-
Nash Equilibrium Learning In Large Populations With First Order Payoff Modifications
Authors:
Matthew S. Hankins,
Jair Certório,
Tzuyu Jeng,
Nuno C. Martins
Abstract:
We establish Nash equilibrium learning -- convergence of the population state to a suitably defined Nash equilibria set -- for a class of payoff dynamical mechanism with a first order modification. The first order payoff modification can model aspects of the agents' bounded rationality, anticipatory or averaging terms in the payoff mechanism, or first order Padé approximations of delays. To obtain…
▽ More
We establish Nash equilibrium learning -- convergence of the population state to a suitably defined Nash equilibria set -- for a class of payoff dynamical mechanism with a first order modification. The first order payoff modification can model aspects of the agents' bounded rationality, anticipatory or averaging terms in the payoff mechanism, or first order Padé approximations of delays. To obtain our main results, we apply a combination of two nonstandard system-theoretic passivity notions.
△ Less
Submitted 22 April, 2025;
originally announced April 2025.
-
The Normal Play of the Domination Game
Authors:
João Marcos Brito,
Nicolas Martins,
Rudini Sampaio
Abstract:
In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. In 2024, Leo Versteegen obtained the celebrated proof of the Conjecture $\frac{3}{5}$ on this variant of the domination game, proposed by Kinnersley, West and Zamani in 2013. In this paper, we investigate for the first time the normal play of the domination game, which…
▽ More
In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. In 2024, Leo Versteegen obtained the celebrated proof of the Conjecture $\frac{3}{5}$ on this variant of the domination game, proposed by Kinnersley, West and Zamani in 2013. In this paper, we investigate for the first time the normal play of the domination game, which we call \textsc{Normal Domination Game}, that is an impartial game where the last to play wins. We use the Sprague-Grundy theory to prove that Alice (the first player) wins in the path $P_n$ if and only if $n$ is not a multiple of $4$, and wins in the cycle $C_n$ if and only if $n=4k+3$ for some integer $k$. Finally, we obtain a polynomial time algorithm to decide the winner for any disjoint union of paths and cycles in the \textsc{Normal Domination Game} and its natural partizan variant.
△ Less
Submitted 21 March, 2025; v1 submitted 18 February, 2025;
originally announced February 2025.
-
The Graph Coloring Game on $4\times n$-Grids
Authors:
Caroline Brosse,
Nicolas Martins,
Nicolas Nisse,
Rudini Sampaio
Abstract:
The graph coloring game is a famous two-player game (re)introduced by Bodlaender in $1991$. Given a graph $G$ and $k \in \mathbb{N}$, Alice and Bob alternately (starting with Alice) color an uncolored vertex with some color in $\{1,\cdots,k\}$ such that no two adjacent vertices receive a same color. If eventually all vertices are colored, then Alice wins and Bob wins otherwise. The game chromatic…
▽ More
The graph coloring game is a famous two-player game (re)introduced by Bodlaender in $1991$. Given a graph $G$ and $k \in \mathbb{N}$, Alice and Bob alternately (starting with Alice) color an uncolored vertex with some color in $\{1,\cdots,k\}$ such that no two adjacent vertices receive a same color. If eventually all vertices are colored, then Alice wins and Bob wins otherwise. The game chromatic number $χ_g(G)$ is the smallest integer $k$ such that Alice has a winning strategy with $k$ colors in $G$. It has been recently (2020) shown that, given a graph $G$ and $k\in \mathbb{N}$, deciding whether $χ_g(G)\leq k$ is PSPACE-complete. Surprisingly, this parameter is not well understood even in ``simple" graph classes. Let $P_n$ denote the path with $n\geq 1$ vertices. For instance, in the case of Cartesian grids, it is easy to show that $χ_g(P_m \times P_n) \leq 5$ since $χ_g(G)\leq Δ+1$ for any graph $G$ with maximum degree $Δ$. However, the exact value is only known for small values of $m$, namely $χ_g(P_1\times P_n)=3$, $χ_g(P_2\times P_n)=4$ and $χ_g(P_3\times P_n) =4$ for $n\geq 4$ [Raspaud, Wu, 2009]. Here, we prove that, for every $n\geq 18$, $χ_g(P_4\times P_n) =4$.
△ Less
Submitted 23 December, 2024;
originally announced December 2024.
