{"day":"09","author":[{"last_name":"Chatterjee","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Krishnendu Chatterjee","orcid":"0000-0002-4561-241X"},{"orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Thomas Henzinger","last_name":"Henzinger","first_name":"Thomas A"},{"first_name":"Marcin","last_name":"Jurdziński","full_name":"Jurdziński, Marcin"}],"page":"160 - 169","doi":"10.1109/LICS.2004.1319610","type":"conference","date_updated":"2021-01-12T07:53:01Z","month":"08","conference":{"name":"LICS: Logic in Computer Science"},"publication_status":"published","extern":1,"date_published":"2004-08-09T00:00:00Z","citation":{"ieee":"K. Chatterjee, T. A. Henzinger, and M. Jurdziński, “Games with secure equilibria,” presented at the LICS: Logic in Computer Science, 2004, pp. 160–169.","mla":"Chatterjee, Krishnendu, et al. Games with Secure Equilibria. IEEE, 2004, pp. 160–69, doi:10.1109/LICS.2004.1319610.","short":"K. Chatterjee, T.A. Henzinger, M. Jurdziński, in:, IEEE, 2004, pp. 160–169.","ama":"Chatterjee K, Henzinger TA, Jurdziński M. Games with secure equilibria. In: IEEE; 2004:160-169. doi:10.1109/LICS.2004.1319610","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Marcin Jurdziński. “Games with Secure Equilibria,” 160–69. IEEE, 2004. https://doi.org/10.1109/LICS.2004.1319610.","apa":"Chatterjee, K., Henzinger, T. A., & Jurdziński, M. (2004). Games with secure equilibria (pp. 160–169). Presented at the LICS: Logic in Computer Science, IEEE. https://doi.org/10.1109/LICS.2004.1319610","ista":"Chatterjee K, Henzinger TA, Jurdziński M. 2004. Games with secure equilibria. LICS: Logic in Computer Science, 160–169."},"abstract":[{"text":"In 2-player non-zero-sum games, Nash equilibria capture the options for rational behavior if each player attempts to maximize her payoff. In contrast to classical game theory, we consider lexicographic objectives: first, each player tries to maximize her own payoff, and then, the player tries to minimize the opponent's payoff. Such objectives arise naturally in the verification of systems with multiple components. There, instead of proving that each component satisfies its specification no matter how the other components behave, it often suffices to prove that each component satisfies its specification provided that the other components satisfy their specifications. We say that a Nash equilibrium is secure if it is an equilibrium with respect to the lexicographic objectives of both players. We prove that in graph games with Borel objectives, which include the games that arise in verification, there may be several Nash equilibria, but there is always a unique maximal payoff profile of secure equilibria. We show how this equilibrium can be computed in the case of omega-regular objectives, and we characterize the memory requirements of strategies that achieve the equilibrium.","lang":"eng"}],"_id":"3895","date_created":"2018-12-11T12:05:45Z","publist_id":"2262","year":"2004","publisher":"IEEE","status":"public","quality_controlled":0,"title":"Games with secure equilibria"}