SlideShare a Scribd company logo
Tag-based indirect reciprocity by
incomplete social information
Naoki Masuda1 and Hisashi Ohtsuki2
The University of Tokyo, Japan
2
Harvard University
http://www.stat.t.u-tokyo.ac.jp/~masuda
1

Ref: Masuda & Ohtsuki, Proc. R. Soc. B, 274,
689-695 (2007).
Prisoner’s Dilemma
Opponent

Cooperate

Defect

Cooperate

(3, 3)

(0, 5)

Defect

(5, 0)

(1, 1)

Self

unique Nash equilibrium
A Prisoner’s Dilemma
• A donor may donate
cost c to benefit the
recipient by b (>c).
• If each player serves
as donor and
recipient in different
(random) pairings, the
game is symmetric
PD.

recipient

donor

C

(-c, b)

D

(0, 0)
(b > c)

C

D

C (b-c, b-c)

(-c, b)

D

(0, 0)

(b, -c)
Origins of altruism
• Kin selection
• Direct reciprocity
– Iterated Prisoner’s dilemma

•
•
•
•
•

Spatial reciprocity
Indirect reciprocity
Network reciprocity
Group selection
Others

• Is ‘helping similar others’ a viable (stable)
strategy?
An affirmative answer by
Riolo, Cohen & Axelrod, Nature 2001
• b=1.0, c=0.1
• Player i has

– Tag wi ∈ [ 0,1]
– Tolerance µi ∈ [ 0,1]

• i cooperates with j if w j − wi ≤ µi
• Players copy tag and tolerance of successful others.
• mutation:
– Random allocation of tag
– Neutral drift of tolerance

• Results of their numerical simulations of evol dynamics:
– Donation rate is maintained high (~ 75%).
– The mean tolerance level is small (0.01-0.03).
– With some sudden changes though.
However, rebuttal
by Roberts & Sherratt (Nature 2002)
Criticism 1
i was assumed to coopreate if
w j − wi ≤ µi &
µi ∈ [ 0,1]

Criticism 2
Neutral drift & µi ∈ [ 0,1]

A player cooperate with birds
with exactly the same feather

Random walk with
reflecting boundary

Cooperation is lost if µi ∈ [ 0,1] is
replaced by µi ∈ [ − 10 −6 ,1]

Positive bias. Why
mutation increases
generosity?
We establish a viable model of tagbased reciprocity.

[

]

µi ∈ − 10 −6 ,1
• Use a kind of

• q: prob that μj is public to others
• If player i gets to know μj <|wj-wi|, i does
not donate even if μi ≥|wj-wi|
• q=0 → eventually ALLD (μi <0)
• q=1 → eventually ALLC (μi takes max)
• No mutation of tags
2-tag model
• Same or different only.
tag
tolerance

wi ∈ [ 0,1]

[

]

µi ∈ − 10 ,1
−6

{

→ wi ∈ w , w
→

a

b

}

µi ∈ { − 1,0,1}

μ

phenotype

-1 no donate (D)
0

tag user

1

donate (C)
Payoffs of 6 subpopulations
tag = a

tag = b

h: assortativity
Replicator dynamics
• Symmetric case
– Full theoretical analysis
(global analysis)

• Asymmetric case
6 vars, 4 dim

note: no tag evolution

– Best-response theory
(local analysis only)
– Numerical simulations
Symmetric case

Small q
μ

phenotype

-1 no donate (D)
0

tag user

1

donate (C)

Intermediate q

Large q

c (1 − q )
A≡
< 1 ⇒ bq > c
( b − c) q
is the condition for tag users
to emerge.
With assortativity h

b = 1, c = 0.3

q = 0.5, h = 0

q = 0.5, h = 0.8
Asymmetric case (best response)
A=

p >A
b
1

p1b ≤ A

A − (1 − ( t + h − ht ) ) p1b
X=
.
t + h − ht

μ

Among 9 pure strategies, only (μa,μb)=(-1,-1), (1,0), (0,-1), (0,0), and (1,1) are viable.

c (1 − q )
,
( b − c) q

phenotype

-1 no donate (D)
0

tag user

1

donate (C)
Basin areas (numerical)
(1, 1)

(-1, -1)

μ

phenotype

-1 no donate (D)
0
(0, -1)
(-1, 0)

(0, 0)

q

tag user

1

donate (C)
Best response (continuous tag)
• Any μi = μ is ESS if
bq>c
• If μi is uniformly
distributed,

bq − c
µ opt =
,
( b − c) q
µ opt = 0,

( bq > c )
( bq ≤ c )

optimal μ
b/c=4

2

1.2
q
Numerical simulations
noiseless case
noisy case
μ
n = 800
b=1
c = 0.3
q
Conclusions
• Tag-based indirect reciprocity is viable
when publicity of tolerance is intermediate.
– Large publicity → cooperation prevails
– Small publicity → defection prevails

• Future work: network version?

