{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:14Z","timestamp":1763468114048},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,4,25]],"date-time":"2013-04-25T00:00:00Z","timestamp":1366848000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1007\/s00224-013-9460-5","type":"journal-article","created":{"date-parts":[[2013,4,30]],"date-time":"2013-04-30T19:40:11Z","timestamp":1367350811000},"page":"41-52","source":"Crossref","is-referenced-by-count":4,"title":["On the Rate of Convergence of Fictitious Play"],"prefix":"10.1007","volume":"53","author":[{"given":"Felix","family":"Brandt","sequence":"first","affiliation":[]},{"given":"Felix","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Harrenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,25]]},"reference":[{"key":"9460_CR1","unstructured":"Bellman, R.: On a new iterative algorithm for finding the solutions of games and linear programming problems. Research Memorandum P-473, The RAND Corporation (1953)"},{"key":"9460_CR2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.jet.2004.02.003","volume":"120","author":"U. Berger","year":"2005","unstructured":"Berger, U.: Fictitious play in 2\u00d7n games. J. Econ. Theory 120, 139\u2013154 (2005)","journal-title":"J. Econ. Theory"},{"key":"9460_CR3","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.jet.2005.12.010","volume":"135","author":"U. Berger","year":"2007","unstructured":"Berger, U.: Brown\u2019s original fictitious play. J. Econ. Theory 135, 572\u2013578 (2007)","journal-title":"J. Econ. Theory"},{"key":"9460_CR4","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.jet.2008.01.007","volume":"143","author":"U. Berger","year":"2008","unstructured":"Berger, U.: Learning in games with strategic complementarities revisited. J. Econ. Theory 143, 292\u2013301 (2008)","journal-title":"J. Econ. Theory"},{"key":"9460_CR5","unstructured":"Berger, U.: The convergence of fictitious play in games with strategic complementarities: a comment. MPRA Paper No. 20241, Munich Personal RePEc Archive, 2009"},{"key":"9460_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-540-79309-0_26","volume-title":"Proceedings of the 1st International Symposium on Algorithmic Game Theory","author":"F. Brandt","year":"2008","unstructured":"Brandt, F., Fischer, F.: On the hardness and existence of quasi-strict equilibria. In: Monien, B., Schroeder, U.-P. (eds.) Proceedings of the 1st International Symposium on Algorithmic Game Theory. Lecture Notes in Computer Science, vol. 4997, pp. 291\u2013302. Springer, Berlin (2008)"},{"key":"9460_CR7","first-page":"374","volume-title":"Activity Analysis of Production and Allocation","author":"G.W. Brown","year":"1951","unstructured":"Brown, G.W.: Iterative solutions of games by fictitious play. In: Koopmans, T.C. (ed.) Activity Analysis of Production and Allocation, pp. 374\u2013376. Wiley, New York (1951)"},{"key":"9460_CR8","first-page":"636","volume-title":"Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing","author":"V. Conitzer","year":"2009","unstructured":"Conitzer, V.: Approximation guarantees for fictitious play. In: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 636\u2013643 (2009)"},{"issue":"1\u20132","key":"9460_CR9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10994-006-0143-1","volume":"67","author":"V. Conitzer","year":"2007","unstructured":"Conitzer, V., Sandholm, T.: AWESOME: a general multiagent learning algorithm that converges in self-play and learns a best response against stationary opponents. Mach. Learn. 67(1\u20132), 23\u201343 (2007)","journal-title":"Mach. Learn."},{"key":"9460_CR10","first-page":"330","volume-title":"Activity Analysis of Production and Allocation","author":"G.B. Dantzig","year":"1951","unstructured":"Dantzig, G.B.: A proof of the equivalence of the programming problem and the game problem. In: Koopmans, T.C. (ed.) Activity Analysis of Production and Allocation, pp. 330\u2013335. Wiley, New York (1951)"},{"key":"9460_CR11","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/0165-1889(94)00819-4","volume":"19","author":"D. Fudenberg","year":"1995","unstructured":"Fudenberg, D., Levine, D.: Consistency and cautious fictitious play. J. Econ. Dyn. Control 19, 1065\u20131089 (1995)","journal-title":"J. Econ. Dyn. Control"},{"key":"9460_CR12","first-page":"919","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multi-Agent Systems","author":"S. Ganzfried","year":"2008","unstructured":"Ganzfried, S., Sandholm, T.: Computing an approximate jam\/fold equilibrium for 3-player no-limit Texas Hold\u2019em tournaments. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp. 919\u2013925 (2008)"},{"key":"9460_CR13","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF01212188","volume":"7","author":"S. Gjerstad","year":"1996","unstructured":"Gjerstad, S.: The rate of convergence of continuous fictitious play. J. Econ. Theory 7, 161\u2013178 (1996)","journal-title":"J. Econ. Theory"},{"key":"9460_CR14","author":"P.W. Goldberg","year":"2013","unstructured":"Goldberg, P.W., Savani, R., S\u00f8rensen, T.B., Ventre, C.: On the approximation performance of fictitious play in finite games. Int. J. Game Theory (2013). doi: 10.1007\/s00182-012-0362-6","journal-title":"Int. J. Game Theory"},{"key":"9460_CR15","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0165-1765(99)00058-0","volume":"64","author":"S. Hahn","year":"1999","unstructured":"Hahn, S.: The convergence of fictitious play in 3\u00d73 games with strategic complementarities. Econ. Lett. 64, 57\u201360 (1999)","journal-title":"Econ. Lett."