969 resultados para Game theory


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Esta dissertação apresenta os principais aspectos da Teoria dos Jogos, mostrando sua aplicação como instrumento analítico na Gestão de Pessoas no que diz respeito à variável salário. Considera a organização e o trabalhador como conceitos gerais, sem identificar o setor de atuação, ramo de atividade, classificação jurídica em função do seu faturamento, total de empregados ou participação de mercado dessa organização. Da mesma forma o conceito trabalhador não recebe qualquer identificação em relação ao setor de atividade onde trabalha, função, salário ou formação profissional. A organização é toda estrutura que gera bens e serviços para a sociedade e o trabalhador é todo elemento que emprega sua força de trabalho na produção de bens e serviços. Os objetivos estabelecidos para este estudo são: identificar as possibilidades de aplicação da Teoria dos Jogos na Gestão de Pessoas considerando a variável salário como elemento de conflito entre a organização e o trabalhador; mostrar se a forma de representação extensiva é mais apropriada ou não para analisar o cenário de embate na decisão de contratar ou não o trabalhador ou pagar mais ou menos salário e a existência do Equilíbrio de Nash. A metodologia qualitativa com apoio bibliográfico e documental caracteriza esta pesquisa qualitativa quanto a metodologia de pesquisa. Os métodos qualitativos contribuem para interpretar fenômenos do cotidiano, podendo ser composto por dados simbólicos situados em determinado contexto. A pesquisa documental é uma contribuição importante ao estudo do tema proposto, já que a pesquisa qualitativa não é uma proposta rigidamente estruturada e isto permite que o pesquisador use a imaginação e criatividade para atingir o objetivo. Os resultados obtidos pela pesquisa dão conta de que é possível a aplicação da Teoria dos Jogos na Gestão de Pessoas considerando o embate entre os jogadores (o trabalhador e a organização) em torno do salário, discutido no capítulo 4 nas representações da matriz de payoff de um jogo estratégico e nas figuras 9,10,11,e 16. A representação na forma extensiva, outro objetivo, indicando os payoffs entre duas decisões centrais representadas por X = flexibilização com renúncia dos direitos pelos trabalhadores e Y = flexibilização/adaptação/negociação, conforme figura 16. O gestor de pessoas percebe as estratégias existentes para a organização e trabalhador para a tomada de decisão, ao mesmo tempo em que pode avaliar a situação que esteja vivendo e fazer simulações em busca de novas propostas. Por fim, o Equilíbrio de Nash para a aplicação na Gestão de Pessoas é discutido no item 4.1.3, sendo possível verificar que tanto o trabalhador como a organização podem chegar a uma decisão favorável para ambos e manter seus objetivos pretendidos inicialmente. Na figura 17, esse equilíbrio é apresentado depois da tomada de decisão do trabalhador pela proposta feita pela organização na sequência O2 e o trabalhador ficou com o ramo de sequência T2 com o valor de 20 moedas. A potencialidade da Teoria dos Jogos na Gestão de Pessoas está no fato de que quem atua em uma organização compartilha resultados bons ou ruins obtidos pelas escolhas alheias, individuais e construídas coletivamente.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Esta dissertação apresenta os principais aspectos da Teoria dos Jogos, mostrando sua aplicação como instrumento analítico na Gestão de Pessoas no que diz respeito à variável salário. Considera a organização e o trabalhador como conceitos gerais, sem identificar o setor de atuação, ramo de atividade, classificação jurídica em função do seu faturamento, total de empregados ou participação de mercado dessa organização. Da mesma forma o conceito trabalhador não recebe qualquer identificação em relação ao setor de atividade onde trabalha, função, salário ou formação profissional. A organização é toda estrutura que gera bens e serviços para a sociedade e o trabalhador é todo elemento que emprega sua força de trabalho na produção de bens e serviços. Os objetivos estabelecidos para este estudo são: identificar as possibilidades de aplicação da Teoria dos Jogos na Gestão de Pessoas considerando a variável salário como elemento de conflito entre a organização e o trabalhador; mostrar se a forma de representação extensiva é mais apropriada ou não para analisar o cenário de embate na decisão de contratar ou não o trabalhador ou pagar mais ou menos salário e a existência do Equilíbrio de Nash. A metodologia qualitativa com apoio bibliográfico e documental caracteriza esta pesquisa qualitativa quanto a metodologia de pesquisa. Os métodos qualitativos contribuem para interpretar fenômenos do cotidiano, podendo ser composto por dados simbólicos situados em determinado contexto. A pesquisa documental é uma contribuição importante ao estudo do tema proposto, já que a pesquisa qualitativa não é uma proposta rigidamente estruturada e isto permite que o pesquisador use a imaginação e criatividade para atingir o objetivo. Os resultados obtidos pela pesquisa dão conta de que é possível a