Strategic and secure interactions in networks
The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an inter...
Uloženo v:
| Hlavní autor: | |
|---|---|
| Médium: | Dissertation |
| Jazyk: | angličtina |
| Vydáno: |
ProQuest Dissertations & Theses
01.01.2010
|
| Témata: | |
| ISBN: | 1124530290, 9781124530291 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an interdisciplinary approach by drawing on theories and models from economics, sociology, as well as computer science, and using methodologies that include both theories and behavioral experiments. First, we consider biased voting in networks, which models distributed collective decision making processes where individuals in a network must balance between their private biases or preferences with a collective goal of consensus. Our study of this problem is two-folded. On the theoretical side, we start by introducing a diffusion model called biased voter model, which is a natural extension of the classic voter model. Among other results, we show in the presence of biases, no matter how small, there exists certain networks where it takes exponential time to converge to a consensus through distributed interaction in networks. This is a stark and interesting contrast to the well-known result that it always takes polynomial time to converge in the voter model, when there are no biases. On the experimental side, a group human subjects were arranged in various carefully designed virtual networks to solve the biased voting problem. Along with analyses of how collective and individual performance vary with network structure and incentives generally, we find there are well-studied network topologies in which the minority preference consistently wins globally, and that the presence of "extremist" individuals, or the awareness of opposing incentives, reliably improve collective performance. Second, we consider bargaining in networks, which has long been studied by economists and sociologists. A basic premise behind the many theoretical study of bargaining in networks is that pure topological differences in agents' network positions endow them with different bargaining power. Complementary to these theories, we conduct a series of controlled behavioral experiments, where human subjects were arranged in various carefully designed virtual networks to playing bargaining games. Along with other findings of how individual and collective performance vary with network structures and individual playing styles, we find that the number of neighbors one can negotiate with confers bargaining power, whereas the limit on the number of deals one can close undermines it, and we find that competitions from distant parts of the network, though invisible locally, also play a significant and subtle role in shaping bargaining powers. And last, we consider the question of how interactions in networks can be made secure. Traditional methods and tools from cryptography, for example secure multi-party computation, can be applied only if each party can talk to everyone else directly; but cannot be directly applied if interactions are distributed over a network without completely eradicating the distributed nature. We develop a general 'compiler' that turns each algorithm from a broad class collectively known as message-passing algorithms into a secure one that has exactly the same functionality and communication pattern. And we show a fundamental trade-off between preserving the distributed nature of communication and the level of security one can hope for. |
|---|---|
| AbstractList | The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an interdisciplinary approach by drawing on theories and models from economics, sociology, as well as computer science, and using methodologies that include both theories and behavioral experiments. First, we consider biased voting in networks, which models distributed collective decision making processes where individuals in a network must balance between their private biases or preferences with a collective goal of consensus. Our study of this problem is two-folded. On the theoretical side, we start by introducing a diffusion model called biased voter model, which is a natural extension of the classic voter model. Among other results, we show in the presence of biases, no matter how small, there exists certain networks where it takes exponential time to converge to a consensus through distributed interaction in networks. This is a stark and interesting contrast to the well-known result that it always takes polynomial time to converge in the voter model, when there are no biases. On the experimental side, a group human subjects were arranged in various carefully designed virtual networks to solve the biased voting problem. Along with analyses of how collective and individual performance vary with network structure and incentives generally, we find there are well-studied network topologies in which the minority preference consistently wins globally, and that the presence of "extremist" individuals, or the awareness of opposing incentives, reliably improve collective performance. Second, we consider bargaining in networks, which has long been studied by economists and sociologists. A basic premise behind the many theoretical study of bargaining in networks is that pure topological differences in agents' network positions endow them with different bargaining power. Complementary to these theories, we conduct a series of controlled behavioral experiments, where human subjects were arranged in various carefully designed virtual networks to playing bargaining games. Along with other findings of how individual and collective performance vary with network structures and individual playing styles, we find that the number of neighbors one can negotiate with confers bargaining