Beat the Cheater: Computing Game-Theoretic Strategies for When to Kick a Gambler out of a Casino

Gambles in casinos are usually set up so that the casino makes a profit in expectation--as long as gamblers play honestly. However, some gamblers are able to cheat, reducing the casino's profit. How should the casino address this? A common strategy is to selectively kick gamblers out, possibly even without being sure that they were cheating. In this paper, we address the following question: Based solely on a gambler's track record, when is it optimal for the casino to kick the gambler out? Because cheaters will adapt to the casino's policy, this is a game-theoretic question. Specifically, we model the problem as a Bayesian game in which the casino is a Stackelberg leader that can commit to a (possibly randomized) policy for when to kick gamblers out, and we provide efficient algorithms for computing the optimal policy. Besides being potentially useful to casinos, we imagine that similar techniques could be useful for addressing related problems--for example, illegal trades in financial markets.

[1]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[2]  Thomas S. Ferguson,et al.  Who Solved the Secretary Problem , 1989 .

[3]  Daniel Herlemont Stochastic Processes and Related Distributions , 2004 .

[4]  Vincent Conitzer,et al.  Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.

[5]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[6]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[7]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[8]  P. Freeman The Secretary Problem and its Extensions: A Review , 1983 .

[9]  Bernhard von Stengel,et al.  Leadership games with convex strategy sets , 2010, Games Econ. Behav..

[10]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[11]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[12]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[13]  R. Durrett Essentials of Stochastic Processes , 1999 .

[14]  David Haussler,et al.  How to use expert advice , 1993, STOC.

[15]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[16]  Bonaventure Intercontinental,et al.  ON DECISION AND CONTROL , 1985 .

[17]  Manfred K. Warmuth,et al.  The weighted majority algorithm , 1989, 30th Annual Symposium on Foundations of Computer Science.

[18]  J. Gittins Bandit processes and dynamic allocation indices , 1979 .