排序方式: 共有43条查询结果,搜索用时 15 毫秒
21.
22.
How is collective defence by players affected when they face a threat from an intelligent attacker rather than a natural threat? This paper analyses this question using a game-theoretic model. Facing an intelligent attacker has an effect if players move first and visibly set their defence strategies, thereby exposing any players who do not defend, and if the attacker is, moreover, not able to commit to a random attack. Depending on the parameters of the game, the presence of an intelligent attacker either increases the probability that players jointly defend (where such joint defence either does or does not constitute a utilitarian optimum), or decreases the probability that players jointly defend (even though joint defence is a utilitarian optimum). 相似文献
23.
This article introduces maximum cooperative purchasing (MCP)‐situations, a new class of cooperative purchasing situations. Next, an explicit alternative mathematical characterization of the nucleolus of cooperative games is provided. The allocation of possible cost savings in MCP‐situations, in which the unit price depends on the largest order quantity within a group of players, is analyzed by defining corresponding cooperative MCP‐games. We show that a decreasing unit price is a sufficient condition for a nonempty core: there is a set of marginal vectors that belong to the core. The nucleolus of an MCP‐game can be derived in polynomial time from one of these marginal vectors. To show this result, we use the new mathematical characterization for the nucleolus for cooperative games. Using the decomposition of an MCP‐game into unanimity games, we find an explicit expression for the Shapley value. Finally, the behavior of the solution concepts is compared numerically. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 607–624, 2013 相似文献
24.
We look at the different ways of aggregating the exports of dual use products to give the security perception of exporter countries and their consistency with the relevant export control regimes. Also, we analyze different models of export controls highlighting the role of the perception of security, market structure and competition between exporting firms in determining the existence of multiple equilibria and therefore, the need for coordination between countries in setting export controls. 相似文献
25.
26.
目的:探讨不同游戏方式下的暴力网络游戏对不同攻击性特质大学生攻击性的影响。方法:采用攻击性特质问卷、词汇决策任务和竞争反应时任务对60名大学生进行问卷和实验研究。结果:在不同游戏方式下,被试表现出的攻击性认知和行为存在显著差异(F(2,52)=4.41,P<0.05;F(1,52)=50.06,P<0.001)。高、低攻击性特质者在游戏后的攻击性认知和行为上存在显著差异(F(1,52)=15.25,P<0.001;F(1,52)=82.35,P<0.001)。结论:不同游戏方式下的暴力网络游戏对大学生的攻击性存在不同的影响,相比竞争游戏和单人游戏,合作游戏是一种较好的游戏方式,可以在一定程度减少大学生,特别是高攻击性特质大学生的攻击性认知和行为。此外,暴力网络游戏对大学生攻击性认知和攻击性行为的影响存在一致性。 相似文献
27.
沙基昌 《国防科技大学学报》1993,15(3):133-139
本文利用微分对策方法研究了单兵种对多兵种作战时的最优火力分配原则,指出了应首先集中力量攻击敌方交战强度最大的一类作战单位。本文还说明了多兵种对多兵种作战时类似的问题的重要性和困难所在。 相似文献
28.
We analyze an interdiction scenario where an interceptor attempts to catch an intruder as the intruder moves through the area of interest. A motivating example is the detection and interdiction of drug smuggling vessels in the Eastern Pacific and Caribbean. We study two models in this article. The first considers a nonstrategic target that moves through the area without taking evasive action to avoid the interdictor. We determine the optimal location the interceptor should position itself to best respond when a target arrives. The second model analyzes the strategic interaction between the interceptor and intruder using a Blotto approach. The intruder chooses a route to travel on and the interceptor chooses a route to patrol. We model the interaction as a two‐player game with a bilinear payoff function. We compute the optimal strategy for both players and examine several extensions. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 29–40, 2017 相似文献
29.
两人多冲突环境下的双矩阵对策集结模型 总被引:3,自引:1,他引:2
针对用多个双矩阵对策来描述的两人多冲突环境,首先基于局中人所受到的约束条件,构造局中人面向多冲突环境的可行策略串集合;其次以所有局中人的可行策略串集合建立新的结局空间,构造局中人在新结局空间上的支付函数,进而建立两人多冲突环境下的对策综合集结模型;最后给出了一个军事例子,该算例说明了模型的实用性. 相似文献
30.
Corine M. Laan Ana Isabel Barros Richard J. Boucherie Herman Monsuur Judith Timmer 《海军后勤学研究》2019,66(2):174-190
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results. 相似文献