ect-ng/SI/2nd SI.tex
2023-04-26 22:36:42 +08:00

1109 lines
46 KiB
TeX

\documentclass[default]{sn-jnl}
% Use the lineno option to display guide line numbers if required.
% Note that the use of elements such as single-column equations
% may affect the guide line number alignment.
\usepackage{graphicx}%
\usepackage{multirow}%
\usepackage{amsmath,amssymb,amsfonts}%
\usepackage{amsthm}%
\usepackage{mathrsfs}%
\usepackage[title]{appendix}%
\usepackage{xcolor}%
\usepackage{textcomp}%
\usepackage{manyfoot}%
\usepackage{booktabs}%
\usepackage{algorithm}%
\usepackage{algorithmicx}%
\usepackage{algpseudocode}%
\usepackage{listings}%
\usepackage{dsfont}
\usepackage{times}
%%% better text circle
%%% see https://tex.stackexchange.com/questions/7032/good-way-to-make-textcircled-numbers
\usepackage{tikz}
\newcommand*\circled[1]{\tikz[baseline=(char.base)]{
\node[shape=circle,draw,inner sep=2pt] (char) {#1};}}
\usepackage{enumitem}
\usepackage{stfloats}
% \usepackage[justification=centering]{caption}
\begin{document}
\title{Supplementary Information for Limitation of time promotes cooperation in temporal games}
\author{Jiasheng Wang}
\author*{Yichao Zhang}\email{yichaozhang@tongji.edu.cn}
\author*{Guanghui Wen}\email{wenguanghui@gmail.com}
\author*{Jihong Guan}\email{jhguan@tongji.edu.cn}
\author{Shuigeng Zhou}
\author{Guanrong Chen}
\author{Krishnendu Chatterjee}
\author{Matja{\v z} Perc}
% \instructionspage
\maketitle
%% Adds the main heading for the SI text. Comment out this line if you do not have any supporting information text.
\begin{appendices}
\section*{Volunteers Recruitment and Experimental Setup}
The experiment was carried out with a total of 183 volunteers. The participants are students mainly from Tongji University and Southeast University in China. All the participants of the experiment are required to register an account on the experimental platform in advance (see below). After logging in, they are asked to check the experiment schedule on the landing page, where the type of scenario is shown to the participants who are going to enroll in the match. Meanwhile, they can choose whether to enroll in the next match or not. When the match begins, only the participants who have enrolled can play. After kicking off a game, their accounts will automatically be redirected to the gaming page. For beginners, there is a casual mode for their training.
In the online experiments, participants played a traditional Prisoner's dilemma (PD) game, where C (cooperative) and D (defective) were the only available actions. Each participant interacted with the individuals who had agreements with him in one round, after which the agreements needed to be redrafted.
Each match on the platform comprises two stages. In the first stage, the system generates a network with a social network model. In the experiments, two types of networks are generated. One is Barab\'{a}si and Albert (BA) scale-free network with degree $m_0=m=3$; the other is Watts and Strogatz (WS) small-world network with $P_{rewire}=0.1$ and $K=6$. There were 150 players participating in the experiment with the BA networks (56 for the `divide-and-conquer' (D\&C) games and 94 for the temporal games) and 99 players playing with the WS networks (55 for the D\&C games and 44 for the temporal games). The subjects are then allocated to the nodes of the network. Thus, the connections among the subjects are randomly predetermined. The second stage is an $n$-round iterated PD game, where $10\le n \le 30$ is unknown to individuals so as to avoid the ending-game effects.
In the match, participants are shown their identities, which are in-game-generated participant IDs. They are allowed to see their own gaming histories, where each record includes the actions (cooperation or defection) of both sides and the gaming time duration. Some necessary information about the game progress is visible to them, including food, time resources, neighbors, number of rounds, and time left for consideration.
After each match, the food resources of the players, namely payoffs, is the base for the reward. Each player gets 1 RMB for 1 unit of food resources as a basic reward. The top 3 players with the most food resources per round are the winners of the match. All the interaction logs of winners are opened to the participants, so they can vote for their favorite strategies. The winners who receive more votes can get more extra bonuses. The bonus pool is 1,000 RMB.