power, whereas the limit on the number of deals one can close undermines it, and we find that competitions from distant parts of the network, though invisible locally, also play a significant and subtle role in shaping bargaining powers. And last, we consider the question of how interactions in networks can be made secure. Traditional methods and tools from cryptography, for example secure multi-party computation, can be applied only if each party can talk to everyone else directly; but cannot be directly applied if interactions are distributed over a network without completely eradicating the distributed nature. We develop a general 'compiler' that turns each algorithm from a broad class collectively known as message-passing algorithms into a secure one that has exactly the same functionality and communication pattern. And we show a fundamental trade-off between preserving the distributed nature of communication and the level of security one can hope for. |
| Author | Tan, Jinsong |
| Author_xml | – sequence: 1 givenname: Jinsong surname: Tan fullname: Tan, Jinsong |
| BookMark | eNotjs1KAzEURgMqaMe-w-B-4ObmZ5KlFK1CoYt2XzKZGx2VpE0y-PoO1NXH2ZzzrdhtTJFu2IpzlEoAWrhn61KmAQCsECDxgXWHml2lj8m3Lo5tIT9naqdYKTtfpxTLAm2k-pvyd3lkd8H9FFr_b8OOry_HzVu322_fN8-77lNa2_WoAu-tRzSBHEjgo-0Hrl0ArgGVBsmDMAReO3Sg7AijQhqEpgEDatGwp6v2nNNlplJPX2nOcSmejDJgkC___wAaHz8M |
| ContentType | Dissertation |
| Copyright | Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
| Copyright_xml | – notice: Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works. |
| DBID | 053 054 0BH 0OR AMEAF CBPLH EU9 G20 M8- P6D PHGZT PKEHL PQEST PQQKQ PQUKI |
| DatabaseName | Dissertations & Theses Europe Full Text: Science & Technology Dissertations & Theses Europe Full Text: Social Sciences ProQuest Dissertations and Theses Professional Dissertations & Theses @ University of Pennsylvania ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection ProQuest Dissertations & Theses A&I ProQuest Dissertations & Theses Global ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection ProQuest Dissertations and Theses Professional ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection ProQuest Dissertations & Theses Global Dissertations & Theses Europe Full Text: Science & Technology Dissertations & Theses @ University of Pennsylvania Dissertations & Theses Europe Full Text: Social Sciences ProQuest One Academic UKI Edition ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection ProQuest One Academic ProQuest Dissertations & Theses A&I ProQuest One Academic (New) |
| DatabaseTitleList | ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection |
| Database_xml | – sequence: 1 dbid: G20 name: ProQuest Dissertations & Theses Global url: https://www.proquest.com/pqdtglobal1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Economics Computer Science |
| ExternalDocumentID | 2298970901 |
| Genre | Dissertation/Thesis |
| GroupedDBID | 053 054 0BH 0OR 8R4 8R5 AMEAF CBPLH EU9 G20 M8- P6D PHGZT PKEHL PQEST PQQKQ PQUKI Q2X |
| ID | FETCH-LOGICAL-h499-725f179c228fea0401d97b16af0160256041f38e0c6a2a059d0d52eb36eb2f263 |
| IEDL.DBID | G20 |
| ISBN | 1124530290 9781124530291 |
| IngestDate | Mon Jun 30 07:17:32 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-h499-725f179c228fea0401d97b16af0160256041f38e0c6a2a059d0d52eb36eb2f263 |
| Notes | SourceType-Dissertations & Theses-1 ObjectType-Dissertation/Thesis-1 content type line 12 |
| PQID | 858082109 |
| PQPubID | 18750 |
| ParticipantIDs | proquest_journals_858082109 |
| PublicationCentury | 2000 |
| PublicationDate | 20100101 |
| PublicationDateYYYYMMDD | 2010-01-01 |
| PublicationDate_xml | – month: 01 year: 2010 text: 20100101 day: 01 |
| PublicationDecade | 2010 |
| PublicationYear | 2010 |
| Publisher | ProQuest Dissertations & Theses |
| Publisher_xml | – name: ProQuest Dissertations & Theses |
| SSID | ssib000933042 |
| Score | 1.5276731 |
| Snippet | The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining,... |
| SourceID | proquest |
| SourceType | Aggregation Database |
| SubjectTerms | Behavioral Sciences Computer science Economics |
| Title | Strategic and secure interactions in networks |
| URI | https://www.proquest.com/docview/858082109 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60CoqHalXUquzBa3Dz2E1y8qAWT8VDD72VbB7oZatN9feb7CalIHjxGAIhTDKTeXyZD-CuLA1jhDukmlIgJpsKSUMiwlFH0Huwh9R1ZBN8OhXzuXxN2ByfYJXZJnaG2ix1zJHfi0qE1wqX8uHjE0XSqFhcTQwau7DHhaw65oZt72cTrAengkV6HJm7POUx_mWCu3dlMvznjo7h6Gmrnn4CO7YdwTAzNRRJcUdwkP8f-1NAuSGtLlRrCh8T7raIbSNW_ScHHwZF28PD_RnMJs-zxxeUSBPQWwheECeVCzqmCRHOqqCh2Eje4Fq52Eou-jcMOypsqWtFVPCtTGkqEiLqOoTYjtT0HAbtsrUXUBDHNeVUMy0cq7GSOsi4odqERYx19BLGWS6LdPH9YiOUqz9nx3DYl-FjLuMaBuvVl72Bff29fver2-4YfwApxKTZ |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V07T8MwED6VglTEUCggoDwywGiR2E5iD4iBUlq1VAwdukWJH4IlhaaA-E_8SOykriohsXVgtCxZke9yL393H8Cl70tKcaxRmvkMUZ6FiEtsEY7Cgt6NPSS6JJuIRyM2mfCnGny7XhgLq3Q2sTTUcipsjfyahcx4q8Dnt69vyJJG2cdVx6BRacVAfX2ajK246XeMeK8w7t6P73poQSqAnk1wj2IcaqODAmOmVWo0OJA8zoIo1XbUmvX_NNCEKV9EKU5N7CF9GWKTcUYmBdU4IubYDdikJA4sgPBhNdha1gZMDEMtGw93Q6XcOvhl8Us31m3-rwvYhZ3OClpgD2oqb0HT8VB4C7PUgobrri72Ablxu8JLc-kV9jlBeXYoxqxq4SjMwssr8HtxAON1fPwh1PNpro7AwzoWJCaCCqZpFKRcMB5mREhziFSaHEPbiSFZ_NZFspTByZ-7F9DojR-HybA_GrRhuwIc2KrNKdTns3d1BlviY_5SzM5LDfIgWbPAfgBTlv4z |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.genre=dissertation&rft.title=Strategic+and+secure+interactions+in+networks&rft.DBID=053%3B054%3B0BH%3B0OR%3BAMEAF%3BCBPLH%3BEU9%3BG20%3BM8-%3BP6D%3BPHGZT%3BPKEHL%3BPQEST%3BPQQKQ%3BPQUKI&rft.PQPubID=18750&rft.au=Tan%2C+Jinsong&rft.date=2010-01-01&rft.pub=ProQuest+Dissertations+%26+Theses&rft.isbn=1124530290&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=2298970901 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/sc.gif&client=summon&freeimage=true |