More Related Content

Similar to Tag-based indirect reciprocity

Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
Jason Riedy
 
Clustering coefficients for correlation networks
Clustering coefficients for correlation networksClustering coefficients for correlation networks
Clustering coefficients for correlation networks
Naoki Masuda
 
Igert glmm
Igert glmmIgert glmm
Igert glmm
Ben Bolker
 
Community structure in complex networks
Community structure in complex networksCommunity structure in complex networks
Community structure in complex networks
Vincent Traag
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
Tokyo Tech (Tokyo Institute of Technology)
 
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
Gota Morota
 
Social Influence & Community Detection
Social Influence & Community DetectionSocial Influence & Community Detection
Social Influence & Community Detection
Vincent Traag
 
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
The Statistical and Applied Mathematical Sciences Institute
 
Relational machine-learning
Relational machine-learningRelational machine-learning
Relational machine-learning
Bhushan Kotnis
 
Random walks and diffusion on networks
Random walks and diffusion on networksRandom walks and diffusion on networks
Random walks and diffusion on networks
Naoki Masuda
 
Temporal dynamics of human behavior in social networks (i)
Temporal dynamics of human behavior in social networks (i)Temporal dynamics of human behavior in social networks (i)
Temporal dynamics of human behavior in social networks (i)
Esteban Moro
 
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
The Statistical and Applied Mathematical Sciences Institute
 
Options Portfolio Selection
Options Portfolio SelectionOptions Portfolio Selection
Options Portfolio Selection
guasoni
 
Cooperation, Reputation & Gossiping
Cooperation, Reputation & GossipingCooperation, Reputation & Gossiping
Cooperation, Reputation & Gossiping
Vincent Traag
 
E C M2221 P R O B A B I L I T Y A N D S T A T I S T I C S Set1
E C M2221  P R O B A B I L I T Y  A N D  S T A T I S T I C S Set1E C M2221  P R O B A B I L I T Y  A N D  S T A T I S T I C S Set1
E C M2221 P R O B A B I L I T Y A N D S T A T I S T I C S Set1
guestd436758
 

Similar to Tag-based indirect reciprocity (16)

Graph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear AlgebraGraph Analysis Beyond Linear Algebra
Graph Analysis Beyond Linear Algebra
 
Clustering coefficients for correlation networks
Clustering coefficients for correlation networksClustering coefficients for correlation networks
Clustering coefficients for correlation networks
 
Igert glmm
Igert glmmIgert glmm
Igert glmm
 
Community structure in complex networks
Community structure in complex networksCommunity structure in complex networks
Community structure in complex networks
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
Application of Bayesian and Sparse Network Models for Assessing Linkage Diseq...
 
Social Influence & Community Detection
Social Influence & Community DetectionSocial Influence & Community Detection
Social Influence & Community Detection
 
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
2018 MUMS Fall Course - Issue Arising in Several Working Groups: Probabilisti...
 
Relational machine-learning
Relational machine-learningRelational machine-learning
Relational machine-learning
 
Random walks and diffusion on networks
Random walks and diffusion on networksRandom walks and diffusion on networks
Random walks and diffusion on networks
 
Temporal dynamics of human behavior in social networks (i)
Temporal dynamics of human behavior in social networks (i)Temporal dynamics of human behavior in social networks (i)
Temporal dynamics of human behavior in social networks (i)
 
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
2018 MUMS Fall Course - Introduction to statistical and mathematical model un...
 
main
mainmain
main
 
Options Portfolio Selection
Options Portfolio SelectionOptions Portfolio Selection
Options Portfolio Selection
 
Cooperation, Reputation & Gossiping
Cooperation, Reputation & GossipingCooperation, Reputation & Gossiping
Cooperation, Reputation & Gossiping
 
E C M2221 P R O B A B I L I T Y A N D S T A T I S T I C S Set1
E C M2221  P R O B A B I L I T Y  A N D  S T A T I S T I C S Set1E C M2221  P R O B A B I L I T Y  A N D  S T A T I S T I C S Set1
E C M2221 P R O B A B I L I T Y A N D S T A T I S T I C S Set1
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Tag-based indirect reciprocity

