On Networked Evolutionary Games Part 1 Formulat - 2014 - IFAC Proceedings Volum
On Networked Evolutionary Games Part 1 Formulat - 2014 - IFAC Proceedings Volum
Abstract: This paper presents a comprehensive modeling technique for networked evolutionary
games (NEG). Three kinds of network graphs are considered, which are (i) undirected graph
for symmetric games; (ii) directed graph for asymmetric games, and (iii) d-directed graph
for symmetric games with partial neighborhood information. Three kinds of fundamental
evolutionary games (FEGs) are discussed, which are (i) two strategies and symmetric (S-2);
(ii) two strategies and asymmetric (A-2); and (iii) three strategies and symmetric (S-3). Three
strategy updating rules (SUR) are introduced, which are (i) Unconditional Imitation (UI);
(ii) Fermi Rule (FR); (iii) Myopic Best Response Adjustment Rule (MBRA). Then we review
the fundamental evolutionary equation (FEE), and give the detailed formulation for different
models. Finally, the network profile dynamics (NPD) of NEGs are investigated via their FEE.
Then we review the fundamental evolutionary equation Proposition 3. Let X ∈ Rm be a column and M
(FEE) introduced in Cheng et al. (Preprint2013) and is a matrix. Then
construct the FEEs for various types of NEGs. X n M = (Im ⊗ M ) X. (2)
For statement ease, some notations and basic concepts are (iii) Swap matrix (Cheng et al., 2011, 2012a):
introduced first. Definition 4. A matrix W[m,n] ∈ Mm×n , defined
• Notations: by
(i) Mm×n : the set of m × n real matrices. W[m,n] = δmn [1, m + 1, · · · , (n − 1)m + 1;
(ii) Col(M ) (Row(M )) is the set of columns (rows) of 2, m + 2, · · · , (n − 1)m + 2;
M . Coli (M ) (Rowi (M )) is the i-th column (row) (3)
··· ;
of M .
(ii) Dk := {1, 2, · · · , k} , k ≥ 2. n, m + n, · · · , nm],
(iii) δni : thei-th column of the identity matrix In . is called the (m, n)-dimensional swap matrix.
(iv) ∆n := δni |i = 1, · · · , n . The basic function of the swap matrix is to
k
P “swap” two vectors. That is,
(v) Υk = (r1 , · · · , rk ) ri ≥ 0, i = 1, · · · , k; ri = 1 is
i=1 Proposition 5. Let X ∈ Rm and Y ∈ Rn be two
called the set of k-th dimensional probabilistic columns. Then
vectors. W[m,n] n X n Y = Y n X. (4)
(vi) A matrix L ∈ Mm×n is called a logical matrix if
the set of columns of L, denoted by Col(L), are The rest of this paper is organized as follows: Section 2
k presents a mathematical framework for NEGs. Three basic
of the form of δm . That is,
Col(L) ⊂ ∆m . components of an NEG, namely, network graph, FNG, and
SUR, are discussed in detail. Section 3 is devoted to the
Denote by Lm×n the set of m×n logical matrices. FEE, which plays a key role in the investigation of NEGs.
(vii) If L ∈ Ln×r , by definition it can be expressed as FEEs of all players are building block for constructing
L = [δni1 , δni2 , · · · , δnir ]. For the sake of brevity, it strategy profile dynamics of the overall networks. Section
is briefly denoted as 4 is a brief conclusion.
L = δn [i1 , i2 , · · · , ir ].
2. MATHEMATICAL FRAMEWORK FOR NEG
(viii) A matrix L ∈ Mm×n is called a probabilistic
matrix if the columns of L are m-dimensional
probabilistic vectors. That is, This section is a comprehensive description of mathemati-
cal framework of NEGs. The main idea of which was firstly
Col(L) ⊂ Υm . proposed in Cheng et al. (Preprint2013).
The set of m×n probabilistic matrices is denoted Definition 6. A networked evolutionary game, denoted by
by Υm×n . ((N, E), G, Π), consists of three ingredients as:
(ix) If L ∈ Υm×n , if Col(L) = C1 ∪ C2 , where
C1 ⊂ ∆m and C2 ⊂ Υm \∆m , and |C2 | |C1 |. (i) a network (graph) (N, E);
Then for notational compactness, we still use the (ii) a fundamental network game (FNG), G, such that if
shorthand (i, j) ∈ E, then i and j play the FNG with strategies
xi (t) and xj (t) respectively.