-
Counterclockwise Dissipativity, Potential Games and Evolutionary Nash Equilibrium Learning
Authors:
Nuno C. Martins,
Jair Certório,
Matthew S. Hankins
Abstract:
We use system-theoretic passivity methods to study evolutionary Nash equilibria learning in large populations of agents engaged in strategic, non-cooperative interactions. The agents follow learning rules (rules for short) that capture their strategic preferences and a payoff mechanism ascribes payoffs to the available strategies. The population's aggregate strategic profile is the state of an ass…
▽ More
We use system-theoretic passivity methods to study evolutionary Nash equilibria learning in large populations of agents engaged in strategic, non-cooperative interactions. The agents follow learning rules (rules for short) that capture their strategic preferences and a payoff mechanism ascribes payoffs to the available strategies. The population's aggregate strategic profile is the state of an associated evolutionary dynamical system. Evolutionary Nash equilibrium learning refers to the convergence of this state to the Nash equilibria set of the payoff mechanism. Most approaches consider memoryless payoff mechanisms, such as potential games. Recently, methods using $δ$-passivity and equilibrium independent passivity (EIP) have introduced dynamic payoff mechanisms. However, $δ$-passivity does not hold when agents follow rules exhibiting ``imitation" behavior, such as in replicator dynamics. Conversely, EIP applies to the replicator dynamics but not to $δ$-passive rules. We address this gap using counterclockwise dissipativity (CCW). First, we prove that continuous memoryless payoff mechanisms are CCW if and only if they are potential games. Subsequently, under (possibly dynamic) CCW payoff mechanisms, we establish evolutionary Nash equilibrium learning for any rule within a convex cone spanned by imitation rules and continuous $δ$-passive rules.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
Differential Equation Approximations for Population Games using Elementary Probability
Authors:
Semih Kara,
Nuno C. Martins
Abstract:
Population games model the evolution of strategic interactions among a large number of uniform agents. Due to the agents' uniformity and quantity, their aggregate strategic choices can be approximated by the solutions of a class of ordinary differential equations. This mean-field approach has found to be an effective tool of analysis. However its current proofs rely on advanced mathematical techni…
▽ More
Population games model the evolution of strategic interactions among a large number of uniform agents. Due to the agents' uniformity and quantity, their aggregate strategic choices can be approximated by the solutions of a class of ordinary differential equations. This mean-field approach has found to be an effective tool of analysis. However its current proofs rely on advanced mathematical techniques, making them less accessible. In this article, we present a simpler derivation, using only undergraduate-level probability.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
DeepContrast: Deep Tissue Contrast Enhancement using Synthetic Data Degradations and OOD Model Predictions
Authors:
Nuno Pimpão Martins,
Yannis Kalaidzidis,
Marino Zerial,
Florian Jug
Abstract:
Microscopy images are crucial for life science research, allowing detailed inspection and characterization of cellular and tissue-level structures and functions. However, microscopy data are unavoidably affected by image degradations, such as noise, blur, or others. Many such degradations also contribute to a loss of image contrast, which becomes especially pronounced in deeper regions of thick sa…
▽ More
Microscopy images are crucial for life science research, allowing detailed inspection and characterization of cellular and tissue-level structures and functions. However, microscopy data are unavoidably affected by image degradations, such as noise, blur, or others. Many such degradations also contribute to a loss of image contrast, which becomes especially pronounced in deeper regions of thick samples. Today, best performing methods to increase the quality of images are based on Deep Learning approaches, which typically require ground truth (GT) data during training. Our inability to counteract blurring and contrast loss when imaging deep into samples prevents the acquisition of such clean GT data. The fact that the forward process of blurring and contrast loss deep into tissue can be modeled, allowed us to propose a new method that can circumvent the problem of unobtainable GT data. To this end, we first synthetically degraded the quality of microscopy images even further by using an approximate forward model for deep tissue image degradations. Then we trained a neural network that learned the inverse of this degradation function from our generated pairs of raw and degraded images. We demonstrated that networks trained in this way can be used out-of-distribution (OOD) to improve the quality of less severely degraded images, e.g. the raw data imaged in a microscope. Since the absolute level of degradation in such microscopy images can be stronger than the additional degradation introduced by our forward model, we also explored the effect of iterative predictions. Here, we observed that in each iteration the measured image contrast kept improving while detailed structures in the images got increasingly removed. Therefore, dependent on the desired downstream analysis, a balance between contrast improvement and retention of image details has to be found.
△ Less
Submitted 16 August, 2023;
originally announced August 2023.