\section*{Experimental Platform and Interface}
Today, there are many platforms designed for empirical experiments~\cite{RN254,RN255,RN256,RN257,RN258,RN259,RN260,RN261,RN262}. The most widely used is the z-Tree toolkits~\cite{RN254}, proposed in 2007. It is used to perform social or economic experiments. But the questionnaire-like user interface cannot support complicated interactions, such as reconnection, chatting, etc. On the other hand, the system cannot support real-time interactions. Modern empirical platforms are quite different. One good example is nodeGame~\cite{RN255}, which provides online service based on the browser/server (B/S) architecture. To recruit more participants, they normally connect with Amazon Mechanical Turk~\cite{mturk} (AMT). These platforms support real-time interactions to make the environment closer to real scenarios. Unfortunately, none of them can support the divide-and-conquer (D\&C) gaming environment, let alone the temporal social dilemma process.
\subsection*{Overview}
To implement the experimental scenarios of the temporal divide-and-conquer games, a novel online gaming experimental platform was developed in this work, called \emph{War of Strategies\footnote{http://strategywar.net}} (\emph{WoS}). The features of the platform are listed below:
\begin{enumerate}[label=(\arabic*)]
\item Supporting D\&C games. The platform provides an easy way to configure and conduct a D\&C game experiment.
\item Having built-in bots for training. Beginners can be familiarized with the platform by playing with the training bots. The current strategy of the bots is uniformly set to a random selection; that is, they will accept the gaming request with a probability 50\% and cooperate with a probability 50\%.
\item Performing real-time interactions. The user interface is similar to a browser-based online game. The interaction between participants is real-time and stressful, stimulating the participants to make fast and cautious decisions.
\item Having scalability. All modules of the experimental platform can be deployed on standalone servers or distributed machines. Docker containers are also supported.
\item Having customizability. The gaming settings are easy to adjust to fit the models.
\end{enumerate}
\subsection*{Architecture}
The platform is developed based on several open-source software, composed of three components: Portal, Distributor, and Worker. The architecture is shown in Fig.~\ref{fig:arch}.
\begin{figure}[!htbp]%[tbhp]
\centering
\includegraphics[width=.7\linewidth]{architecture}
\caption{Platform architecture of the WoS.}
\label{fig:arch}
\end{figure}
In the WoS, PostgreSQL~\cite{psql} and Redis~\cite{redis} are used to store platform data. PostgreSQL is responsible for data persistence, which manages the rarely updated data, such as configurations, user profiles, archived logs, and archived gaming results. Redis is used as an in-memory cache, storing the data which are read and written frequently, such as match data, participant data, in-game requests, and runtime logs. The Redis Pub/Sub message system supports the communications between the Worker and the Distributor module.
The Portal module deals with HTTP requests and web pages, such as the landing page. The module is developed on Sinatra~\cite{sinatra} with Ruby~\cite{ruby}, which is a lightweight web platform. Thin~\cite{thin} is adopted as a web server. The module provides an authentication service and management interface. The module can be customized to provide a specific user interface for the participants and researchers. The default theme of the WoS is shown in Fig.~\ref{fig:landpage}.
\begin{figure}[htbp]
\centering
\includegraphics[width=\linewidth]{landing-page}
\caption{Landing page of the WoS.\label{fig:landpage}}
\vspace*{\floatsep}
\includegraphics[width=\linewidth]{user-login}
\caption{Login page of the WoS.\label{fig:login}}
\end{figure}
During the experiment, the communication between the webpage and the server follows the WebSocket~\cite{rfc6455} protocol. In the Distributor module, the server communicates with a webpage by Faye-WebSocket~\cite{fws}. Unlike traditional web-based applications, WoS adopts WebSocket to process real-time requests of the participants, including friend requests, gaming requests, chat messages, match processing data, etc. The Distributor module listens on the Redis Pub/Sub channel to process the request from the Worker module, for instance, broadcasting the match progress information.
The Worker module processes the delayed jobs, including starting the match according to the schedule, match process management, match result processing, etc. The module sends messages to the Redis Pub/Sub channel to notify the Distributor module. Since the match is conducted in the Worker module, one can modify this module to customize its functionality.
