Skip to main content
Log in

Equilibrium contained by counter-threats and complex equilibrium in secure strategies

  • Large Scale Systems Control
  • Published:
Automation and Remote Control Aims and scope Submit manuscript

Abstract

We present two generalizations of the concept of equilibrium in secure strategies. In equilibrium contained by counter-threats (ECCT), no player can increase its payoff by a unilateral deviation without creating a threat to lose more than it wins. This condition must be satisfied for any pseudo-equilibrium in the generalized sense and, therefore, any such equilibrium must belong to the set of ECCT. The second generalization is the complex equilibrium in secure strategies. The proposed concept allows identifying a hierarchical structure of mutual threats between players and will be useful for the analysis of problems with asymmetric behavior of players. Search algorithms for the proposed equilibria and their examples in matrix games are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Aleskerov, F.T., Game-Theoretic Modeling: An Attempt of Brief Discussion and a Forecast of Development, Zh. Novoi Econom. Assotsiatsii, 2013, no. 1(17), pp. 181–184.

    Google Scholar 

  2. Iskakov, M.B., Equilibrium in Safe Strategies, Autom. Remote Control, 2005, vol. 66, no. 3, pp. 465–478.

    Article  MathSciNet  MATH  Google Scholar 

  3. Novikov, D.A., Stimulirovanie v organizatsionnykh sistemakh (Stimulation in Organizational Systems), Moscow: Sinteg, 2003.

    Google Scholar 

  4. D’Aspremont, C. and Gérard-Varet, L.A., Stackelberg-solvable Games and Pre-Play Communication, J. Econom. Theory, 1980, vol. 23(2), pp. 201–217.

    Article  MathSciNet  MATH  Google Scholar 

  5. Bertrand, J., Book review of theorie mathematique de la richesse sociale and of recherches sur les principles mathematiques de la theorie des richesses, J. Savants, 1883, vol. 67, pp. 499–508.

    Google Scholar 

  6. Iskakov, M.B., Equilibrium in Safety Strategies and Equilibriums in Objections and Counter Objections in Noncooperative Games, Autom. Remote Control, 2008, vol. 69, no. 2, pp. 278–298.

    Article  MathSciNet  MATH  Google Scholar 

  7. Iskakov, M. and Iskakov, A., Solution of the Hotelling’s Game in Secure Strategies, Econom. Lett., 2012, vol. 117, pp. 115–118.

    Article  MathSciNet  MATH  Google Scholar 

  8. Iskakov, M. and Iskakov, A., Equilibrium in Secure Strategies, CORE Discussion Paper 2012/61, Universit é Catholique de Louvain, Center for Operations Research and Econometrics (CORE), 2012.

    MATH  Google Scholar 

  9. Iskakov, M. and Iskakov, A., Equilibrium in Secure Strategies—Intuitive Formulation, Working paper WP7/2012/06, National Research University Higher School of Economics, Moscow: Publishing House of the Higher School of Economics, 2012.

    MATH  Google Scholar 

  10. Iskakov, M., Iskakov, A., and Zakharov, A., Equilibria in Secure Strategies in the Tullock Contest, CORE Discussion Paper 2014/10, Université Catholique de Louvain, Center for Operations Research and Econometrics (CORE), 2014.

    Google Scholar 

  11. Sandomirskaya, M., Weakening of the Nash Equilibrium Concept: The Existence and Applications to the Hotelling Model, URL: http://ceshseru/announcements/122400243html (accessed September 7, 2014).

    Google Scholar 

  12. Stackelberg, H., Marktform und Gleichgewicht, Berlin: Springer, 1934.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. B. Iskakov.

Additional information

Original Russian Text © M.B. Iskakov, A.B. Iskakov, 2014, published in Upravlenie Bol’shimi Sistemami, 2014, No. 51, pp. 130–157.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Iskakov, M.B., Iskakov, A.B. Equilibrium contained by counter-threats and complex equilibrium in secure strategies. Autom Remote Control 77, 495–509 (2016). https://doi.org/10.1134/S0005117916030115

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0005117916030115

Keywords

Navigation