-
Algorithms, hardness and graph products on a pursuit-evasion game
Authors:
Eurinardo Costa,
Nicolas Martins,
Rudini Sampaio
Abstract:
In the $(s,d)$-spy game over a graph, introduced by Cohen et al. in 2016, one spy and $k$ guards occupy vertices of a graph and, at each turn, each guard may move along one edge and the spy may move along at most $s$ edges. The guards win if, after a finite number of turns, they ensure that the spy always remains at distance at most $d$ from at least one guard. The guard number is the minimum numb…
▽ More
In the $(s,d)$-spy game over a graph, introduced by Cohen et al. in 2016, one spy and $k$ guards occupy vertices of a graph and, at each turn, each guard may move along one edge and the spy may move along at most $s$ edges. The guards win if, after a finite number of turns, they ensure that the spy always remains at distance at most $d$ from at least one guard. The guard number is the minimum number of guards such that the guards have a winning strategy. In this paper, we investigate the spy game variant in which the guards are placed first, before the spy. We obtain a polynomial time algorithm for every speed $s\geq 2$ and distance $d\geq 0$ when the number of guards is a constant, which leads to a fixed parameter tractable algorithm on the $P_4$-fewness of the graph. We also prove that the spy game is NP-hard even in bipartite graphs with bounded diameter, for every speed $s\geq 2$ and distance $d\geq 0$.
△ Less
Submitted 11 October, 2023; v1 submitted 17 October, 2021;
originally announced October 2021.
-
Hardness of some variants of the graph coloring game
Authors:
Thiago Marcilon,
Nicolas Martins,
Rudini Sampaio
Abstract:
Very recently, a long-standing open question proposed by Bodlaender in 1991 was answered: the graph coloring game is PSPACE-complete. In 2019, Andres and Lock proposed five variants of the graph coloring game and left open the question of PSPACE-hardness related to them. In this paper, we prove that these variants are PSPACE-complete for the graph coloring game and also for the greedy coloring gam…
▽ More
Very recently, a long-standing open question proposed by Bodlaender in 1991 was answered: the graph coloring game is PSPACE-complete. In 2019, Andres and Lock proposed five variants of the graph coloring game and left open the question of PSPACE-hardness related to them. In this paper, we prove that these variants are PSPACE-complete for the graph coloring game and also for the greedy coloring game, even if the number of colors is the chromatic number. Finally, we also prove that a connected version of the graph coloring game, proposed by Charpentier et al. in 2019, is PSPACE-complete.
△ Less
Submitted 23 November, 2019;
originally announced November 2019.
-
Channels, Remote Estimation and Queueing Systems With A Utilization-Dependent Component: A Unifying Survey Of Recent Results
Authors:
Varun Jog,
Richard J. La,
Michael Lin,
Nuno C. Martins
Abstract:
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design wit…
▽ More
In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design with performance guarantees of remote estimation and queueing systems. Causes for the dependency of a UDC on past utilization include the use of replenishable energy sources to power the transmission of information among the sub-components of a networked system, and the assistance of a human operator for servicing a queue. Our analysis unveils the similarity of the UDC models typically adopted in each of the research themes, and it reveals the differences in the objectives and technical approaches employed. We also identify new challenges and future research directions inspired by the cross-pollination among the central concepts, techniques, and problem formulations of the research themes discussed.
△ Less
Submitted 11 January, 2021; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Disseminacao de mensagens DTN com base em grupos de interesses
Authors:
Eric V. das Neves,
Ronaldo N. Martins,
Celso B. Carvalho,
Edjair Mota
Abstract:
Recent works explore social characteristics of nodes to improve message delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning techniques to create node groups organized by common interests. Messages are sent to target groups, and from there to the final destination. Simulation results using The ONE simulator show that the larger the group size the higher the message deliv…
▽ More
Recent works explore social characteristics of nodes to improve message delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning techniques to create node groups organized by common interests. Messages are sent to target groups, and from there to the final destination. Simulation results using The ONE simulator show that the larger the group size the higher the message delivery rate, that reaches 100% in some cases. The paper also presents results related to the groups of interest such as message delivery rat, delivery delay and an average number of hops to deliver messages. The overall results indicate that group-based routing is a promising research filed.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
Towards deductive verification of MPI programs against session types
Authors:
Eduardo R. B. Marques,
Francisco Martins,
Vasco T. Vasconcelos,
Nicholas Ng,
Nuno Martins
Abstract:
The Message Passing Interface (MPI) is the de facto standard message-passing infrastructure for developing parallel applications. Two decades after the first version of the library specification, MPI-based applications are nowadays routinely deployed on super and cluster computers. These applications, written in C or Fortran, exhibit intricate message passing behaviours, making it hard to statical…
▽ More
The Message Passing Interface (MPI) is the de facto standard message-passing infrastructure for developing parallel applications. Two decades after the first version of the library specification, MPI-based applications are nowadays routinely deployed on super and cluster computers. These applications, written in C or Fortran, exhibit intricate message passing behaviours, making it hard to statically verify important properties such as the absence of deadlocks. Our work builds on session types, a theory for describing protocols that provides for correct-by-construction guarantees in this regard. We annotate MPI primitives and C code with session type contracts, written in the language of a software verifier for C. Annotated code is then checked for correctness with the software verifier. We present preliminary results and discuss the challenges that lie ahead for verifying realistic MPI program compliance against session types.
