Username   Password       Forgot your password?  Forgot your username? 

An Automatic Simulation Framework to Find Loopholes in Regimes

Volume 13, Number 5, September 2017 - Paper 11  - pp. 670-681
DOI: 10.23940/ijpe.17.05.p11.670681

Yun Wu*, Yiqiao Li

College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China

(Submitted on April 11, 2017; Revised on June 13, 2017; Accepted on August 21, 2017)


Loopholes exist in nearly every regime, which leads to invalidity and instability in the running process of a regime. In this paper, we propose a new framework based on agent method and game theory to find loopholes in a regime, which contains two players with their clear payoffs. Following the principle of “winners stay, losers change”, agents make their own choices among strategies, and their choices can affect the payoffs of other players, resulting in a dynamic equilibrium that has obvious features in decision path, which can be easily found in the final figures after simulation. We further exploit typical cases, such as prisoner's dilemma, anti-coordination game, coordination game and harmony, of which the results have been mathematical proved, to illustrate the validity of our method. Finally, we make some regimes in this paper based on the classical case, “Boxed Pigs”, and find the loopholes in these regimes. By utilizing the framework proposed in this paper, managers are able to detect possible problems in advance at the time when they make regimes, which helps reduce the loss of costs caused by management and improve team relations.


References: 15

    1. K. Behrstock, M. Benaïm, and M. W. Hirsch, "Smale Strategies for Network Prisoner's Dilemma Games," Journal of Dynamics & Games, vol. 2, no. 2, pp. 141-155, February 2017
    2. K. Berg, "Extremal Pure Strategies and Monotonicity in Repeated Games," Computational Economics, vol. 49, no. 3, pp. 387-404, March 2017
    3. E. R. Canterbery, "Game Theory: an Introduction," Reference Reviews, vol. 14, no. 7, pp. 35-36, July 2015
    4. T. Chen, X. Dang, J. Han, and D. Jia, "How to Realize the Optimal Allocation of the Control Rights of the Enterprise?—Based on Evolutionary Game Theory," Journal of Xian University of Technology, (online since March 3, 2016) (DOI: 10.19322/j.cnki.issn.1006-4710.2016.03.022)
    5. G. B. Hale and M. Obstfeld, "The Euro and The Geography of International Debt Flows," National Bureau of Economic Research, Inc., 2014
    6. M. Hoefer, “Algorithmic Game Theory,” Springer Berlin Heidelberg, 2015
    7. M. J. Kearns, M. L. Littman, and S. P. Singh, "Graphical Models for Game Theory," Computer Science, pp. 253-260, 2001
    8. F. Kojima, and S. Takahashi, "Anti-Coordination Games and Dynamic Stability," International Game Theory Review, vol. 9, no. 04, pp. 667-688, April 2007
    9. D. F. Li and F. X. Hong, "Solving Constrained Matrix Games with Payoffs of Triangular Fuzzy Numbers," Computers & Mathematics with Applications, vol. 64, no. 4, pp. 432-446, April 2012
    10. J. Lisowski, "Sensitivity of the Game Control of Ship in Collision Situations," Polish Maritime Research, vol. 22, no. 4, pp. 27-33, April 2015
    11. H. Mintzberg, "Patterns in Strategy Formation," Management Science, vol. 24, no. 9, pp. 934-948, September 1978
    12. M. J. Osborne and A. Rubinstein, "A Course in Game Theory," Economica, vol. 63, no. 249, 2008
    13. C. Paternotte and J. Grose, "Social Norms and Game Theory: Harmony or Discord?" British Journal for the Philosophy of Science, vol. 64, no. 3, pp. 551-587, March 2013
    14. E. Rovithis, A. Floros, and A. Mniestris, "Educational Audio Game Design: Kronos, a Role-playing Game," Hellenic Conference of Education in Arts, 2015
    15. R. Tan, Y. Liu, K. Zhou, L. Jiao, and W. Tang, "A Game-theory Based Agent-cellular Model for Use in Urban Growth Simulation: A Case Study of the Rapidly Urbanizing Wuhan Area of Central China," Computers Environment & Urban Systems, vol. 49, pp. 15–29, 2015



      Click here to download the paper.

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

      This site uses encryption for transmitting your passwords.