\subsection*{User-Interface}
Some screenshots of the default theme ``the Lost Island'' are provided, which are used in the experiment and shown to the participants. The volunteers first register or log in to participate in the experiment. The login interface is shown in Fig.~\ref{fig:login}. To register an account, a user requires an email address, a nickname, and a password. The section ``Privacy Policies'' covers the privacy issues related to the experiments.
\begin{figure}[htbp]
\centering
\includegraphics[width=\linewidth]{main-page}
\caption{The main part of the experiment.\label{fig:main}}
\vspace*{\floatsep}
\includegraphics[width=\linewidth]{response-1}
\begin{center}
The left panel shows:\\
Here is the request from [nickname] with time resource to cost: 1440 \\
Would you accept this request?\\
Deny | Accept\\
The right panel shows: Day No. | Time resource used | My move | Partner's move
\end{center}
\caption{The modal dialog box showing the request sent from a partner.\label{fig:resp1}}
\end{figure}
Once successfully logged in, a participant will reach the landing page, as shown in Fig.~\ref{fig:landpage}. The left top of the screen displays the user's nickname and accumulated food resource, which is used to calculate rewards. The left panel shows the top 20 participants who won a match, ordered by their average payoffs per round in the match. The right panel is the main panel, where the information from top to bottom is:
``There is no pending match now. Please wait'',
``Casual mode'',
``Story'',
``Help page'',
``In order to have the best gaming experience, modern browsers including Chrome, Firefox, and Safari are suggested.''
If there exists a pending match, the match schedule will be shown in the first line, followed by an enroll button.
In the experiment, the network topology is generated by a network model. After the generation of the social network, as shown in Fig.~\ref{fig:main}, the main process of the experiment begins. The status of the current match is shown on the top of the page, which is ``Day 1, 33s left in the daytime''. On the left-hand side of the page, the upper panel shows the participant's personal information, including the nickname, food resource, and the remaining time source. These properties are only visible to the participant himself; no one else can see them. The bottom-left panel is the operation panel. The participant can send gaming requests to their friends. The nickname is randomly generated, and the participant's actual ID is hidden to clear the memory generated in the previous matches. The request can be canceled, accepted, denied, or ignored. The first line shows that a social request has been sent to a friend. The label on the button is ``cancel''. The button can be used for withdrawing the request. The second line shows that a request has been accepted. As shown in the figure, the participant's move is cooperation, and the assigned time resource is 720. The third line shows that the participant just received a request from a friend, where the label on the button is ``request received''. The button can be used to trigger a modal dialog box for further operation, shown in Fig.~\ref{fig:resp1}. The fourth line shows that there is no interaction yet. Therefore the label on the button is ``take action''. The button can be used to trigger a modal dialog box, as shown in Fig.~\ref{fig:request}. The buttons on its right-hand side show ``check gaming history'', which can trigger a modal dialog box to review the gaming records.
Fig.~\ref{fig:resp1} shows the modal dialog box triggered by request. The left panel is the operation panel and the right panel shows the gaming history. For integrity, a complete translation of the modal dialog box is provided.
% \newpage
Fig.~\ref{fig:request} shows the modal dialog box of the drafting request. The left panel is the operation panel, and the right panel shows the gaming history. For integrity, a complete translation of the modal dialog box is provided.
\begin{figure}[tbhp]
\centering
\includegraphics[width=0.9\linewidth]{request}
\begin{center}
The left panel shows:\\
Choose a strategy to play with [nickname]\\
The move to take (Cooperate or Compete)\\
Assign the time resource. The more time resource you use, the more food you will gain in the same condition.\\
Cancel | OK\\
The right panel is the same as shown in Fig.~\ref{fig:resp1}.
\end{center}
\caption{The modal dialog box of request composing.\label{fig:request}}
\vspace*{\floatsep}
\includegraphics[width=0.9\linewidth]{response-2}
\caption{The modal dialog box shows that the participant accepts the request.\label{fig:resp2}}
\end{figure}
Fig.~\ref{fig:resp2} shows the modal dialog box when the participant accepts a request. Then, the participant should choose his move as a response. Note that the opponent's move is not shown to the others.