L = δm [i1 , i2 , · · · , in ], (iii) a local information based strategy updating rule
s (SUR).
where if Colk (L) = δm ∈ C1 , ik = s, else if
Colk (L) ∈ C2 , that is, Colk (L) = (r1 , · · · , rm ),
we express ik as In the following we describe these three ingredients one by
one.
ik = 1/(r1 ) + 2/(r2 ) + · · · + m/(rm ).
• Operators: 2.1 Network Graph
(i) Semi-tensor product of matrices (Cheng et al.,
2011, 2012a): We consider three kinds of network graphs.
Definition 1. Let M ∈ Mm×n and N ∈ Mp×q , (i) Undirected graph: N = {1, 2, · · · , n} (n ≤ ∞).
and t = lcm{n, p} be the least common multiple It represents n players. If (i, j) ∈ E, then i is
of n and p. The semi-tensor product of M and in the neighborhood of j, denoted by i ∈ U (j).
N , denoted by M n N , is defined as Simultaneously, j ∈ U (i).
M ⊗ It/n N ⊗ It/p ∈ Mmt/n×qt/p , (1) (ii) Directed graph: Note that the FNG is always played
where ⊗ is the Kronecker product. by two neighboring players. If the FNG is not sym-
metric, the directed edge is used to distinguish differ-
(ii) Khatri-Rao Product of matrices (Ljung & Söderström, ent roles of two players. Assume (i, j) ∈ E, i.e., there
1982) is an edge from i to j, then in the game i is player 1
Definition 2. Let M ∈ Mp×m , N ∈ Mq×m . and j is player 2. Note that such directed graph does
Then the Khatri-Rao Product is defined as not affect the definition of neighborhoods.
M ∗ N = [ Col1 (M ) n Col1 (N ) · · · (iii) D-directed graph: Assume the FNG is still symmetric,
Colm (M ) n Colm (N )] ∈ Mpq×m . but the graph is not symmetric. That is, if (i, j) ∈ E,
denoted by dot line arrow goes from i to j, it means
276
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014
277
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014
278
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014
Table 4. Payoffs → Dynamics (Example 12) Table 5. Payoffs → Dynamics (Example 13)
Profile 11111 11112 11121 11122 11211 11212 11221 11222 Profile 11111 11112 11121 11122 11211 11212 11221 11222
ci−1 -1 -1 -1 -1 -1 -1 -1 -1 c1 2 2 2 2 2 2 2 2
1 1
ci -1 -1 -1 -1 2 2 1 1 c2 5/3 1 5/3 1 1 3
1 3
ci+1 -1 -1 2 1 -1 -1 1 0 1 1 1 1
c3 3/2 1 2 2
0 0 2 2
fi 1 1 2 2 2 2 2 2 1 1
c4 1 2
0 1 2
0 1 2
.. 1 1 1 1
c5 3/2 0 2 2
3/2 0 2 2
. f1 1 1 1 1 1 1 1 1
Profile 22111 22112 22121 22122 22211 22212 22221 22222 f2 1 1 1 1 1 1 1 ( 31 , 32 )
ci−1 1 1 1 1 0 0 0 0 f3 1 1 1 1 1
(2,2) 1 1 1
(2,2) 1 1
(2,2) 2
ci -1 -1 -1 -1 1 1 0 0 f4 1 1 1 2 1 1 2 2
ci+1 -1 -1 2 1 -1 -1 1 0 f5 1 1 1 ( 12 , 12 ) 1 ( 21 , 12 ) 1 2
fi 2 2 2 2 2 2 2 2
..
.
Now identify 1 ∼ δ21 and 2 ∼ δ22 , then we can express f Profile 22111 22112 22121 22122 22211 22212 22221 22222
into its algebraic form as c1 1
2
1 1
2
1 1 1 1 1
c2 3
1 3
1 1 4/3 1 4/3
xi (t + 1) = Mf xi−2 xi−1 xi xi+1 xi+2 , i = 1, 2, 3, 4, 5, c3 1 1 0 0 1 1 3/2 3/2
(19) c4 1 1
2
0 1 1
2
0 1 2
c5 1 1 0 3/2 1 1 0 3/2
where f1 2 2 2 2 2 2 2 2
Mf = δ2 [1, 1, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2 f2 ( 23 , 13 ) 2 2 2 2 2 2 2
(20) ( 12 , 12 )
1, 1, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2]. f3 1 1 2 2 2 2 2
f4 1 ( 12 , 12 ) 2 2 ( 21 , 12 ) 2 2 2
Note that we use (mod 5) notation. That is, x0 = x5 , f5 1 2 ( 12 , 12 ) 2 1 2 2 2
x−1 = x4 and so on.