△ Less
Submitted 10 December, 2013;
originally announced December 2013.
-
Memoryless Control Design for Persistent Surveillance under Safety Constraints
Authors:
Eduardo Arvelo,
Eric Kim,
Nuno C. Martins
Abstract:
This paper deals with the design of time-invariant memoryless control policies for robots that move in a finite two- dimensional lattice and are tasked with persistent surveillance of an area in which there are forbidden regions. We model each robot as a controlled Markov chain whose state comprises its position in the lattice and the direction of motion. The goal is to find the minimum number of…
▽ More
This paper deals with the design of time-invariant memoryless control policies for robots that move in a finite two- dimensional lattice and are tasked with persistent surveillance of an area in which there are forbidden regions. We model each robot as a controlled Markov chain whose state comprises its position in the lattice and the direction of motion. The goal is to find the minimum number of robots and an associated time-invariant memoryless control policy that guarantees that the largest number of states are persistently surveilled without ever visiting a forbidden state. We propose a design method that relies on a finitely parametrized convex program inspired by entropy maximization principles. Numerical examples are provided.
△ Less
Submitted 8 November, 2012; v1 submitted 25 September, 2012;
originally announced September 2012.
-
Fixed parameter algorithms for restricted coloring problems
Authors:
Victor Campos,
Cláudia Linhares-Sales,
Ana Karolinna Maia,
Nicolas Martins,
Rudini Menezes Sampaio
Abstract:
In this paper, we obtain polynomial time algorithms to determine the acyclic chromatic number, the star chromatic number, the Thue chromatic number, the harmonious chromatic number and the clique chromatic number of $P_4$-tidy graphs and $(q,q-4)$-graphs, for every fixed $q$. These classes include cographs, $P_4$-sparse and $P_4$-lite graphs. All these coloring problems are known to be NP-hard for…
▽ More
In this paper, we obtain polynomial time algorithms to determine the acyclic chromatic number, the star chromatic number, the Thue chromatic number, the harmonious chromatic number and the clique chromatic number of $P_4$-tidy graphs and $(q,q-4)$-graphs, for every fixed $q$. These classes include cographs, $P_4$-sparse and $P_4$-lite graphs. All these coloring problems are known to be NP-hard for general graphs. These algorithms are fixed parameter tractable on the parameter $q(G)$, which is the minimum $q$ such that $G$ is a $(q,q-4)$-graph. We also prove that every connected $(q,q-4)$-graph with at least $q$ vertices is 2-clique-colorable and that every acyclic coloring of a cograph is also nonrepetitive.
△ Less
Submitted 13 September, 2011; v1 submitted 30 June, 2011;
originally announced July 2011.
-
Coding for Additive White Noise Channels with Feedback Corrupted by Uniform Quantization or Bounded Noise
Authors:
Nuno C Martins,
Tsachy Weissman
Abstract:
We present simple coding strategies, which are variants of the Schalkwijk-Kailath scheme, for communicating reliably over additive white noise channels in the presence of corrupted feedback. More specifically, we consider a framework comprising an additive white forward channel and a backward link which is used for feedback. We consider two types of corruption mechanisms in the backward link. Th…
▽ More
We present simple coding strategies, which are variants of the Schalkwijk-Kailath scheme, for communicating reliably over additive white noise channels in the presence of corrupted feedback. More specifically, we consider a framework comprising an additive white forward channel and a backward link which is used for feedback. We consider two types of corruption mechanisms in the backward link. The first is quantization noise, i.e., the encoder receives the quantized values of the past outputs of the forward channel. The quantization is uniform, memoryless and time invariant (that is, symbol-by-symbol scalar quantization), with bounded quantization error. The second corruption mechanism is an arbitrarily distributed additive bounded noise in the backward link. Here we allow symbol-by-symbol encoding at the input to the backward channel. We propose simple explicit schemes that guarantee positive information rate, in bits per channel use, with positive error exponent. If the forward channel is additive white Gaussian then our schemes achieve capacity, in the limit of diminishing amplitude of the noise components at the backward link, while guaranteeing that the probability of error converges to zero as a doubly exponential function of the block length. Furthermore, if the forward channel is additive white Gaussian and the backward link consists of an additive bounded noise channel, with signal-to-noise ratio (SNR) constrained symbol-by-symbol encoding, then our schemes are also capacity-achieving in the limit of high SNR.
△ Less
Submitted 11 September, 2006;
originally announced September 2006.