Skip to main content

Showing 1–6 of 6 results for author: Dziubiński, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.12943  [pdf, ps, other

    cs.GT

    Improved Approximation Ratio for Strategyproof Facility Location on a Cycle

    Authors: Krzysztof Rogowski, Marcin Dziubiński

    Abstract: We study the problem of design of strategyproof in expectation (SP) mechanisms for facility location on a cycle, with the objective of minimizing the sum of costs of $n$ agents. We show that there exists an SP mechanism that attains an approximation ratio of $7/4$ with respect to the sum of costs of the agents, thus improving the best known upper bound of $2-2/n$ in the cases of $n \geq 5$. The me… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: This is a full version of a paper accepted to IJCAI25

    MSC Class: 91B26 (Primary) 68Q25; 91A80 (Secondary) ACM Class: F.2.2; I.2.11

  2. arXiv:2403.16799  [pdf, other

    cs.GT

    Efficient Method for Finding Optimal Strategies in Chopstick Auctions with Uniform Objects Values

    Authors: Stanisław Kaźmierowski, Marcin Dziubiński

    Abstract: We propose an algorithm for computing Nash equilibria (NE) in a class of conflicts with multiple battlefields with uniform battlefield values and a non-linear aggregation function. By expanding the symmetrization idea of Hart [9], proposed for the Colonel Blotto game, to the wider class of symmetric conflicts with multiple battlefields, we reduce the number of strategies of the players by an expon… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Accepted for AAMAS-24 conference

    MSC Class: 91A68 ACM Class: G.2.1; J.4

  3. Computation of Nash Equilibria of Attack and Defense Games on Networks

    Authors: Stanisław Kaźmierowski, Marcin Dziubiński

    Abstract: We consider the computation of a Nash equilibrium in attack and defense games on networks (Bloch et al. [1]). We prove that a Nash Equilibrium of the game can be computed in polynomial time with respect to the number of nodes in the network. We propose an algorithm that runs in O(n4) time with respect to the number of nodes of the network, n.

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: Presented at SAGT-2023

    MSC Class: ACM-class: J.4

  4. arXiv:2305.04696  [pdf, other

    cs.GT

    Discrete Two Player All-Pay Auction with Complete Information

    Authors: Marcin Dziubiński, Krzysztof Jahn

    Abstract: We study discrete two player all-pay auction with complete information. We provide full characterization of mixed strategy Nash equilibria and show that they constitute a subset of Nash equilibria of discrete General Lotto game. We show that equilibria are not unique in general but they are interchangeable. We also show that equilibrium payoffs are unique, unless valuation of at least one of the p… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  5. arXiv:2001.03132  [pdf, other

    econ.TH cs.GT

    A game of hide and seek in networks

    Authors: Francis Bloch, Bhaskar Dutta, Marcin Dziubinski

    Abstract: We propose and study a strategic model of hiding in a network, where the network designer chooses the links and his position in the network facing the seeker who inspects and disrupts the network. We characterize optimal networks for the hider, as well as equilibrium hiding and seeking strategies on these networks. We show that optimal networks are either equivalent to cycles or variants of a core… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 27 pages

  6. arXiv:1804.07287  [pdf, other

    cs.GT

    Individual Security and Network Design with Malicious Nodes

    Authors: Tomasz Janus, Mateusz Skomra, Marcin Dziubiński

    Abstract: Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient but the inefficiencies can be mitigated by a careful network design. Is net… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 19 pages, 3 figures