikulski, Frank L. Lewis, Edward Y. Gu, Greg R. Hudas, Douglas W. Gage, Charles M. Shoemaker, Robert E. Karlsen, Grant R. Gerhart
2011 Unmanned Systems Technology XIII  
We present a rigorous treatment of coalition formation based on trust interactions in multi-agent systems.  ...  We rigorously justify the behaviors of agents for different classes of games, and discuss ways to exploit the formal properties of these games for specific applications, such as unmanned cooperative control  ...  Using (32) and our definitions in (40) and (41) , the trust payoff values for a coalition in the convoy trust game is:  ... 
doi:10.1117/12.883333 fatcat:l2xyidp6uzb4bi3c4gvznupwlu

Multi-Beam NOMA for Hybrid mmWave Systems [article]

Zhiqiang Wei and Lou Zhao and Jiajia Guo and Derrick Wing Kwan Ng and Jinhong Yuan
2018 arXiv   pre-print
In the first stage, assuming that only analog beamforming is available, a user grouping and antenna allocation algorithm is proposed to maximize the conditional system sum-rate based on the coalition formation  ...  This provides a higher flexibility for applying NOMA in mmWave communications and thus can efficiently exploit the potential multi-user diversity.  ...  In this paper, we assume the use of time division duplex (TDD) and exploit the channel reciprocity, i.e., the estimated effective channel in the uplink can be used for digital precoder design in the downlink  ... 
arXiv:1806.04919v1 fatcat:jukinpmi5vbp7piqvs43y55v7m
« Previous Showing results 1 — 15 out of 1,801 results