Compute the subgame perfect nash equilibriua in given game

Assignment Help Data Structure & Algorithms
Reference no: EM13864312

1. In the game below, find all subgame-perfect Nash equilibria (there are two). Identify the path through the tree that each one represents, and the utilities of each player. Does the game have any Nash equilibria that are not subgame perfect?

457_Game.png

2. Compute the subgame perfect Nash equilibriua in the game below.

1754_Game1.png

3. Alice and Bob own a dollar, which they need to share in order to consume. Alice makes an offer x ∈ X = {0.01, 0.02,..., 0.98, 0.99}; and observing the offer, Bob accepts it or rejects it. If Bob accepts the offer, Alice gets 1-x and Bob gets x. If he rejects, then each gets 0.

(a) Compute all the subgame-perfect equilibria in pure strategies.

(b) Now suppose that their cousin Carol sells a contract for $0.01. The contract requires that Bob is to pay 1 dollar to Carol if Bob accepts an offer x that is less than X', where x'∈ X is chosen by Bob at the time of purchase of the contract. In particular, consider the following time-line:

• Bob decides whether to buy a contract from Carol and determines x' if he chooses to buy;

• Alice observes Bob's decision (i.e. whether he buys the contract and x' if he buys);

• Then, they play the bargaining game above, where Bob pays Carol 1 dollar if he accepts an offer x < x'.

Find all the subgame-perfect equilibria in pure strategies.

Reference no: EM13864312

Questions Cloud

Implementing and supporting heterogeneous networks : It is very common for corporations to support many types of network operating systems (NOSs). The most popular ones used are by Novell, Microsoft, Unix, Linux and Apple Macintosh. Explain in detail some major considerations and challenges when implem..
Provide a summary of each article : In a 3- to 4-page paper, address the following points: Provide a summary of each article. Compare and contrast the strengths and weaknesses of each article
Provide a final set of documentation : Provide a final set of documentation that includes a fully updated list of all services installed and describes all the standards that have been implemented on their systems. (This should essentially be an updated version of Lab #3 incorporating all ..
Maximize the selectivity for product : The following sequences of reactions are to occur in a constant density reactor. Which type of continues flow-reactor would be best to maximize the selectivity for product C?
Compute the subgame perfect nash equilibriua in given game : Compute the subgame perfect Nash equilibriua in the game below. Identify the path through the tree that each one represents, and the utilities of each player.
Percentage completion on profit-weighted-average method : Gary Stevens and Mary James are production managers in the Consumer Electronics Division of General Electronics Company, which has several dozen plants scattered in locations throughout the world. What percentage completion would result in increasing..
Control of occupational hazards : A specific hazard is identified for each workplace scenario. Identify one specific example of a control measure for each of the category of control strategy being asked
Activity driver for each activity cost category : Calculate the cost per unit of activity driver for each activity cost category. Calculate the cost of Job 845 using ABC to assign the overhead costs. Calculate the cost of Job 845 using the plant wide overhead rate based on machine hours calculated i..
Forrest is given task of supervising their initial operation : Forrest is the regional manager for a national chain of car rentals and is based in Washington, North Carolina. When the company opens new stores in Charlotte, Forrest is given the task of supervising their initial operation.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Two phase routing algorithm

Two Phase Routing Algorithm: use the analysis of the first phase to give a full analysis (no "symmetry" argument) of the second phase.

  Evaluate the reliability of the data mining algorithms

the development of complex algorithms that can mine mounds of data that have been collected from people and digital

  Design algorithm to solve spectral assembly problem

Design an algorithm to solve the Spectral Assembly problem under the above conditions. Does the problem have a unique solution?

  Data structure using an array

Objective will be to construct your first list data structure using an array.

  Creating application - two dimensional array

Make an application that either sums or averages rows or columns of a 2-dimensional array depending on user choices.

  Explain spacewise efficient implementation two-stack data

Structure of such two-stack data type would consist of two arrays and two top pointers. Describe why this may not be a spacewise efficient implementation.

  Give time algorithm that outputs satisfying assignment

Find out  whether there is an assignment of true/false values to the literals such that at least a*m clauses will be true. Note that 3-SAT(1) is exactly the 3-SAT problem. Give an O(m*n)-time algorithm that outputs a satisfying assignment for 3-S..

  Complete binary tree

Think about an n-node complete binary tree T, where n=2^d - 1 for some d. Each node v of T is labeled with a real number x_v.

  What is the time complexity

Design an algorithm for finding the closest two numbers in the input list - What is the time complexity? Is it probable to improve the algorithm if the input is a sorted list?

  Design algorithm that plans your optimal investment strategy

Prove that the problem of planning your optimal investment strategy exhibits optimal substructure and design an algorithm that plans your optimal investment strategy. what is the running time of your algorithm?

  Construct minimal avl trees of height

Construct minimal AVL trees of height 0, 1, 2, 3, and 4. you do not need to fill in the values, just draw the structure of the tree. Tip: Use the recursive definition for the number of nodes in a minimal AVL tree.

  Question about key encryption

Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, Alice has Bob's certificate. But Alice does not have a public, private key pair.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd