-
Forgiveness is an Adaptation in Iterated Prisoner's Dilemma with Memory
Authors:
Meliksah Turker,
Haluk O. Bingol
Abstract:
The Prisoner's Dilemma is used to represent many real life phenomena whether from the civilized world of humans or from the wild life of the other living. Researchers working on iterated prisoner's dilemma (IPD) with limited memory inspected the outcome of different forgetting strategies in homogeneous environment, within which all agents adopt the same forgetting strategy at a time. In this work,…
▽ More
The Prisoner's Dilemma is used to represent many real life phenomena whether from the civilized world of humans or from the wild life of the other living. Researchers working on iterated prisoner's dilemma (IPD) with limited memory inspected the outcome of different forgetting strategies in homogeneous environment, within which all agents adopt the same forgetting strategy at a time. In this work, with the intention to represent real life more realistically, we improve existing forgetting strategies, offer new ones, and conduct experiments in heterogeneous environment that contains mixed agents and compare the results with previous research as well as homogeneous environment. Our findings show that the outcome depends on the type of the environment, and is just the opposite for homogeneous and heterogeneous ones, opposing the existing literature in IPD. Consequently, forgetting and forgiving defectors is the supreme memory management strategy in a competitive, heterogeneous environment. Therefore, forgiveness is an adaptation.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
Optimism brings accurate perception in Iterated Prisoner's Dilemma
Authors:
Orhun Gorkem,
Haluk O. Bingol
Abstract:
We analyze an extended model of the Iterated Prisoner's Dilemma where agents decide to play based on the data from their limited memory or recommendations. The cooperators can decide whether to play with the matched opponent or not. The agents' decisions are directly linked to their level of optimism since they decide to play if they believe the opponent has a high probability of cooperating. Opti…
▽ More
We analyze an extended model of the Iterated Prisoner's Dilemma where agents decide to play based on the data from their limited memory or recommendations. The cooperators can decide whether to play with the matched opponent or not. The agents' decisions are directly linked to their level of optimism since they decide to play if they believe the opponent has a high probability of cooperating. Optimism is precisely tuned by parameters optimism threshold and tolerance. Our experiment showed that being optimistic is better for cooperators as it leads to more accurate exploration in the multi-agent system, which tolerates the vulnerability against defectors.
△ Less
Submitted 2 June, 2022; v1 submitted 2 December, 2021;
originally announced December 2021.
-
Multi-layer network approach in modeling epidemics in an urban town
Authors:
Meliksah Turker,
Haluk O. Bingol
Abstract:
The last three years have been an extraordinary time with the Covid-19 pandemic killing millions, affecting and distressing billions of people worldwide. Authorities took various measures such as turning school and work to remote and prohibiting social relations via curfews. In order to mitigate the negative impact of the epidemics, researchers tried to estimate the future of the pandemic for diff…
▽ More
The last three years have been an extraordinary time with the Covid-19 pandemic killing millions, affecting and distressing billions of people worldwide. Authorities took various measures such as turning school and work to remote and prohibiting social relations via curfews. In order to mitigate the negative impact of the epidemics, researchers tried to estimate the future of the pandemic for different scenarios, using forecasting techniques and epidemics simulations on networks. Intending to better represent the real-life in an urban town in high resolution, we propose a novel multi-layer network model, where each layer corresponds to a different interaction that occurs daily, such as "household", "work" or "school". Our simulations indicate that locking down "friendship" layer has the highest impact on slowing down epidemics. Hence, our contributions are twofold, first we propose a parametric network generator model; second, we run SIR simulations on it and show the impact of layers.
△ Less
Submitted 25 January, 2023; v1 submitted 6 September, 2021;
originally announced September 2021.
-
Getting recommendation is not always better
Authors:
Zeynep B. Cinar,
Haluk O. Bingol
Abstract:
We present an extended version of the Iterated Prisoner's Dilemma game in which agents with limited memory receive recommendations about the unknown opponent to decide whether to play with. Since agents can receive more than one recommendations about the same opponent, they have to evaluate the recommendations according to their disposition such as optimist, pessimist, or realist. They keep their…
▽ More
We present an extended version of the Iterated Prisoner's Dilemma game in which agents with limited memory receive recommendations about the unknown opponent to decide whether to play with. Since agents can receive more than one recommendations about the same opponent, they have to evaluate the recommendations according to their disposition such as optimist, pessimist, or realist. They keep their firsthand experience in their memory. Since agents have limited memory, they have to use different forgetting strategies. Our results show that getting recommendations not always perform better. We observe that realist performs the best and optimist the worse.
