• Tidak ada hasil yang ditemukan

Games &Computers.ppt 2564KB Jun 23 2011 12:12:22 PM

N/A
N/A
Protected

Academic year: 2017

Membagikan "Games &Computers.ppt 2564KB Jun 23 2011 12:12:22 PM"

Copied!
27
0
0

Teks penuh

(1)

Games Computers

(

and Computer Scientists

)

Play

(2)

Games Computer

Science

Game Theory

=

Information Processing by

Computers Agents

• Competing • Cooperating • Faulty

• Colluding • Secretive • Adversarial

(3)

Plan

• Complexity of Games

• Implementation of Games

• Design of Games

(4)
(5)

Theorem

[Zermelo]

: In every finite

win/lose perfect information

2-player game, White or Black can

force a win.

Extensive Form

(6)

Rectangle Game

m

n m=4

n=5 1

2

3

Theorem

: White has a winning strategy

.

Proof: Assume Black has a winning strategy .

Then White can mimic it and win. Contradiction !

Question: What is the winning strategy?

4

5

(7)

Zero-Sum Games

Matching Pennies

(simultaneous play) 1 -11 1

-1

1 1 -1

H

H T

T

Strategic Form

“Best” strategy for each player is to flip a fair coin. Game value is 0.

1

1 2

2

m

n

vij -vij i

j

Theorem

[von Neumann ‘28

]

:

Every 0-sum game has a

(

Min-Max)

value

.

Question: Can the value,

strategies be computed?

Theorem

[Khachian ‘80

]

:

(8)

Nash Equilibrium

Chicken

[Aumann]

1 1 0 2 0

2 -3 -3 C

C D

D

Strategic Form

Probabilistic strategies (Sw, Sb).

Nash Equilibrium: No player has an incentive to

change its strategy given the opponent’s strategy .

here Sw=Sb = [C with prob ¾, D with prob

¼[

Theorem [Nash]: Every (matrix) game has an equilibrium .

Question: Can the players compute (any) equilibrium?

Best known algorithm: exponential time (infeasible

(9)
(10)

The Millionaires’ Problem

Alice

Bob

B A

Both want to know who is richer

Neither gets any other information

(11)

Joint random decisions

1 1 0 2 0

2 -3 -3

C D

C

D

Nash eq. With Independent Strategies

Nash eq. With Correlated Strategies [Aumann]

3/4

1/4

3/4 1/4

Expected value = 3/4

Prob[CC[ = 9/16 Prob[CD[ = 3/16 Prob[DC[ = 3/16 Prob[DD[ = 1/16

Prob[CD[ = 1/2 Prob[DC[ = 1/2 Prob[CC[ = 0 Prob[DD[ = 0

Expected value = 1

(12)

Simultaneity

1 -11 1

-1

1 1 -1

H T H T 1/2 1/2 1/2 1/2

Expected value = 0

( if they play simultaneously )

Question: How do we guarantee simultaneity?

xW xB

A computational representation:

outcome

Parity Function xW xB Parity(xW, xB )

0 0 0

1 1 0

0 1 1

1 0 1

(13)

Privacy vs. Resilience

Q

1

: How to guarantee x

1

5?

Q

2

: How to guarantee x

1

remains private?

Majority Function

x1 x3

x1 x2 x3 Majority(x1, x2, x3)

0 0 0 0

0 0 1 0

0 1 0 0

1 0 0 0

0 1 1 1

1 0 1 1

1 1 0 1

1 1 1 1

• Voting

M

x2

• Millionaire’s Problem

• Poker

(14)

Completeness Theorem

Every game,

with any secrecy requirements, can be digitally implemented

s.t. no collusion of the bad players can affect:

* correctness (rules, outcome)

* privacy (no information leaks)

Theorem [Yao, Goldreich –Micali –Wigderson[: 1. More than 1/2 of the players are honest 2. Players computationally bounded

3. Trap-door functions exist (e.g. factoring integers is hard)

(15)

Correct & Private digital implementation

Secrets Preferences

Strategies

Trusted party

Ideal implementation

1 2 n

s1 s2 sn

Internet

Internet

(16)

How to ensure Privacy

Oblivious Computation [Yao[

1 0 0 1 0 1 0

1 1 0

1 0

1

f(inputs)

P M P

M P

P

(17)

How to ensure Correctness

Definition [Goldwasser-Micali-Rackof[:

zero-knowledge proofs:

• Convincing

• Reveal no information

Theorem [Goldreich-Micali-Wigderson[:

Every provable mathematical statement has a zero-knowledge proof.

(18)
(19)
(20)

How to minimze players’ influence

Public Information Model [Ben-Or—Linial] : Joint random coin flipping

Every good player flips, then combine

Function Influence

Parity 1

Majority 1/7

P

parit

y M

majorit y

M M M

M Iterated

Majority 1/8

Theorem [Kahn—Kalai—Linial] : For every function, some player has non-proportional influence.

(21)

How to achieve cooperation, efficiency, truthfulness

Players (agents) are selfish

• Auction

Question: How to get players to bid their true values?

Theorem [ClarkeGroves—Vickery[: 2nd price auction achieves truthfulness.

• Internet Games

Question: How to get players to cooperate?

[Nisan[: Distributed algorithmic mechanism design.

[Papadimitriou[: Algorithms, Games & the Internet

New CS Issues: Pricing, incentives

(22)

Coping with Uncertainty

(23)

On-line Problems

Investor’s Problem (One-way trading)

day price

1 2 3 4 5 6 7 8 9

Profit/loss Muggle’s

action

(24)

On-line problems are everywhere:

• Computer operating systems

• Taxi dispatchers

• Investors’ decisions

• Battle decisions

(25)

Competitive Analysis [Tarjan—Slator[: For every sequence of events,

Bound the competitive ratio:

muggle-cost(sequence) wizard-cost(sequence)

Can be achieved in many settings. Huge, successful theory.

“Online Computation and Competitive Analysis”

(26)

... ...

Nature

... ...

Alice

Nature

...

Alice

Bob

Information Sets

Player’s action depends

only on its information set

Every Game? Any secrecy requirements?

(27)

Completeness Theorems

Every game, with any secrecy requirements, can be

digitally implemented s.t. no collusion of the bad players can affect:

* correctness (rules, outcome)

* privacy (no information leaks)

Theorem [Yao, Goldreich –Micali –Wigderson[: 1. More than 1/2 are honest

2. Players computationally bounded

3. Trap-door functions exist (e.g. factoring integers is hard)

Theorem [Ben-Or –Goldwasser –Wigderson[: 1’.

Referensi

Dokumen terkait

 Computer science is the study of algorithms  An algorithm is a well-ordered collection of. unambiguous and

operating system comparable to traditional and usually more expensive operating system comparable to traditional and usually more expensive UNIX systems. It has a reputation as a

• Performs top-down admissible search of the subsumption lattice above this example. • Use of compression function to limit size of clauses and number of

o Director and Lecturer, Computer Forensics and e- Discovery, Humanities Advanced Technology and Information Institute, University of Glasgow.. o

• Examine ways of changing instructional design in Computer Supported Collaborative Learning Environments in Higher Education so as authentic assessment to be part of

sicurezza delle informazioni contrastando gli attacchi mediante uno o più

possible—software that uses text, graphics, animation, video, music, voice, and sound effects to communicate.  Regardless of the hardware, interactive

For font attractiveness, Comic was perceived as being more attractive than Arial and Courier , while Styled and Impact were perceived as more attractive than