%Fig.~\ref{fig:over} shows the interface when the game is over and no one survives. The sentence on the screen says that ``The rescue team is finally here, but it is too late as all people died and no one survived.''
\begin{figure}[tbhp]
\includegraphics[width=\linewidth]{configure}
\caption{The new configuration page of the management interface.\label{fig:config}}
\end{figure}
For researchers, the WoS provides a user-friendly interface to manage experiments. The management interface provides the services of checking, creating, and editing experimental configurations, schedules, and exporting data. Fig.~\ref{fig:config} shows the page for creating an experimental configuration. The bar on the top of the page includes two drop-down lists, which are ``configuration'' and ``matches''. The drop-down items are related operations, such as checking, creating, and editing. The WoS uses JSON~\cite{json} to store the configuration. The figure shows a sample of the temporal social dilemma experiment. In the configuration, researchers can specify the payoff matrix, the duration of a round, the resource consumption, etc. The properties can be modified and created if the corresponding implementation is developed to conduct a customized experiment.
\subsection*{Privacy Policy}
The privacy policy of the platform is shown at (http://strategywar.net/privacy), the details of which are listed in the following (in italics).
{\fontfamily{lmss}\selectfont\itshape
\small The data management and bioinformatics (DMB) laboratory of Tongji University is responsible for running and maintaining the http://strategy
war.net website (the ``Service''). This page informs you of our policies regarding data collection, usage, privacy protection of personal data, and corresponding options.
We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise specified in this Privacy Policy, the terms used in this Privacy Policy have the same meanings as those in our Terms and Conditions shown on http://strategywar.net.
\Large \textbf{Information Collection and Use}
\small Several different types of information are collected, including personal data, usage data, and tracking \& cookies data (the details are listed below) to provide and improve the Service to the user.
\large \textbf{Types of Data Collected}
\normalsize \textbf{Personal Data}
\small When using the Service, the user may be asked to provide us with personally identifiable information that can be used to contact or identify the user (``Personal Data''). The personally identifiable information may include, but is not limited to:
\begin{itemize}
\item Email address
\item Cookies
\item Usage data
\end{itemize}
\normalsize \textbf{Usage Data}
\small The information concerning how the Service is accessed and used (``Usage Data'') will be collected. The Usage Data may include the user's computer Internet Protocol address (e.g., IP address), browser type, browser version, the pages of the Service that the user accessed, the time and date of the user's visit, the time spent on those pages, unique device identifiers, and other diagnostic data.
\normalsize \textbf{Tracking \& Cookies Data}
\small Cookies and similar tracking technologies are used to track the activity on our Service and hold certain information.
A cookie is a small file containing a string of characters that is sent to your computer when a user visits a website. When the user visits the site again, the cookie allows it to recognize the user's browser. Tracking technologies like beacons, tags, and scripts to collect and track information are applied to improve and analyze the Service.
The user can configure his browser to refuse all cookies or to set when a cookie is being sent. However, if the user does not accept cookies, he may not be able to use some functions of the Service.
Examples of Cookies used:
\begin{itemize}
\item \textbf{Session Cookies.} Using Session Cookies to provide Service.
\item \textbf{Preference Cookies.} Using Preference Cookies to record user preferences and settings.
\item \textbf{Security Cookies.} Using Security Cookies for security purposes.
\end{itemize}
\Large \textbf{Use of Data}
\small War of Strategies uses the collected data for the following purposes:
\begin{itemize}
\item To provide and maintain the Service
\item To notify the user of changes to the Service
\item To allow the user to participate in the interactive features of the Service when the user chooses to do so
\item To provide customers with technical support
\item To analyze the performance of the system for improving the Service
\item To monitor the usage of the Service
\item To detect, prevent, and address technical issues
\end{itemize}
\Large \textbf{Transfer of Data}
\small The user's information, including personal data, may be transferred to and maintained on computers outside his state, province, country, or other governmental jurisdiction where the data protection laws may differ from those of his jurisdiction.
If the user is located outside China and chooses to provide information for the Service, it should be noted that the data, including Personal Data, will be transferred to China and processed there.
The user's consent to this Privacy Policy, followed by his submission of such information, represents his agreement to that transfer.
War of Strategies will take all steps reasonably necessary to ensure that personal data is treated securely and in accordance with this Privacy Policy. No transfer of Personal Data will take place to an organization or a country unless there are adequate controls in place, including the security of the user's data and other personal information.
\Large \textbf{Disclosure of Data}
\small \textbf{Legal Requirements}
War of Strategies may disclose the user's data only in the case that such action is necessary to:
\begin{itemize}
\item Comply with a legal obligation
\item Protect and defend the rights or property of War of Strategies
\item Prevent or investigate possible wrongdoing in connection with the Service
\end{itemize}
\Large \textbf{Security of Data}
\small The security of the user's data is important, but remember that no method of transmission over the Internet or method of electronic storage is 100\% secure. Although the means of data protection adopted in the Service is commercially acceptable, there is no guarantee of its absolute security.