△ Less
Submitted 14 February, 2021; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Computational Models for Commercial Advertisements in Social Networks
Authors:
Samet Atdag,
Haluk O. Bingol
Abstract:
Identifying noteworthy spreaders in a network is essential for understanding the spreading process and controlling the reach of the spread in the network. The nodes that are holding more intrinsic power to extend the reach of the spread are important due to demand for various applications such as viral marketing, controlling rumor spreading or get a better understanding of spreading of the disease…
▽ More
Identifying noteworthy spreaders in a network is essential for understanding the spreading process and controlling the reach of the spread in the network. The nodes that are holding more intrinsic power to extend the reach of the spread are important due to demand for various applications such as viral marketing, controlling rumor spreading or get a better understanding of spreading of the diseases. As an application of the viral marketing, maximization of the reach with a fixed budget is a fundamental requirement in the advertising business. Distributing a fixed number of promotional items for maximizing the viral reach can leverage influencer detection methods. For detecting such "influencer" nodes, there are local metrics such as degree centrality (mostly used as in-degree centrality) or global metrics such as k-shell decomposition or eigenvector centrality. All the methods can rank graphs but they all have limitations and there is still no de-facto method for influencer detection in the domain.
In this paper, we propose an extended k-shell algorithm which better utilizes the k-shell decomposition for identifying viral spreader nodes using the topological features of the network. We use Susceptible-Infected-Recovered model for the simulations of the spreading process in real-life networks and the simulations demonstrates that our approach can reach to up to 36% larger crowds within the same network, with the same number of initial spreaders.
△ Less
Submitted 30 April, 2019;
originally announced April 2019.
-
Community detection using boundary nodes in complex networks
Authors:
Mursel Tasgin,
Haluk O. Bingol
Abstract:
We propose a new local community detection algorithm that finds communities by identifying borderlines between them using boundary nodes. Our method performs label propagation for community detection, where nodes decide their labels based on the largest "benefit score" exhibited by their immediate neighbors as an attractor to their communities. We try different metrics and find that using the numb…
▽ More
We propose a new local community detection algorithm that finds communities by identifying borderlines between them using boundary nodes. Our method performs label propagation for community detection, where nodes decide their labels based on the largest "benefit score" exhibited by their immediate neighbors as an attractor to their communities. We try different metrics and find that using the number of common neighbors as benefit scores leads to better decisions for community structure. The proposed algorithm has a local approach and focuses only on boundary nodes during iterations of label propagation, which eliminates unnecessary steps and shortens the overall execution time. It preserves small communities as well as big ones and can outperform other algorithms in terms of the quality of the identified communities, especially when the community structure is subtle. The algorithm has a distributed nature and can be used on large networks in a parallel fashion.
△ Less
Submitted 3 August, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Community detection using preference networks
Authors:
Mursel Tasgin,
Haluk O. Bingol
Abstract:
Community detection is the task of identifying clusters or groups of nodes in a network where nodes within the same group are more connected with each other than with nodes in different groups. It has practical uses in identifying similar functions or roles of nodes in many biological, social and computer networks. With the availability of very large networks in recent years, performance and scala…
▽ More
Community detection is the task of identifying clusters or groups of nodes in a network where nodes within the same group are more connected with each other than with nodes in different groups. It has practical uses in identifying similar functions or roles of nodes in many biological, social and computer networks. With the availability of very large networks in recent years, performance and scalability of community detection algorithms become crucial, i.e. if time complexity of an algorithm is high, it can not run on large networks. In this paper, we propose a new community detection algorithm, which has a local approach and is able to run on large networks. It has a simple and effective method; given a network, algorithm constructs a preference network of nodes where each node has a single outgoing edge showing its preferred node to be in the same community with. In such a preference network, each connected component is a community. Selection of the preferred node is performed using similarity based metrics of nodes. We use two alternatives for this purpose which can be calculated in 1-neighborhood of nodes, i.e. number of common neighbors of selector node and its neighbors and, the spread capability of neighbors around the selector node which is calculated by the gossip algorithm of Lind et.al. Our algorithm is tested on both computer generated LFR networks and real-life networks with ground-truth community structure. It can identify communities accurately in a fast way. It is local, scalable and suitable for distributed execution on large networks.
△ Less
Submitted 12 November, 2017; v1 submitted 28 August, 2017;
originally announced August 2017.
-
The Dose of the Threat Makes the Resistance for Cooperation
Authors:
Uzay Cetin,
Haluk O. Bingol
Abstract:
We propose to reformulate the payoff matrix structure of Prisoner's Dilemma Game, by introducing threat and greed factors, and show their effect on the co-evolution of memory and cooperation. Our findings are as follows. (i) Memory protects cooperation. (ii) To our surprise, greater memory size is unfavorable to evolutionary success when there is no threat. In the absence of threat, subsequent gen…
▽ More
We propose to reformulate the payoff matrix structure of Prisoner's Dilemma Game, by introducing threat and greed factors, and show their effect on the co-evolution of memory and cooperation. Our findings are as follows. (i) Memory protects cooperation. (ii) To our surprise, greater memory size is unfavorable to evolutionary success when there is no threat. In the absence of threat, subsequent generations lose their memory and are consequently invaded by defectors. (iii) In contrast, the presence of an appropriate level of threat triggers the emergence of a self-protection mechanism for cooperation, which manifests itself as an increase in memory size within subsequent generations. On the evolutionary level, memory size acts like an immune response of the generations against aggressive defection. (iv) Even more extreme threat results again in defection. Our findings boil down to the following: The dose of the threat makes the resistance for cooperation.
