Private and Third-Party Randomization in Risk-Sensitive Equilibrium Concepts

نویسندگان

  • Mickey Brautbar
  • Michael Kearns
  • Umar Syed
چکیده

We consider risk-sensitive generalizations of Nash and correlated equilibria in noncooperative games. We prove that, except for a class of degenerate games, unless a two-player game has a pure Nash equilibrium, it does not have a risksensitive Nash equilibrium. We also show that every game has a risk-sensitive correlated equilibrium. The striking contrast between these existence results is due to the different sources of randomization in Nash (private randomization) and correlated equilibria (third-party randomization).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Testing for Asymmetric Information in Automobile Insurance Market an Iranian Insurance Company

The presence of asymmetric information is an important source of efficiency loss for insurance companies and could reduce profitability. In this paper, we test the conditional independence of coverage choice and risk, where “conditional” means conditional on all variables observed by the insurer. We use two parametric methods: a pair of probits and a bivariate probit model. The data includes al...

متن کامل

Improving security for data migration in cloud computing using randomized encryption technique

With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. In this paper, I proposed an encryption technique in cloud comput...

متن کامل

Contracts for a Third-party Beneficiary: a Brief Sketch from the Corpus Iuris to Present-day Civil Law

Contemporary jurisdictions of continental Europe are familiar with the legal concepts of a contract in favour of a third-party beneficiary who is not present when the contract is entered into as well as the right of this third party to enforce such a contract. However, these concepts are not easily compatible with the principles of Roman private law. The Swiss Legislation on Obligations (Schwei...

متن کامل

Privacy-Preserving Data Mining

Privacy-preserving data mining (PPDM) refers to the area of data mining that seeks to safeguard sensitive information from unsolicited or unsanctioned disclosure. Most traditional data mining techniques analyze and model the data set statistically, in aggregation, while privacy preservation is primarily concerned with protecting against disclosure individual data records. This domain separation...

متن کامل

The Integrated Supply Chain of After-sales Services Model: A Multi-objective Scatter Search Optimization Approach

Abstract: In recent decades, high profits of extended warranty have caused that third-party firms consider it as a lucrative after-sales service. However, customers division in terms of risk aversion and effect of offering extended warranty on manufacturers’ basic warranty should be investigated through adjusting such services. Since risk-averse customers welcome extended warranty, while the cu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010