},{"key":"9460_CR16","first-page":"97","volume-title":"Contributions to the Theory of Games","author":"J. Hannan","year":"1957","unstructured":"Hannan, J.: Approximation to Bayes risk in repeated plays. In: Dresher, M., Tucker, A.W., Wolfe, P. (eds.) Contributions to the Theory of Games, vol. 3, pp. 97\u2013139. Princeton University Press, Princeton (1957)"},{"key":"9460_CR17","volume-title":"Mathematical Methods and Theory in Games, Programming, and Economics","author":"S. Karlin","year":"1959","unstructured":"Karlin, S.: Mathematical Methods and Theory in Games, Programming, and Economics, vol. 1\u20132. Addison-Wesley, Reading (1959)"},{"key":"9460_CR18","volume-title":"Games and Decisions: Introduction and Critical Survey","author":"R.D. Luce","year":"1957","unstructured":"Luce, R.D., Raiffa, H.: Games and Decisions: Introduction and Critical Survey. Wiley, New York (1957)"},{"key":"9460_CR19","unstructured":"Miyasawa, K.: On the convergence of the learning process in a 2\u00d72 nonzero sum two-person game. Research Memorandum\u00a033, Econometric Research Program, Princeton University, 1961"},{"key":"9460_CR20","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1006\/game.1996.0045","volume":"14","author":"D. Monderer","year":"1996","unstructured":"Monderer, D., Sela, A.: A 2\u00d72 game without the fictitious play property. Games Econ. Behav. 14, 144\u2013148 (1996)","journal-title":"Games Econ. Behav."},{"issue":"1","key":"9460_CR21","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1006\/game.1996.0044","volume":"14","author":"D. Monderer","year":"1996","unstructured":"Monderer, D., Shapley, L.S.: Potential games. Games Econ. Behav. 14(1), 124\u2013143 (1996)","journal-title":"Games Econ. Behav."},{"key":"9460_CR22","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1006\/jeth.1996.0014","volume":"68","author":"D. Monderer","year":"1996","unstructured":"Monderer, D., Shapley, L.S.: Fictitious play property for games with identical interests. J. Econ. Theory 68, 258\u2013265 (1996)","journal-title":"J. Econ. Theory"},{"key":"9460_CR23","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/BF01753708","volume":"19","author":"J.H. Nachbar","year":"1990","unstructured":"Nachbar, J.H.: \u201cEvolutionary\u201d selection dynamics in games: convergence and limit properties. Int. J. Game Theory 19, 59\u201389 (1990)","journal-title":"Int. J. Game Theory"},{"key":"9460_CR24","first-page":"1089","volume-title":"Advances in Neural Information Processing Systems 17","author":"R. Powers","year":"2004","unstructured":"Powers, R., Shoham, Y.: New criteria and a new algorithm for learning in multi-agent systems. In: Advances in Neural Information Processing Systems 17, pp. 1089\u20131096. MIT Press, Cambridge (2004)"},{"key":"9460_CR25","first-page":"245","volume-title":"Proceedings of the 21st International Joint Conference on Artificial Intelligence","author":"Z. Rabinovich","year":"2009","unstructured":"Rabinovich, Z., Gerding, E., Polukarov, M., Jennings, N.R.: Generalised fictitious play for a continuum of anonymous players. In: Proceedings of the 21st International Joint Conference on Artificial Intelligence, pp. 245\u2013250 (2009)"},{"issue":"2","key":"9460_CR26","doi-asserted-by":"crossref","first-page":"296","DOI":"10.2307\/1969530","volume":"54","author":"J. Robinson","year":"1951","unstructured":"Robinson, J.: An iterative method of solving a game. Ann. Math. 54(2), 296\u2013301 (1951)","journal-title":"Ann. Math."},{"key":"9460_CR27","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1002\/cpa.3160110408","volume":"11","author":"H. Shapiro","year":"1958","unstructured":"Shapiro, H.: Note on a computation model in the theory of games. Commun. Pure Appl. Math. 11, 587\u2013593 (1958)","journal-title":"Commun. Pure Appl. Math."},{"key":"9460_CR28","series-title":"Annals of Mathematics Studies","first-page":"1","volume-title":"Advances in Game Theory","author":"L. Shapley","year":"1964","unstructured":"Shapley, L.: Some topics in two-person games. In: Dresher, M., Shapley, L.S., Tucker, A.W. (eds.) Advances in Game Theory. Annals of Mathematics Studies, vol. 52, pp. 1\u201329. Princeton University Press, Princeton (1964)"},{"key":"9460_CR29","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/BF01448847","volume":"100","author":"J. Neumann von","year":"1928","unstructured":"von Neumann, J.: Zur Theorie der Gesellschaftspiele. Math. Ann. 100, 295\u2013320 (1928)","journal-title":"Math. Ann."},{"issue":"2","key":"9460_CR30","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1002\/nav.3800010207","volume":"1","author":"J. Neumann von","year":"1954","unstructured":"von Neumann, J.: A numerical method to determine optimum strategy. Nav. Res. Logist. Q. 1(2), 109\u2013115 (1954)","journal-title":"Nav. Res. Logist. Q."},{"key":"9460_CR31","first-page":"385","volume-title":"Proceedings of the 18th National Conference on Artificial Intelligence","author":"W. Zhu","year":"2002","unstructured":"Zhu, W., Wurman, P.R.: Structural leverage and fictitious play in sequential auctions. In: Proceedings of the 18th National Conference on Artificial Intelligence, pp. 385\u2013390 (2002)"}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-013-9460-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00224-013-9460-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-013-9460-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T07:54:25Z","timestamp":1558684465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00224-013-9460-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,25]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["9460"],"URL":"https:\/\/doi.org\/10.1007\/s00224-013-9460-5","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,25]]}}}