aplicação da Teoria dos Jogos na Gestão de Pessoas considerando o embate entre os jogadores (o trabalhador e a organização) em torno do salário, conforme pode ser visto no capítulo 4 nas representações da matriz de payoff de um jogo estratégico e nas figuras 9,10,11,e 16. A representação na forma extensiva, constitui outro objetivo, indicando os payoffs entre duas decisões centrais representadas por X = flexibilização com renúncia dos direitos pelos trabalhadores e Y = flexibilização/adaptação/negociação, conforme figura 16. Ao analisar a figura, o gestor de pessoas percebe as estratégias existentes para a organização e trabalhador para a tomada de decisão, ao mesmo tempo em que pode avaliar a situação que esteja vivendo e fazer simulações em busca de novas propostas. Por fim, o Equilíbrio de Nash para a aplicação na Gestão de Pessoas é discutido no item 4.1.3, sendo possível verificar que tanto o trabalhador como a organização podem chegar a uma decisão favorável para ambos e manter seus objetivos pretendidos inicialmente. Na figura 17, esse equilíbrio é apresentado depois da tomada de decisão do trabalhador pela proposta feita pela organização na sequência O2 e o trabalhador ficou com o ramo de sequência T2 com o valor de 20 moedas. A potencialidade da Teoria dos Jogos na Gestão de Pessoas surge do fato de que quem atua em uma organização compartilha resultados bons ou ruins obtidos pelas escolhas alheias, escolhas individuais e pelas escolhas construídas coletivamente. Quando o trabalhador resolve produzir menos, a empresa sofre com a perda do lucro gerado pelo ritmo mais lento de trabalho. Para mudar esse quadro, a empresa toma a decisão de aumentar o salário e o trabalhador por sua vez desenvolve a tarefa com maior velocidade e em maior quantidade e ela pode retomar o seu lucro. Nesses jogos há cobranças de desempenho, exigência para atingir metas, pressões, conflitos com clientes e lideranças. Logo, a Teoria dos Jogos pode ser aplicada como instrumento para o gestor de Pessoas avaliar a situação vivida para a tomada de decisão que resolva a situação de embate.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A dolgozat célja egy vállalati gyakorlatból származó eset elemzése. Egy könyvkiadót tekintünk. A kiadó kapcsolatban van kis- és nagykereskedőkkel, valamint a fogyasztók egy csoportjával is vannak kapcsolatai. A könyvkiadók projekt rendszerben működnek. A kiadó azzal a problémával szembesül, hogy hogyan ossza el egy frissen kiadott és nyomtatott könyv példányszámait a kis- és nagykereskedők között, valamint mekkora példányszámot tároljon maga a fogyasztók közvetlen kielégítésére. A kiadóról feltételezzük, hogy visszavásárlási szerződése van a kereskedőkkel. A könyv iránti kereslet nem ismert, de becsülhető. A kis- és nagykereskedők maximalizálják a nyereségüket. = The aim of the paper is to analyze a practical real world problem. A publishing house is given. The publishing firm has contacts to a number of wholesaler / retailer enterprises and direct contact to customers to satisfy the market demand. The book publishers work in a project industry. The publisher faces with the problem how to allocate the stocks of a given, newly published book to the wholesaler and retailer, and to hold some copies to satisfy the customers direct from the publisher. The publisher has a buyback option. The distribution of the demand is unknown, but it can be estimated. The wholesaler / retailer maximize the profits. The problem can be modeled as a one-warehouse and N-retailer supply chain with not identical demand distribution. The model can be transformed in a game theory problem. It is assumed that the demand distribution follows a Poisson distribution.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Weiss (1981) established core equivalence and the existence of competitive equilibria in finitely additive exchange economies. To underline the relevance of finitely additive economies we present in this note an example with a close connection to finite exchange economies.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A new correlation scheme (leading to a special equilibrium called “soft” correlated equilibrium) is introduced for finite games. After randomization over the outcome space, players have the choice either to follow the recommendation of an umpire blindly or freely choose some other action except the one suggested. This scheme can lead to Pareto-better outcomes than the simple extension introduced by [Moulin, H., Vial, J.-P., 1978. Strategically zero-sum games: the class of games whose completely mixed equilibria cannot be improved upon. International Journal of Game Theory 7, 201–221]. The informational and interpretational aspects of soft correlated equilibria are also discussed in detail. The power of the generalization is illustrated in the prisoners’s dilemma and a congestion game.