Skip to main content

Computing Equilibria with Partial Commitment

  • Conference paper
  • First Online:
  • 886 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10123))

Abstract

In security games, the solution concept commonly used is that of a Stackelberg equilibrium where the defender gets to commit to a mixed strategy. The motivation for this is that the attacker can repeatedly observe the defender’s actions and learn her distribution over actions, before acting himself. If the actions were not observable, Nash (or perhaps correlated) equilibrium would arguably be a more natural solution concept. But what if some, but not all, aspects of the defender’s actions are observable? In this paper, we introduce solution concepts corresponding to this case, both with and without correlation. We study their basic properties, whether these solutions can be efficiently computed, and the impact of additional observability on the utility obtained.

I dedicate this paper to my sister Jessica, her fiancé Jeremy, and their upcoming full commitment. I wish them a lifetime of happiness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    As is commonly assumed in this model, ties for the column player are broken in the row player’s favor; if not, the row player can simply commit to \(1/2-\epsilon \) on a and \(1/2+\epsilon \) on b.

  2. 2.

    It is easy to get confused here—does the column player not learn more in a round purely by virtue of his own payoff from that round? It is important to remember that we are not considering repeated play by the column player. The idea is that the column player can observe over time the signals and how the row player acts before the column player ever acts. For discussion of security contexts in which certain types of players can receive messages that are inaccessible to other types, see Xu et al. [24].

  3. 3.

    This was verified to be optimal using the linear program in Fig. 1; same for the next case.

References

  1. An, B., Kempe, D., Kiekintveld, C., Shieh, E., Singh, S.P., Tambe, M., Vorobeychik, Y.: Security games with limited surveillance. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), Toronto, ON, Canada (2012)

    Google Scholar 

  2. An, B., Shieh, E., Tambe, M., Yang, R., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: PROTECT - a deployed game theoretic system for strategic security allocation for the United States Coast Guard. AI Mag. 33(4), 96–110 (2012)

    Google Scholar 

  3. Ashlagi, I., Monderer, D., Tennenholtz, M.: On the value of correlation. J. Artif. Intell. Res. 33, 575–613 (2008)

    MathSciNet  MATH  Google Scholar 

  4. Aumann, R.: Subjectivity and correlation in randomized strategies. J. Math. Econ. 1, 67–96 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  5. Balcan, M.F., Blum, A., Haghtalab, N., Procaccia, A.D.: Commitment without regrets: online learning in Stackelberg security games. In: Proceedings of the ACM Conference on Economics and Computation (EC), Portland, OR, USA, pp. 61–78 (2015)

    Google Scholar 

  6. Chen, X., Deng, X., Teng, S.H.: Settling the complexity of computing two-player Nash equilibria. J. ACM 56(3), 14 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  7. Conitzer, V., Korzhyk, D.: Commitment to correlated strategies. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), San Francisco, CA, USA, pp. 632–637 (2011)

    Google Scholar 

  8. Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the ACM Conference on Electronic Commerce (EC), Ann Arbor, MI, USA, pp. 82–90 (2006)

    Google Scholar 

  9. Conitzer, V., Sandholm, T.: New complexity results about Nash equilibria. Games Econ. Behav. 63(2), 621–641 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  10. Daskalakis, C., Goldberg, P., Papadimitriou, C.H.: The complexity of computing a Nash equilibrium. SIAM J. Comput. 39(1), 195–259 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. Fang, F., Nguyen, T.H., Pickles, R., Lam, W.Y., Clements, G.R., An, B., Singh, A., Tambe, M., Lemieux, A.: Deploying PAWS: field optimization of the protection assistant for wildlife security. In: Proceedings of the Twenty-Eighth Innovative Applications of Artificial Intelligence Conference (IAAI), Phoenix, AZ, USA (2016)

    Google Scholar 

  12. Fudenberg, D., Levine, D.: The Theory of Learning in Games. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

  13. Gilboa, I., Zemel, E.: Nash and correlated equilibria: some complexity considerations. Games Econ. Behav. 1, 80–93 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  14. Korzhyk, D., Conitzer, V., Parr, R.: Solving Stackelberg games with uncertain observability. In: Proceedings of the Tenth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Taipei, Taiwan, pp. 1013–1020 (2011)

    Google Scholar 

  15. Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41(2), 297–327 (2011)

    MathSciNet  MATH  Google Scholar 

  16. Letchford, J., Conitzer, V., Munagala, K.: Learning and approximating the optimal strategy to commit to. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) SAGT 2009. LNCS, vol. 5814, pp. 250–262. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04645-2_23

    Chapter  Google Scholar 

  17. Letchford, J., Korzhyk, D., Conitzer, V.: On the value of commitment. Auton. Agent. Multi-Agent Syst. 28(6), 986–1016 (2014)

    Article  Google Scholar 

  18. Letchford, J., MacDermed, L., Conitzer, V., Parr, R., Isbell, C.: Computing optimal strategies to commit to in stochastic games. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), Toronto, ON, Canada, pp. 1380–1386 (2012)

    Google Scholar 

  19. Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S.: Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition. Artif. Intell. 174(15), 1142–1171 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  20. Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordóñez, F., Kraus, S., Parachuri, P.: Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport. In: Proceedings of the Seventh International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Estoril, Portugal, pp. 125–132 (2008)

    Google Scholar 

  21. Sandholm, T.: The state of solving large incomplete-information games, and application to poker. AI Mag. 31(4), 13–32 (2010). Special Issue on Algorithmic Game Theory

    Google Scholar 

  22. Tsai, J., Rathi, S., Kiekintveld, C., Ordóñez, F., Tambe, M.: IRIS - a tool for strategic security allocation in transportation networks. In: Proceedings of the Eighth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Budapest, Hungary, pp. 37–44 (2009)

    Google Scholar 

  23. von Stengel, B., Zamir, S.: Leadership games with convex strategy sets. Games Econ. Behav. 69, 446–457 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  24. Xu, H., Freeman, R., Conitzer, V., Dughmi, S., Tambe, M.: Signaling in Bayesian Stackelberg games. In: Proceedings of the Fifteenth International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Singapore, pp. 150–158 (2016)

    Google Scholar 

  25. Yin, Z., Jiang, A.X., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.P.: TRUSTS: scheduling randomized patrols for fare inspection in transit systems using game theory. AI Mag. 33(4), 59–72 (2012)

    Google Scholar 

Download references

Acknowledgments

I am thankful for support from ARO under grants W911NF-12-1-0550 and W911NF-11-1-0332, NSF under awards IIS-1527434, IIS-0953756, CCF-1101659, and CCF-1337215, and a Guggenheim Fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vincent Conitzer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag GmbH Germany

About this paper

Cite this paper

Conitzer, V. (2016). Computing Equilibria with Partial Commitment. In: Cai, Y., Vetta, A. (eds) Web and Internet Economics. WINE 2016. Lecture Notes in Computer Science(), vol 10123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54110-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54110-4_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54109-8

  • Online ISBN: 978-3-662-54110-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics