|Appears in Collections:||Computing Science and Mathematics Journal Articles|
|Peer Review Status:||Refereed|
|Title:||The effect of memory size on the evolutionary stability of strategies in iterated prisoner's dilemma|
iterated prisoner’s dilemma
|Citation:||Li J & Kendall G (2014) The effect of memory size on the evolutionary stability of strategies in iterated prisoner's dilemma, IEEE Transactions on Evolutionary Computation, 18 (6), pp. 819-826.|
|Abstract:||The iterated prisoner's dilemma is an ideal model for the evolution of cooperation among payoff-maximizing individuals. It has attracted wide interest in the development of novel strategies since the success of tit-for-tat in Axelrod's iterated prisoner's dilemma competitions. Every strategy for iterated prisoner's dilemma utilizes a certain length of historical interactions with the opponent, which is regarded as the size of the memory, in making its choices. Intuitively, longer memory strategies must have an advantage over shorter memory strategies. In practice, however, most of the well known strategies are short memory strategies that utilize only the recent history of previous interactions. In this paper, the effect of the memory size of strategies on their evolutionary stability in both infinite length and indefinite length n-person iterated prisoner's dilemma is studied. Based on the concept of a counter strategy, we develop a theoretical methodology for evaluating the evolutionary stability of strategies and prove that longer memory strategies outperform shorter memory strategies statistically in the sense of evolutionary stability. We also give an example of a memory-two strategy to show how the theoretical study of evolutionary stability assists in developing novel strategies.|
|Rights:||© 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
|Affiliation:||Computing Science - CSM Dept|
University of Nottingham
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.