Example 13. Assume network graph is Fig. 1 (b); FNG is
A-2 with A = H = 2, B = G = 1, E = F = C = D = 0 M3 = δ2 [1, 1, 1, ( 21 , 12 ), 1, ( 12 , 21 ), ( 12 , 12 ), 2, 1, 1, 1, 2, 2, 2, 2, 2
(the game of Battle of The Sexes). SUR is Fermi Rule 1, 1, 1, ( 12 , 12 ), 1, 2, ( 12 , 21 ), 2, 1, 1, ( 12 , 12 ), 2, 2, 2, 2, 2],
(FM). Since the game is not symmetric, the FEEs for (24)
individual nodes are different. We need to work out them
one by one.
M4 = δ2 [1, 1, 1, 2, 1, 1, 2, 2, 1, ( 21 , 21 ), 2, 2, ( 12 , 12 ), 2, 2, 2
xi (t + 1) = Mi x1 x2 x3 x4 x5 := Mi x, i = 1, 2, 3, 4, 5,
(21) 1, 1, 1, 2, 1, 1, 2, 2, 1, ( 12 , 21 ), 2, 2, ( 12 , 12 ), 2, 2, 2],
5
(25)
where x = ni=1 xi and Mi will be calculated in the
following two steps:
M5 = δ2 [1, 1, 1, ( 12 , 12 ), 1, ( 12 , 21 ), 1, 2, 1, 2, 1, 2, 1, 2, 2, 2
(i) If the profile is known, then the payment for each 1, 1, 1, ( 21 , 12 ), 1, 2, ( 12 , 21 ), 2, 1, 2, ( 12 , 12 ), 2, 1, 2, 2, 2].
player is known. For instance, if the profile
(26)
(x1 , x2 , x3 , x4 , x5 ) = (1 1 2 2 2),
Then it is easy to calculate that Example 14. Assume network graph is Fig. 1 (c); FNG
is S-3 with A = F = I = 0, B = E = G = 1, C =
c1 = 2,
D = H = −1 (the Game of Rock-Scissor-Paper), SUR is
1 1 MBRA (It is easy to check that for this example MBRA-1
c2 = (1 + 0 + 0) = ,
3 3 and MBRA-2 lead to the same FEE). We emphasize only
1 1 one thing: based on the definition, the neighborhood for a
c3 = (0 + 1) = ,
2 2 player to play with maybe different from the neighborhood
1 from which he can get of information. For instance, player
c4 = (2 + 2) = 2,
2 1 plays with players 2, 3, 4, and 5, but he can only get the
1 1 information from 3 and 4. So
c5 = (0 + 1) = .
2 2 (i) if (x3 (t) = 2)∩(x4 (t) = 2) or (x3 (t) = 2)∩(x4 (t) = 1)
(ii) Comparing c1 with c2 , we have f1 = x1 = 1. As for or (x3 (t) = 1) ∩ (x4 (t) = 2), then
f2 we have three choices:
j = 1 ⇒ f2 = x1 = 1, x1 (t + 1) = 1;
j = 3 ⇒ f2 = x3 = 2, (ii) if (x3 (t) = 3)∩(x4 (t) = 3) or (x3 (t) = 3)∩(x4 (t) = 2)
j = 5 ⇒ f2 = x5 = 2. or (x3 (t) = 2) ∩ (x4 (t) = 3), then
Hence f2 = 1 with probability 13 and f2 = 2 with x1 (t + 1) = 2;
probability 32 . We briefly express this by f2 = ( 13 , 23 ).
Similarly, we can calculate fi as in Table 5. (iii) if (x3 (t) = 1)∩(x4 (t) = 1) or (x3 (t) = 1)∩(x4 (t) = 3)
or (x3 (t) = 3) ∩ (x4 (t) = 1), then
Finally, we have
M1 = δ2 [1, 1, 1, 1, 1, 1, 1, 1, 1, 2, 1, 2, 2, 2, 2, 2 x1 (t + 1) = 3.
(22)
1, 1, 1, 1, 1, 2, 1, 2, 2, 2, 2, 2, 2, 2, 2, 2], We skip the detailed computation process and present the
results as follows.
M2 = δ2 [1, 1, 1, 1, 1, 1, 1, ( 13 , 23 ), ( 23 , 31 ), ( 13 , 23 ), 2, 2, ( 13 , 32 ), 2,
fi (t + 1) = Mi x(t), i = 1, 2, 3, 4, 5, (27)
2, 2, 1, 1, 1, 1, 1, 1, 1, ( 13 , 23 ), ( 23 , 13 ), 2, 2, 2, 2, 2, 2, 2],
(23) where
279
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014
280