We develop a model of strategic predator-prey interaction in which the latter has a certain range of actions available whose cost is inversely correlated with escape ability ("quality"). Under the assumption that each herd of prey is generated by random independent draws from the whole population, w
Decentralized admission control of a queueing system: A game-theoretic model
β Scribed by Kyle Y. Lin
- Publisher
- John Wiley and Sons
- Year
- 2003
- Tongue
- English
- Weight
- 124 KB
- Volume
- 50
- Category
- Article
- ISSN
- 0894-069X
No coin nor oath required. For personal study only.
β¦ Synopsis
Abstract
Consider a distributed system where many gatekeepers share a single server. Customers arrive at each gatekeeper according to independent Poisson processes with different rates. Upon arrival of a new customer, the gatekeeper has to decide whether to admit the customer by sending it to the server, or to block it. Blocking costs nothing. The gatekeeper receives a reward after a customer completes the service, and incurs a cost if an admitted customer finds a busy server and therefore has to leave the system. Assuming an exponential service distribution, we formulate the problem as an nβperson nonβzeroβsum game in which each gatekeeper is interested in maximizing its own longβrun average reward. The key result is that each gatekeeper's optimal policy is that of a threshold type regardless what other gatekeepers do. We then derive Nash equilibria and discuss interesting insights. Β© 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 702β718, 2003.
π SIMILAR VOLUMES
We present a model in which members of a mated pair decide whether to care for their o!spring or desert them. There is a breeding season of "nite length during which it is possible to produce and raise several batches of o!spring. On deserting its o!spring, an individual can search for a new mate. T
In this paper a time-discrete dynamic model for the process of disarmament is investigated. The state variables of the system are costs and security values. We assume that the costs can be controlled, and we aim at reducing the costs to zero and achieving non-negative security values after a finite