34 research outputs found
Evolutionary prisoner's dilemma games with optional participation
Competition among cooperators, defectors, and loners is studied in an
evolutionary prisoner's dilemma game with optional participation. Loners are
risk averse i.e. unwilling to participate and rather rely on small but fixed
earnings. This results in a rock-scissors-paper type cyclic dominance of the
three strategies. The players are located either on square lattices or random
regular graphs with the same connectivity. Occasionally, every player
reassesses its strategy by sampling the payoffs in its neighborhood. The loner
strategy efficiently prevents successful spreading of selfish, defective
behavior and avoids deadlocks in states of mutual defection. On square
lattices, Monte Carlo simulations reveal self-organizing patterns driven by the
cyclic dominance, whereas on random regular graphs different types of
oscillatory behavior are observed: the temptation to defect determines whether
damped, periodic or increasing oscillations occur. These results are compared
to predictions by pair approximation. Although pair approximation is incapable
of distinguishing the two scenarios because of the equal connectivity, the
average frequencies as well as the oscillations on random regular graphs are
well reproduced.Comment: 6 pages, 7 figure
Motion of influential players can support cooperation in Prisoner's Dilemma
We study a spatial Prisoner's dilemma game with two types (A and B) of
players located on a square lattice. Players following either cooperator or
defector strategies play Prisoner's Dilemma games with their 24 nearest
neighbors. The players are allowed to adopt one of their neighbor's strategy
with a probability dependent on the payoff difference and type of the given
neighbor. Players A and B have different efficiency in the transfer of their
own strategy therefore the strategy adoption probability is reduced by a
multiplicative factor (w < 1) from the players of type B. We report that the
motion of the influential payers (type A) can improve remarkably the
maintenance of cooperation even for their low densities.Comment: 7 pages, 7 figure
Learning from the existence of models: On psychic machines, tortoises, and computer simulations
Distribution of nucleic acids in the hair cells of the organ of corti of animals in relatively quiet surroundings, and exposed to sonic stimulation
Science Writing for Beginners
In this work we survey the findings in social psychology and philosophy with respect to trust. We introduce three
hypotheses that remain unanswered with respect to the manner in which humans react to computers. We discuss potential
design revisions in light of findings from other disciplines. Then we conclude by noting that research which empowers
users in order to be their own security manager may be based on a fundamentally flawed view of human-computer
interaction. We close by encouraging designers of computer security systems to examine the humans, which these
systems are intended to empower, and recommend that any security system be built on the basis of understanding of
human trust provided by the social sciences
The effect of hypoxia on the levels of circulating catecholamines in the dogfishScyliorhinus canicula
Towards a Framework for Socially Influencing Systems: Meta-analysis of Four PLS-SEM Based Studies
People continuously experience various types of engagement through social media, mobile interaction, location-based applications, and other technologically advanced environments. Often, integral parts of such socio-technical contexts often are information systems designed to change behaviors and attitudes of their users by leveraging powers of social influence, further defined as socially influencing systems (SIS). Drawing upon socio-psychological theories, this paper initially reviews and presents a typology of relevant social influence aspects. Following that, it analyzes four partial least squares structural equation modeling (PLS-SEM) based empirical studies to examine the interconnectedness of their social influence aspects. As a result, the analysis provides grounds for seminal steps towards the development and advancement of a framework for designing and evaluating socially influencing systems. The main findings can also deepen understanding of how to effectively harness social influence for enhanced user engagement in socio-technical environments and guide persuasive engineering of future socially influencing systems