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Bármennyire szeretne is egy bank (vállalat, biztosító) csak az üzletre koncentrálni, nem térhet ki a pénzügyi (hitel-, piaci, operációs, egyéb) kockázatok elől, amelyeket mérnie és fedeznie kell. A teljes fedezés vagy nagyon költséges, vagy nem is lehetséges, így a csőd elkerülésre minden gazdálkodó egységnek tartania kell valamennyi kockázatmentes, likvid tőkét. Koherens kockázatmérésre van szükség: az allokált tőkének tükröznie kell a kockázatokat - azonban még akkor is felmerül elosztási probléma, ha jól tudjuk mérni azokat. A diverzifikációs hatásoknak köszönhetően egy portfólió teljes kockázata általában kisebb, mint a portfóliót alkotó alportfóliók kockázatának összege. A koherens tőkeallokáció során azzal a kérdéssel kell foglalkoznunk, hogy mennyi tőkét osszunk az alportfóliókra, vagyis hogyan osszuk el „kor­rekt” módon a diverzifikáció előnyeit. Így megkapjuk az eszközök kockázathoz való hozzájárulását. A tanulmányban játékelmélet alkalmazásával, összetett opciós példákon keresztül bemutatjuk a kockázatok következetes mérését és felosztását, felhívjuk a figyelmet a következetlenségek veszélyeire, valamint megvizsgáljuk, hogy a gyakorlatban alkalmazott kockázatmérési módszerek [különösen a kockáztatott érték (VaR)] mennyire felelnek meg az elmélet által szabott követelményeknek. ____________________ However much a bank (or company or insurance provider) concentrates only on business, it cannot avoid financial (credit, market, operational or other) risks that need to be measured and covered. Total cover is either very expensive or not even possible, so that every business unit has to hold some risk-free liquid capital to avoid insolvency. What it needs is coherent risk measurement: the capital allocated has to match the risks, but even if the risks are measured well, distribution problems can still arise. Thanks to diversification effects, the total risk of a portfolio is less than the sum of the risks of its sub-portfolios. Coherent capital allocation entails addressing the question of how much capital to divide among the sub-portfolios, or how to distribute ‘correctly’ the advantages of diversification. This yields the contribution of the assets to the risk. The study employs game theory and examples of compound options to demonstrate coherent measurement and distribution of risks. Attention is drawn to the dangers of inconsistencies. The authors examine how far the methods of risk measurement applied in practice (notably VaR—value at risk) meet the requirements set in theory.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Our study has two aims: to elaborate theoretical frameworks and introduce social mechanisms of spontaneous co-operation in repeated buyer-seller relationships and to formulate hypotheses which can be empirically tested. The basis of our chain of ideas is the simple two-person Prisoner’s Dilemma game. On the one hand, its repeated variation can be applicable for the distinction of the analytical types of trust (iteration trust, strategy trust) in co-operations. On the other hand, it provides a chance to reveal those dyadic sympathy-antipathy relations, which make us understand the evolution of trust. Then we introduce the analysis of the more complicated (more than two-person) buyer-seller relationship. Firstly, we outline the possible role of the structural balancing mechanisms in forming trust in three-person buyer-seller relationships. Secondly, we put forward hypotheses to explain complex buyer-seller networks. In our research project we try to theoretically combine some of the simple concepts of game theory with certain ideas of the social-structural balance theory. Finally, it is followed by a short summary.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Global problems, rapid and massive regional changes in the 21st century call for genuine long-term, awareness, planning and well focused actions from both national governments and international organizations. This book wishes to contribute to building an innovative path of strategic views in handling the diverse challenges, and more emphatically, the economic impacts of climate change. Although the contributors of this volume represent several approaches, they all rely on some common grounds such as the costbenefit analysis of mitigation and adaptation, and on the need to present an in-depth theoretical and practical dimension. The research accounted for in this book tried to integrate and confront various types of economics approaches and methods, as well as knowledge from game theory to country surveys, from agricultural adaptation to weather bonds, from green tax to historical experience of human adaptation. The various themes and points of views do deserve the attention of the serious academic reader interested in the economics of climate change. We hope to enhance the spread of good solutions resulting from world wide disputes and tested strategic decisions. WAKE UP! It is not just the polar bears' habitat that is endangered, but the entire human form of life.