Computing the Optimal Game

In many multiagent environments, a designer has some, but limited control over the game being played. In this paper, we formalize this by considering incompletely specified games, in which some entries of the payoff matrices can be chosen from a specified set. We show that it is NP-hard for the designer to decide whether she can make her choices so that no action in a given set gets played in equilibrium. Hardness holds even in zero-sum games and even in weak tournament games (which are symmetric zero-sum games whose entries are all −1, 0, or 1). The latter case is closely related to the necessary winner problem for a social-choice-theoretic solution concept. We then give a mixed-integer linear programming formulation for weak tournament games and evaluate it experimentally.

[1]  J. Harsanyi Oddness of the number of equilibrium points: A new proof , 1973 .

[2]  Eitan Zemel,et al.  Nash and correlated equilibria: Some complexity considerations , 1989 .

[3]  M. Breton,et al.  The Bipartisan Set of a Tournament Game , 1993 .

[4]  Bhaskar Dutta,et al.  Comparison functions and choice correspondences , 1999 .

[5]  Vincent Conitzer,et al.  Vote elicitation: complexity and strategy-proofness , 2002, AAAI/IAAI.

[6]  Moshe Tennenholtz,et al.  k-Implementation , 2003, EC '03.

[7]  Vincent Conitzer,et al.  Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.

[8]  Jérôme Lang,et al.  Voting procedures with incomplete preferences , 2005 .

[9]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[10]  Felix A. Fischer,et al.  On the Hardness and Existence of Quasi-Strict Equilibria , 2008, SAGT.

[11]  Vincent Conitzer,et al.  New complexity results about Nash equilibria , 2008, Games Econ. Behav..

[12]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[13]  Vincent Conitzer,et al.  Determining Possible and Necessary Winners under Common Voting Rules Given Partial Orders , 2008, AAAI.

[14]  Sarit Kraus,et al.  Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..

[15]  Vincent Conitzer,et al.  Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.

[16]  Yoav Shoham,et al.  Internal implementation , 2010, AAMAS.

[17]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[18]  Toby Walsh,et al.  Winner determination in voting trees with incomplete preferences and weighted votes , 2011, Autonomous Agents and Multi-Agent Systems.

[19]  Vincent Conitzer,et al.  Approximation Algorithm for Security Games with Costly Resources , 2011, WINE.

[20]  Bo An,et al.  PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard , 2012, AI Mag..

[21]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[22]  Felix A. Fischer,et al.  Possible and necessary winners of partial tournaments , 2012, AAMAS.

[23]  Neil Burch,et al.  Heads-up limit hold’em poker is solved , 2015, Science.