# Towards Network Games with Social Preferences

@article{Kuznetsov2010TowardsNG, title={Towards Network Games with Social Preferences}, author={Petr Kuznetsov and Stefan Schmid}, journal={ArXiv}, year={2010}, volume={abs/1001.5134} }

Many distributed systems can be modeled as network games: a collection of selfish players that communicate in order to maximize their individual utilities. The performance of such games can be evaluated through the costs of the system equilibria: the system states in which no player can increase her utility by unilaterally changing her behavior. However, assuming that all players are selfish and in particular that all players have the same utility function may not always be appropriate. Hence… Expand

#### Topics from this paper

#### 10 Citations

Modeling social preferences in multi-player games

- Computer Science
- AAMAS
- 2011

A new algorithm for multi-player games, Socially-oriented Search (SOS), that incorporates ideas from Social Value Orientation theory from social psychology and is shown to be significantly more effective against players with dynamic interrelationships than the current state-of-the-art algorithms. Expand

On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks

- Computer Science, Economics
- Comput. Networks
- 2014

It turns out that in social networks, convergence times are typically higher and hence constitute a price of friendship and so the Nash equilibria can never be negative, and the Windfall of Friendship is measured. Expand

Unique Stability Point in Social Storage Networks

- Computer Science, Mathematics
- ArXiv
- 2016

This work presents the pairwise stability concept adapted for social storage where both addition and deletion of links require mutual consent, as compared to mutual consent just for link addition in the pair wise stability concept defined by Jackson and Wolinsky [35]. Expand

PEER TO PEER NODE GROUPINGS BASED ON CONTENT USING GAME THEORETIC STRATEGY IN INTER-NETWORKS

- 2013

Peer-to-peer systems (P2P) have grown-up drastically in recent years. Peer-to-peer suggests the probable low cost sharing of information, autonomy, and privacy. In Peer to Peer network game theory… Expand

A Game-Theoretic Approach to the Formation of Clustered Overlay Networks

- Computer Science
- IEEE Transactions on Parallel and Distributed Systems
- 2012

It is shown that decisions made independently by each node using only local information lead to overall cost-effective cluster configurations that are also dynamically adaptable to system updates such as churn and query or content changes. Expand

Improving game-tree search by incorporating error propagation and social orientations

- Computer Science
- AAMAS
- 2011

The goal of this thesis is to determine when deviations occur and modify the search procedure to correct the errors that are introduced. Expand

Data backup network formation with heterogeneous agents: (Extended abstract)

- Computer Science
- 2018 10th International Conference on Communication Systems & Networks (COMSNETS)
- 2018

Heterogeneity is included in this endogenously built symmetric social storage model by using the concept of Social Range Matrix from [5], and it is proved that under certain conditions on network parameters, a bilaterally stable network is unique. Expand

Data Backup Network Formation with Heterogeneous Agents

- Computer Science
- ArXiv
- 2017

Heterogeneity is included in this model by using the concept of Social Range Matrix from Kuznetsov et. Expand

Stability, efficiency, and contentedness of social storage networks

- Computer Science
- Ann. Oper. Res.
- 2020

The concept of bilateral stability is proposed which refines the pairwise stability concept defined by Jackson and Wolinsky, by requiring mutual consent for both addition and deletion of links, as compared to mutual consent just for link addition. Expand

Algorithmic Mechanisms for Reliable Master-Worker Internet-Based Computing

- Computer Science
- IEEE Transactions on Computers
- 2014

This work design and analyze two algorithmic mechanisms to provide appropriate incentives to rational workers to act correctly, despite the malicious workers' actions and the unreliability of the communication, in Internet-based master-worker computations. Expand

#### References

SHOWING 1-10 OF 26 REFERENCES

The price of selfish behavior in bilateral network formation

- Computer Science
- PODC '05
- 2005

A careful empirical analysis demonstrates that the average price of anarchy is better in the bilateral connection game than in the unilateral game for small link costs but worse as links become more expensive. Expand

When selfish meets evil: byzantine players in a virus inoculation game

- Computer Science
- PODC '06
- 2006

The Price of Malice is introduced which captures how much the presence of Byzantine players can deteriorate or---in case of highly risk-averse selfish players---improve the social welfare of the distributed system. Expand

Network Design with Weighted Players

- Mathematics, Computer Science
- SPAA '06
- 2006

This paper presents the first general results on weighted Shapley network design games, and establishes the following trade-off between the two objectives of good stability and low cost: for every α=Ω( log wmax ), the price of stability with respect to O(α)-approximate Nash equilibria is O((log W)/α), where W is the sum of the players’ weights. Expand

Congestion games with malicious players

- Economics, Computer Science
- Games Econ. Behav.
- 2009

One counterintuitive phenomenon which is demonstrated is the "windfall of malice": paradoxically, when a myopically malicious player gains control of a fraction of the flow, the new equilibrium may be more favorable for the remaining rational players than the previous equilibrium. Expand

On nash equilibria for a network creation game

- Mathematics
- SODA 2006
- 2006

We study a network creation game recently proposed by Fabrikant, Luthra, Maneva, Papadimitriou and Shenker. In this game, each player (vertex) can create links (edges) to other players at a cost of α… Expand

On the windfall of friendship: inoculation strategies on social networks

- Economics, Computer Science
- EC '08
- 2008

Even though the windfall of friendship can never be negative, the social welfare does not increase monotonically with the extent to which players care for each other, and the computation of the worst and best Nash equilibrium is NP-hard. Expand

On a network creation game

- Computer Science
- PODC '03
- 2003

The Nash equilibria of this game are studied, and results suggesting that the "price of anarchy" in this context (the relative cost of the lack of coordination) may be modest are proved. Expand

Equilibria for networks with malicious users

- Mathematics, Computer Science
- Math. Program.
- 2007

A generalized model is defined, characterizations of flows at equilibrium are presented and bounds for the ratio of the social cost of a flow at equilibrium over the cost when centralized coordination among users is allowed are proved. Expand

The price of anarchy in network creation games

- Mathematics, Computer Science
- PODC '07
- 2007

A variant of both network creation games, in which each player desires to minimize α times the cost of its created links plus the maximum distance to the other players, is introduced, and the first aconstant upper bound for general α is proved, namely 2<sup><i>O</i></sup>(√lg <i>n</i>). Expand

The price of stability for network design with fair cost allocation

- Computer Science
- 45th Annual IEEE Symposium on Foundations of Computer Science
- 2004

It is established that the fair cost allocation protocol is in fact a useful mechanism for inducing strategic behavior to form near-optimal equilibria, and its results are extended to cases in which users are seeking to balance network design costs with latencies in the constructed network. Expand