△ Less
Submitted 14 December, 2016; v1 submitted 21 May, 2016;
originally announced May 2016.
-
Context Sensitive Article Ranking with Citation Context Analysis
Authors:
Metin Doslu,
Haluk O. Bingol
Abstract:
It is hard to detect important articles in a specific context. Information retrieval techniques based on full text search can be inaccurate to identify main topics and they are not able to provide an indication about the importance of the article. Generating a citation network is a good way to find most popular articles but this approach is not context aware.
The text around a citation mark is g…
▽ More
It is hard to detect important articles in a specific context. Information retrieval techniques based on full text search can be inaccurate to identify main topics and they are not able to provide an indication about the importance of the article. Generating a citation network is a good way to find most popular articles but this approach is not context aware.
The text around a citation mark is generally a good summary of the referred article. So citation context analysis presents an opportunity to use the wisdom of crowd for detecting important articles in a context sensitive way. In this work, we analyze citation contexts to rank articles properly for a given topic. The model proposed uses citation contexts in order to create a directed and weighted citation network based on the target topic. We create a directed and weighted edge between two articles if citation context contains terms related with the target topic. Then we apply common ranking algorithms in order to find important articles in this newly created network. We showed that this method successfully detects a good subset of most prominent articles in a given topic. The biggest contribution of this approach is that we are able to identify important articles for a given search term even though these articles do not contain this search term. This technique can be used in other linked documents including web pages, legal documents, and patents.
△ Less
Submitted 26 April, 2016; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Iterated Prisoners Dilemma with limited attention
Authors:
Uzay Çetin,
Haluk O. Bingol
Abstract:
How attention scarcity effects the outcomes of a game? We present our findings on a version of the Iterated Prisoners Dilemma (IPD) game in which players can accept or refuse to play with their partner. We study the memory size effect on determining the right partner to interact with. We investigate the conditions under which the cooperators are more likely to be advantageous than the defectors. T…
▽ More
How attention scarcity effects the outcomes of a game? We present our findings on a version of the Iterated Prisoners Dilemma (IPD) game in which players can accept or refuse to play with their partner. We study the memory size effect on determining the right partner to interact with. We investigate the conditions under which the cooperators are more likely to be advantageous than the defectors. This work demonstrates that, in order to beat defection, players do not need a full memorization of each action of all opponents. There exists a critical attention capacity threshold to beat defectors. This threshold depends not only on the ratio of the defectors in the population but also on the attention allocation strategy of the players.
△ Less
Submitted 24 November, 2014; v1 submitted 2 May, 2014;
originally announced May 2014.
-
Attention Competition with Advertisement
Authors:
Uzay Cetin,
Haluk O. Bingol
Abstract:
In the new digital age, information is available in large quantities. Since information consumes primarily the attention of its recipients, the scarcity of attention is becoming the main limiting factor. In this study, we investigate the impact of advertisement pressure on a cultural market where consumers have a limited attention capacity. A model of competition for attention is developed and inv…
▽ More
In the new digital age, information is available in large quantities. Since information consumes primarily the attention of its recipients, the scarcity of attention is becoming the main limiting factor. In this study, we investigate the impact of advertisement pressure on a cultural market where consumers have a limited attention capacity. A model of competition for attention is developed and investigated analytically and by simulation. Advertisement is found to be much more effective when attention capacity of agents is extremely scarce. We have observed that the market share of the advertised item improves if dummy items are introduced to the market while the strength of the advertisement is kept constant.
△ Less
Submitted 7 August, 2014; v1 submitted 1 November, 2012;
originally announced November 2012.
-
Gossip on Weighted Networks
Authors:
Mursel Tasgin,
Haluk O. Bingol
Abstract:
We investigate how suitable a weighted network is for gossip spreading. The proposed model is based on the gossip spreading model introduced by Lind et.al. on unweighted networks. Weight represents "friendship." Potential spreader prefers not to spread if the victim of gossip is a "close friend". Gossip spreading is related to the triangles and cascades of triangles. It gives more insight about th…
▽ More
We investigate how suitable a weighted network is for gossip spreading. The proposed model is based on the gossip spreading model introduced by Lind et.al. on unweighted networks. Weight represents "friendship." Potential spreader prefers not to spread if the victim of gossip is a "close friend". Gossip spreading is related to the triangles and cascades of triangles. It gives more insight about the structure of a network.
We analyze gossip spreading on real weighted networks of human interactions. 6 co-occurrence and 7 social pattern networks are investigated. Gossip propagation is found to be a good parameter to distinguish co-occurrence and social pattern networks. As a comparison some miscellaneous networks and computer generated networks based on ER, BA, WS models are also investigated. They are found to be quite different than the human interaction networks.
△ Less
Submitted 5 May, 2012; v1 submitted 1 January, 2012;
originally announced January 2012.