New fictitious play procedure for solving Blotto games
Lee, Moon Gul
Eagle, James N.
Carlyle, W. Matthew
MetadataShow full item record
In this thesis, a new fictitious play (FP) procedure is presented to solve two-person zero-sum (TPZS) Blotto games. The FP solution procedure solves TPZS games by assuming that the two players take turns selecting optimal responses to the opponent's strategy observed so far. It is known that FP converges to an optimal solution, and it may be the only realistic approach to solve large games. The algorithm uses dynamic programming (DP) to solve FP subproblems. Efficiency is obtained by limiting the growth of the DP state space. Blotto games are frequently used to solve simple missile defense problems. While it may be unlikely that the models presented in this paper can be used directly to solve realistic offense and defense problems, it is hoped that they will provide insight into the basic structure of optimal and near-optimal solutions to these important, large games, and provide a foundation for solution of more realistic, and more complex, problems.
Approved for public release; distribution in unlimited.
Showing items related by title, author, creator and subject.
Gilchrist, Richard B. (Cambridge, Massachusetts: Massachusetts Institute of Technology, 1964-01);Dynamic programming is employed to obtain a solution to the problem of controlling a nonlinear system in an optimal fashion, subject to a quadratic performance index. The technique sued is similar to that given by Merriam ...
Guthrie, Katherine H. (Monterey, California: Naval Postgraduate School, 2017-06);A cascade heuristic appeals when we are faced with a monolithic optimization model exhibiting more decision variables and/or constraints than can be accommodated by computers and/or optimization software available. This ...
Lazzaro, Gary L. (Monterey, California: Naval Postgraduate School, 2016-06);The optimal defense and operation of networks against worst-case attack is an important problem for military analysts. We review development of existing solutions for the Defender-Attacker-Defender (DAD) tri-level optimization ...