Game theory models for communication between agents: a review

08/04/2017
by   Aisha D. Farooqui, et al.
0

In the real world, agents or entities are in a continuous state of interactions. These inter- actions lead to various types of complexity dynamics. One key difficulty in the study of complex agent interactions is the difficulty of modeling agent communication on the basis of rewards. Game theory offers a perspective of analysis and modeling these interactions. Previously, while a large amount of literature is available on game theory, most of it is from specific domains and does not cater for the concepts from an agent- based perspective. Here in this paper, we present a comprehensive multidisciplinary state-of-the-art review and taxonomy of game theory models of complex interactions between agents.

READ FULL TEXT

page 1

page 13

page 15

research
08/14/2023

Exploring the Intersection of Large Language Models and Agent-Based Modeling via Prompt Engineering

The final frontier for simulation is the accurate representation of comp...
research
09/04/2021

A Case Study of Agent-Based Models for Evolutionary Game Theory

Evolutionary game theory is a mathematical toolkit to analyse the intera...
research
04/27/2020

Diversity in Action: General-Sum Multi-Agent Continuous Inverse Optimal Control

Traffic scenarios are inherently interactive. Multiple decision-makers p...
research
05/27/2021

A Computational Model of the Institutional Analysis and Development Framework

The Institutional Analysis and Development (IAD) framework is a conceptu...
research
10/23/2017

Are Multiagent Systems Resilient to Communication Failures?

A challenge in multiagent control systems is to ensure that they are app...
research
11/10/2018

Playing by the Book: Towards Agent-based Narrative Understanding through Role-playing and Simulation

Understanding procedural text requires tracking entities, actions and ef...
research
12/14/2017

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Cyber attacks on both databases and critical infrastructure have threate...

Please sign up or login with your details

Forgot password? Click here to reset