From: Game theory models for communication between agents: a review
S. no | Ref | Games | Normal | Extensive | Beyond N/E |
---|---|---|---|---|---|
1 | Three-morph mating | Sinervo and Lively (1996) | Yes | No | No |
2 | Extended RPS | Bahel and Haller (2013) | Yes | No | No |
3 | Mod game | Frey et al. (2013) | No | No | Yes |
4 | Continuous RPS | Neumann and Schuster (2007) | Yes | No | No |
5 | Balls and bins | Edmonds and Pruhs (2006) | No | No | Yes |
6 | 3-player MP | McCabe (2000) | No | No | Yes |
7 | Colonel Blotto | Roberson (2006) | No | No | Yes |
8 | Discrete colonel Blotto | Hart (2008) | No | No | Yes |
9 | PM on circle | Wilson (1972) | No | No | Yes |
10 | Kuhn Poker | Southey et al. (2009) | No | Yes | No |
11 | Flow control | Altman (1994) | No | No | Yes |
12 | Network revenue | Grauberger and Kimms (2014) | No | No | Yes |
13 | Railway network | Perea and Puerto (2013) | Yes | No | No |
14 | VANET security model | Alpcan and Buchegger (2011) | No | No | Yes |
15 | Anonymous networking | Venkitasubramaniam and Tong (2012) | No | No | Yes |
16 | Jammer-relay | Wang and Georgios (2008) | No | No | Yes |
17 | Network-malware dynamic game | Khouzani et al. (2012) | No | No | Yes |
18 | Link A + game B | Ye et al. (2013) | No | Yes | No |
19 | E-D vs jammer | Kashyap et al. (2004) | No | No | Yes |
20 | Transmission security | Chen et al. (2013) | No | No | Yes |
21 | Average payoff | Ghosh and Goswami (2008) | No | No | Yes |
22 | Semicontinuous payoff | Laraki et al. (2013) | No | No | Yes |
23 | Symmetric game | Duersch et al. (2012) | Yes | No | No |
24 | Mixed-strategy | Seo and Lee (2007) | No | No | Yes |
25 | Mixed zero-sum | Hamadène and Wang (2009) | No | No | Yes |
26 | AGTCS2-player search | Zoroa et al. (2012) | No | No | Yes |
27 | Insurance games | Bensoussan et al. (2014) | No | No | Yes |
28 | Duopoly game | Deshmukh and Wayne (1978) | No | No | Yes |
29 | Web services | Khosravifar et al. (2013) | No | No | Yes |