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A kooperatív játékelmélet egyik legjelentősebb eredménye, hogy számos konfliktushelyzetben stabil megoldást nyújt. Ez azonban csak statikus és determinisztikus környezetben alkalmazható jól. Most megmutatjuk a mag egy olyan kiterjesztését - a gyenge szekvenciális magot -, amely képes valós, dinamikus, bizonytalan környezetben is eligazítást nyújtani. A megoldást a csődjátékok példájára alkalmazzuk, és segítségével megvizsgáljuk, hogy a pénzügyi irodalom ismert elosztási szabályai közül melyek vezetnek stabil, fenntartható eredményre. _______ One of the most important achievements of cooperative game theory is to provide a stable solution to numerous conflicts. The solutions it presents, on the other hand, have been limited to situations in a static, deterministic environment. The paper examines how the core can be extended to a more realistic, dynamic and uncertain scenario. The bankruptcy games studied are ones where the value of the estate and of the claims are stochastic, and a Weak Sequential Core is used as the solution concept for them. The author tests the stability of a number of well known division rules in this stochastic setting and finds that most are unstable, except for the Constrained Equal Awards rule, which is the only one belonging to the Weak Sequential Core.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Meier (2008) shows that the universal knowledge-belief space exists. However, besides the universality there is an other important property might be imposed on knowledge- belief spaces, inherited also from type spaces, the completeness. In this paper we introduce the notion of complete knowledge-belief space, and demonstrate that the universal knowledge-belief space is not complete, that is, some subjective beliefs (probability measures) on the universal knowledge-belief space are not knowledge-belief types.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Rivals may voluntarily share Research and Development (R&D) results even in the absence of any binding agreements or collusion. In a model where rival firms engage in non-cooperative independent R&D process, we used optimization and game theory analysis to study the equilibrium strategy of the firms. Our work showed that, while minimal spillover is always equilibrium, there may be another equilibrium where firms may reciprocally choose high, sometimes perfect, spillover rates. The incentive for sharing R&D output is based on firms' expectations of learning from their rivals' R&D progress in the future. This leads to strategic complementarities between the firms' choices of spillover rates and thus policy implication follows. ^ Public research agencies can contribute more to social welfare by providing research as public goods. In a non-cooperative public-private research relationship where parallel R&D is conducted, by making its R&D results accessible, the public research agency can stimulate private spillovers, even if there exists rivalry among the private firms who can benefit from such spillovers. ^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This dissertation discussed resource allocation mechanisms in several network topologies including infrastructure wireless network, non-infrastructure wireless network and wire-cum-wireless network. Different networks may have different resource constrains. Based on actual technologies and implementation models, utility function, game theory and a modern control algorithm have been introduced to balance power, bandwidth and customers' satisfaction in the system. ^ In infrastructure wireless networks, utility function was used in the Third Generation (3G) cellular network and the network was trying to maximize the total utility. In this dissertation, revenue maximization was set as an objective. Compared with the previous work on utility maximization, it is more practical to implement revenue maximization by the cellular network operators. The pricing strategies were studied and the algorithms were given to find the optimal price combination of power and rate to maximize the profit without degrading the Quality of Service (QoS) performance. ^ In non-infrastructure wireless networks, power capacity is limited by the small size of the nodes. In such a network, nodes need to transmit traffic not only for themselves but also for their neighbors, so power management become the most important issue for the network overall performance. Our innovative routing algorithm based on utility function, sets up a flexible framework for different users with different concerns in the same network. This algorithm allows users to make trade offs between multiple resource parameters. Its flexibility makes it a suitable solution for the large scale non-infrastructure network. This dissertation also covers non-cooperation problems. Through combining game theory and utility function, equilibrium points could be found among rational users which can enhance the cooperation in the network. ^ Finally, a wire-cum-wireless network architecture was introduced. This network architecture can support multiple services over multiple networks with smart resource allocation methods. Although a SONET-to-WiMAX case was used for the analysis, the mathematic procedure and resource allocation scheme could be universal solutions for all infrastructure, non-infrastructure and combined networks. ^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.