  • 1. Tag-based indirect reciprocity by incomplete social information Naoki Masuda1 and Hisashi Ohtsuki2 The University of Tokyo, Japan 2 Harvard University http://www.stat.t.u-tokyo.ac.jp/~masuda 1 Ref: Masuda & Ohtsuki, Proc. R. Soc. B, 274, 689-695 (2007).
  • 2. Prisoner’s Dilemma Opponent Cooperate Defect Cooperate (3, 3) (0, 5) Defect (5, 0) (1, 1) Self unique Nash equilibrium
  • 3. A Prisoner’s Dilemma • A donor may donate cost c to benefit the recipient by b (>c). • If each player serves as donor and recipient in different (random) pairings, the game is symmetric PD. recipient donor C (-c, b) D (0, 0) (b > c) C D C (b-c, b-c) (-c, b) D (0, 0) (b, -c)
  • 4. Origins of altruism • Kin selection • Direct reciprocity – Iterated Prisoner’s dilemma • • • • • Spatial reciprocity Indirect reciprocity Network reciprocity Group selection Others • Is ‘helping similar others’ a viable (stable) strategy?
  • 5. An affirmative answer by Riolo, Cohen & Axelrod, Nature 2001 • b=1.0, c=0.1 • Player i has – Tag wi ∈ [ 0,1] – Tolerance µi ∈ [ 0,1] • i cooperates with j if w j − wi ≤ µi • Players copy tag and tolerance of successful others. • mutation: – Random allocation of tag – Neutral drift of tolerance • Results of their numerical simulations of evol dynamics: – Donation rate is maintained high (~ 75%). – The mean tolerance level is small (0.01-0.03). – With some sudden changes though.
  • 6. However, rebuttal by Roberts & Sherratt (Nature 2002) Criticism 1 i was assumed to coopreate if w j − wi ≤ µi & µi ∈ [ 0,1] Criticism 2 Neutral drift & µi ∈ [ 0,1] A player cooperate with birds with exactly the same feather Random walk with reflecting boundary Cooperation is lost if µi ∈ [ 0,1] is replaced by µi ∈ [ − 10 −6 ,1] Positive bias. Why mutation increases generosity?
  • 7. We establish a viable model of tagbased reciprocity. [ ] µi ∈ − 10 −6 ,1 • Use a kind of • q: prob that μj is public to others • If player i gets to know μj <|wj-wi|, i does not donate even if μi ≥|wj-wi| • q=0 → eventually ALLD (μi <0) • q=1 → eventually ALLC (μi takes max) • No mutation of tags
  • 8. 2-tag model • Same or different only. tag tolerance wi ∈ [ 0,1] [ ] µi ∈ − 10 ,1 −6 { → wi ∈ w , w → a b } µi ∈ { − 1,0,1} μ phenotype -1 no donate (D) 0 tag user 1 donate (C)
  • 9. Payoffs of 6 subpopulations tag = a tag = b h: assortativity
  • 10. Replicator dynamics • Symmetric case – Full theoretical analysis (global analysis) • Asymmetric case 6 vars, 4 dim note: no tag evolution – Best-response theory (local analysis only) – Numerical simulations
  • 11. Symmetric case Small q μ phenotype -1 no donate (D) 0 tag user 1 donate (C) Intermediate q Large q c (1 − q ) A≡ < 1 ⇒ bq > c ( b − c) q is the condition for tag users to emerge.
  • 12. With assortativity h b = 1, c = 0.3 q = 0.5, h = 0 q = 0.5, h = 0.8
  • 13. Asymmetric case (best response) A= p >A b 1 p1b ≤ A A − (1 − ( t + h − ht ) ) p1b X= . t + h − ht μ Among 9 pure strategies, only (μa,μb)=(-1,-1), (1,0), (0,-1), (0,0), and (1,1) are viable. c (1 − q ) , ( b − c) q phenotype -1 no donate (D) 0 tag user 1 donate (C)
  • 14. Basin areas (numerical) (1, 1) (-1, -1) μ phenotype -1 no donate (D) 0 (0, -1) (-1, 0) (0, 0) q tag user 1 donate (C)
  • 15. Best response (continuous tag) • Any μi = μ is ESS if bq>c • If μi is uniformly distributed, bq − c µ opt = , ( b − c) q µ opt = 0, ( bq > c ) ( bq ≤ c ) optimal μ b/c=4 2 1.2 q
  • 16. Numerical simulations noiseless case noisy case μ n = 800 b=1 c = 0.3 q
  • 17. Conclusions • Tag-based indirect reciprocity is viable when publicity of tolerance is intermediate. – Large publicity → cooperation prevails – Small publicity → defection prevails • Future work: network version?