28 research outputs found

    Price of Anarchy for Non-atomic Congestion Games with Stochastic Demands

    Get PDF
    We generalize the notions of user equilibrium and system optimum to non-atomic congestion games with stochastic demands. We establish upper bounds on the price of anarchy for three different settings of link cost functions and demand distributions, namely, (a) affine cost functions and general distributions, (b) polynomial cost functions and general positive-valued distributions, and (c) polynomial cost functions and the normal distributions. All the upper bounds are tight in some special cases, including the case of deterministic demands.Comment: 31 page

    Atomic congestion games with random players : network equilibrium and the price of anarchy

    Get PDF
    In this paper, we present a new model of congestion games with finite and random number of players, and an analytical method to compute the random path and link flows. We study the equilibrium condition, reformulate it as an equivalent variational inequality problem, and establish the existence and non-uniqueness of the equilibria. We also upper bound the price of anarchy with affine cost functions to characterize the quality of the equilibria. The upper bound is tight in some special cases, including the case of deterministic players. Finally a general lower bound is also provided

    Improved Acquisition Method of GPS Signal by Wavelet De-noising

    No full text

    Price of anarchy for congestion games with stochastic demands

    Get PDF
    The price of anarchy is a game-theoretical concept and it measures system degradation caused by players' selfish behaviours. This thesis extends models of congestion games to take stochastic demands into account and studies the price of anarchy on the basis of generalised models developed in this research. In the presence of stochastic demands, the models developed in this study better re flect the reality of a transportation network. The study would help provide a theoretical foundation and insights into mechanism design of transportation games and traffic control in practice. This thesis is concerned with both non-atomic and atomic congestion games, which involve an infinite and finite number of travellers respectively. We introduce the notions of user equilibrium and system optimum under stochastic demands and investigate the behaviours of travellers and central coordinators in a stochastic environment. At a user equilibrium, travellers choose routes independently and aim to minimise their own expected travel costs, while at a system optimum, traffic is fully coordinated to minimise the expected total cost over the whole network. We extend two existing methods of bounding the price of anarchy and compute the quality upper bounds for polynomial cost functions and very general settings of demand distributions. More specifically, we consider positive-valued distributions and normal distributions for non-atomic congestion games, and positive-valued discrete distributions for atomic congestion games. Our results show that the price of anarchy depends on the class of cost functions, demand distributions and, to some extent, network topologies. All the upper bounds are tight in some special cases, including the case of deterministic demands. The two bounding methods are also compared

    Atomic congestion games with random players: network equilibrium and the price of anarchy

    No full text
    AbstractIn this paper, we present a new model of congestion games with finite and random number of players, and an analytical method to compute the random path and link flows. We study the equilibrium condition, reformulate it as an equivalent variational inequality problem, and establish the existence and non-uniqueness of the equilibria. We also upper bound the price of anarchy with affine cost functions to characterize the quality of the equilibria. The upper bound is tight in some special cases, including the case of deterministic players. Finally a general lower bound is also provided.</jats:p

    Outsourcing Decision-making Strategy for Collecting Used-products in Reverse Logistics

    No full text

    Study on Software Vulnerability Characteristics and Its Identification Method

    No full text
    A method for identifying software data flow vulnerabilities is proposed based on the dendritic cell algorithm and the improved convolutional neural network to effectively solve the transmission errors in software data flow. In this method, we first gave the software data flow propagation model and constructed the data propagation tree structure. Secondly, we analyzed the running characteristics of the software, took the interaction among indexes into account, and identified data flow vulnerabilities using the dendritic cell algorithm and the improved convolutional neural network. Finally, we conducted an in-depth study on the performance of this method and other algorithms through mathematical simulation. The results show that this method has better advantages in detection time, storage cost, and software code size.</jats:p
    corecore