×

Game theory in solving conflicts on local government level. (English) Zbl 1458.91179

Summary: Game theory is often used while making decisions in situations of conflicted interests. This research studies practical application of game theory with emphasis on applying linear programming, i.e. simplex algorithm while solving problems in game theory domain. Different cases of game theory application in various scientific disciplines went through theoretical analysis. After the analysis was conducted, this paper presented a practical example of solving a situation of conflict on local government level and the efficiency of game theory while making decision.

MSC:

91F10 History, political science
91B06 Decision theory
91A80 Applications of game theory
90C05 Linear programming
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Austen-Smith, D. and Banks, J. S. (1998). Social choice theory, game theory and positive political theory.Annual Review of Political Science, 1(1), 259-287.doi: 10.1146/annurev.polisci.1.1.259
[2] Barkovi´c Bojani´c, I. and Ereˇs, M. (2013). Teorija igara i pravo.Pravni vjesnik: ˇcasopis za pravne i druˇstvene znanosti Pravnog fakulteta Sveuˇciliˇsta J.J. Strossmayera u Osijeku, 29(1), 59-76.https: //hrcak.srce.hr/111004
[3] Bedi, H., Shiva, S. and Roy, S. (2014). A game inspired defense mechanism against distributed denial of service attacks.Security and Communication Networks, 7(12), 2389-2404.doi: 10.1002/sec.949
[4] Brki´c, L. (2002). Temeljni concept i teorije igara u med¯unarodnoj ekonomiji.Politiˇcka misao: ˇcasopis za politologiju, 39(3), 75-87.https://hrcak.srce.hr/23676
[5] Cardellini, V., Di Valerio, V. and Lo Presti, F. (2020). Game-theoretic resource pricing and provisioning strategies in cloud systems.IEEE Transactions on Services Computing, 13(1), 86-98. doi: 10.1109/tsc.2016.2633266
[6] Charilas, D. E. and Panagopoulos, A. D. (2010). A survey on game theory applications in wireless networks.Computer Networks, 54(18), 3421-3430.doi: 10.1016/j.comnet.2010.06.020 · Zbl 1213.68076
[7] Dobreni´c, S. (1978). Operativno istraˇzivanje. Varaˇzdin: Viˇsa ekonomska ˇskola.
[8] Duki´c, G., Turkalj, D. and Sesar, M. (2008). Sustav podrˇske marketing-odluˇcivanju baziran na teoriji igara.Ekonomski vjesnik: Review of Contemporary Entrepreneurship, Business and Economic Issues, 21(1-2), 75-81.https://hrcak.srce.hr/42718
[9] Ficco, M., Esposito, C., Palmieri, F. and Castiglione, A. (2018). A coral-reefs and game theory– based approach for optimizing elastic cloud resource allocation.Future Generation Computer Systems, 78(1), 343-352.doi: 10.1016/j.future.2016.05.025
[10] Fricker, R. D. (2006).Game theory in an age of terrorism: How can statisticians contribute?In Wilson, A. G., Wilson, G. D. and Olwell, D. H. (Eds.), Statistical Methods in Counterterrorism (pp. 3-7). New York: Springer.doi: 10.1007/0-387-35209-0 1
[11] Ghani, N., Hedges, J., Winschel, V. and Zahn, P. (2018). Compositional game theory.Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, 472-481.doi: 10.1145/3209108.3209165 · Zbl 1452.91016
[12] Kalpi´c, D. and Mornar, V. (1996).Operacijska istraˇzivanja. Zagreb: Zeus.
[13] Kapor, P. (2017). Teorija igara: sistemski pristup i razvoj.Megatrend Review, 14(1), 153-282. https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2017/1820-31591701253K.pdf
[14] Kopal, R. and Korkut, D. (2011).Teorija igara-praktiˇcna primjena u poslovanju. Zagreb: Lider Press d.d.
[15] Kopal, R., and Korkut, D. (2016).Uvod u teoriju igara. Zagreb: Visokouˇciliˇste Effectus-visoka ˇskola za financije i pravo.
[16] Kreko, B. (1966).Linearno programiranje. Beograd: Savremena administracija.
[17] K¨unsem¨oller, J. and Karl, H. (2012).A game-theoretical approach to the benefits of cloud computing. In Vanmechelen, K., Altmann, J. and Rana, F. R. (Eds.), Economics of Grids, Clouds, Systems and Services (pp. 148-160). Berlin: Sringer.doi: 10.1007/978-3-642-28675-9 11
[18] Lemaire, J. (1984). An Application of Game Theory: Cost Allocation.ASTIN Bulletin, 14(1), 61-81.doi: 10.1017/s0515036100004815
[19] Liang, X. and Xiao, Y. (2013). Game Theory for Network Security.IEEE Communications Surveys and Tutorials, 15(1), 472-486.doi: 10.1109/surv.2012.062612.00056
[20] Nerali´c, L. (2003).Uvod u matematiˇcko programiranje 1. Zagreb: Element.
[21] Paˇsagi´c ˇSkrinjar, J., Abramovi´c, B. and Brnjac, N. (2015). The use of game theory in urban transport planning.Tehniˇcki Vijesnik-Technical Gazette, 22(6), 1617-1621.doi: 10.17559/tv20140108101820
[22] Petri´c, J. (1979).Operaciona istraˇzivanja(5. izdanje). Beograd: Savremena administracija.
[23] Poisel, R., Rybnicek, M. and Tjoa, S. (2013). Game-based simulation of Distributed Denial of Service (DDoS) attack and defense mechanisms of Critical Infrastructures.IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 114-120.doi: 10.1109/aina.2013.66
[24] Rolji´c, L. (2017). Reafirmacija praktiˇcne primjenjivosti teorije igara.Primus Global: nauˇcno struˇcni ˇcasopis, 3(1).
[25] Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V. and Wu, Q. (2010). A survey of game theory as applied to network security.IEEE 43rd Hawaii International Conference on System Sciences, 1-10.doi: 10.1109/hicss.2010.35
[26] Shi, B., Huang, Y., Wang, J. and Xiong, S. (2016). A game-theoretic analysis of pricing strategies for competing cloud platforms.IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), 653-660.doi: 10.1109/icpads.2016.0091
[27] Wang, Y., Wang, Y., Liu, J., Huang, Z. and Xie, P. (2016). A survey of game theoretic methods for cyber security.IEEE First International Conference on Data Science in Cyberspace (DSC), 631-636.doi: 10.1109/dsc.2016.90
[28] Yan, G., Lee, R., Kent, A. and Wolpert, D. (2012). Towards a bayesian network game framework for evaluating DDoS attacks and defense.Proceedings of the 2012 ACM Conference on Computer and Communications Security, 553-566.doi: 10.1145/2382196.2382255
[29] Yuan, X.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.