Transforming Monitoring Structures with Resilient Encoders—Application to Repeated Games

An important feature of a dynamic game is its monitoring structure namely, what the players effectively see from the played actions. We consider games with arbitrary monitoring structures. One of the purposes of this paper is to know to what extent an encoder, who perfectly observes the played actions and sends a complementary public signal to the players, can establish perfect monitoring for all the players. To reach this goal, the main technical problem to be solved at the encoder is to design a source encoder which compresses the action profile in the most concise manner possible. A special feature of this encoder is that the multi-dimensional signal (namely, the action profiles) to be encoded is assumed to comprise a component whose probability distribution is not known to the encoder and the decoder has a side information (the private signals received by the players when the encoder is off). This new framework appears to be both of game-theoretical and information-theoretical interest. In particular, it is useful for designing certain types of encoders that are resilient to single deviations and provide an equilibrium utility region in the proposed setting; it provides a new type of constraints to compress an information source (i.e., a random variable). Regarding the first aspect, we apply the derived result to the repeated prisoner’s dilemma.

[1]  Johannes Hörner,et al.  The folk theorem for games with private almost-perfect monitoring , 2005 .

[2]  S. Lasaulce,et al.  Closed loop transmit diversity enhancements for UMTS narrowband and wideband TD-CDMA , 2001, IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202).

[3]  Rudolf Ahlswede,et al.  Coloring hypergraphs: A new approach to multi-user source coding, 1 , 1979 .

[4]  Hiroki Koga,et al.  Information-Spectrum Methods in Information Theory , 2002 .

[5]  Sylvain Sorin,et al.  On Repeated Games with Complete Information , 1986, Math. Oper. Res..

[6]  Ron Peretz Correlation through bounded recall strategies , 2013, Int. J. Game Theory.

[7]  J. A. Bondy,et al.  Graph Theory with Applications , 1978 .

[8]  Tristan Tomala,et al.  General Properties of Long-Run Supergames , 2011, Dyn. Games Appl..

[9]  E. Lehrer Repeated Games with Stationary Bounded Recall Strategies , 1988 .

[10]  Samson Lasaulce,et al.  A Repeated Game Formulation of Energy-Efficient Decentralized Power Control , 2010, IEEE Transactions on Wireless Communications.

[11]  Edward C. van der Meulen,et al.  A proof of Marton's coding theorem for the discrete memoryless broadcast channel , 1981, IEEE Trans. Inf. Theory.

[12]  Tristan Tomala,et al.  Secret Correlation in Repeated Games with Imperfect Monitoring , 2007, Math. Oper. Res..

[13]  D. Fudenberg,et al.  Digitized by the Internet Archive in 2011 with Funding from Working Paper Department of Economics the Folk Theorem with Imperfect Public Information , 2022 .

[14]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[15]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[16]  R. Aumann Survey of Repeated Games , 1981 .

[17]  H. Peyton Young,et al.  Strategic Learning and Its Limits , 2004 .

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[20]  Frank Kowalewski,et al.  Joint predistortion and transmit diversity , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[21]  Claude E. Shannon,et al.  The zero error capacity of a noisy channel , 1956, IRE Trans. Inf. Theory.

[22]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[23]  Robert J. Aumann,et al.  Essays in game theory and mathematical economics in honor of Oskar Morgenstern , 1981 .

[24]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[25]  Abraham Neyman,et al.  Online Concealed Correlation by Boundedly Rational Players , 2003 .

[26]  H. S. WITSENHAUSEN,et al.  The zero-error side information problem and chromatic numbers (Corresp.) , 1976, IEEE Trans. Inf. Theory.

[27]  Samson Lasaulce,et al.  Resilient source coding , 2011, International Conference on NETwork Games, Control and Optimization (NetGCooP 2011).

[28]  Ehud Lehrer,et al.  Internal correlation in repeated games , 1991 .

[29]  Penélope Hernández,et al.  Optimal use of communication resources , 2006 .