\Large \textbf{Service Providers}
\small A third-party companies and individuals may be employed to facilitate the Service (``Service Providers''), to perform Service-related services, or to assist in the runtime analysis of the system.
For the users' data, the third parties are only allowed to accomplish the tasks specified by the host and are obligated not to disclose or use it for any other purpose.
\Large \textbf{Links to Other Sites}
\small This Service may contain links to other sites that are not operated by the host. If the user clicks on a third-party link, he will be directed to its site. The user is strongly advised to review the Privacy Policy of every site that he visits.
The content and privacy policies of the third parties are not under control. Accordingly, the host is not responsible for them.
\Large \textbf{Changes to This Privacy Policy}
\small This Privacy Policy may update aperiodically. The user will be notified of any changes by seeing the new Privacy Policy on this page. The user is advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
\normalsize
}
\section*{Questionnaire for Volunteers}
Volunteers were required to read the privacy policy and answer the questions.
They would only participate in the experiment if they accepted the privacy policy.
In the experiments, 40 valid answers were received, where 37 volunteers ($92.5\%$) accepted the policy and became participants.
%Question 1. Q: We will collect some personal information of the volunteers. To take part in the experiment, you need to agree the privacy policy http://strategywar.net/privacy.
\begin{table}[ht]
\caption{The answer of acceptance of the privacy policy.}
\centering
\begin{tabular}{|l|l|l|}
\hline
Answer & Count & Ratio \\ \hline
Yes, I agree & 37 & 92.5\% \\ \hline
No, I disagree & 3 & 7.5\% \\ \hline
\end{tabular}
\end{table}
Among the participants, 25 of them are male, and the male-to-female ratio is $2.08:1$.
\begin{table}[ht]
\caption{The distribution of the sex.}
\centering
\begin{tabular}{|l|l|l|}
\hline
Sex & Count & Ratio \\ \hline
Male & 25 & 67.57\% \\ \hline
Female & 12 & 32.43\% \\ \hline
\end{tabular}
\end{table}
The average age of the participants was 24.41 ($standard variation= 3.77$).
The detail of the age distribution is shown in Table~\ref{tbl:age}.
\begin{table}[ht]
\caption{The ages of participants.\label{tbl:age}}
\centering
\begin{tabular}{|l|l|l|}
\hline
Age range & Count & Ratio \\ \hline
< 20 & 1 & 2.70\% \\ \hline
20 - 24 & 23 & 62.16\% \\ \hline
25 - 29 & 10 & 27.03\% \\ \hline
$ \geqslant $ 30 & 3 & 8.11\% \\ \hline
\end{tabular}
\end{table}
The institutions of participants are listed in Table~\ref{tbl:inst}.
\begin{table}[ht]
\caption{The institutions of participants.}
\centering
\begin{tabular}{|l|l|l|}
\hline
Institution & Count & Ratio \\ \hline
Southeast University & 21 & 56.76\% \\ \hline
Beijing Institute of Technology & 6 & 16.22\% \\ \hline
Tongji University & 5 & 13.51\% \\ \hline
Others & 5 & 13.51\% \\ \hline
\end{tabular}
\label{tbl:inst}
\end{table}
%\section*{Instructions for Participants}
%
%
%Fig.~\ref{fig:help} is a part of the poster enclosed in the CCCN 2017 conference brochures, which shows a brief instruction for participants to be familiar with WoS and the experiment. Here, a complete translation of the poster is provided.
%
%{\fontfamily{lmss}\selectfont
%When you are forced to land on a lost island, you want nothing but to survive, live until the rescue team comes. You have some food, which is found in the wreckage. But the food cannot keep you from starvation for a long time. You have to hunt for food with your friends, since the island is full of danger. When you and your friend get some food, the food needs to be assigned. At the moment, everyone tries to gain more food. When your food cannot compensate for your daily consumption, death is approaching. Therefore, in order to survive, you have to try your best to hunt for food.
%
%
%\begin{figure}[htbp]
% \centering
% \includegraphics[width=\linewidth]{help}
% \caption{Instructions for participants.\label{fig:help}}
%\end{figure}
%
%Game Procedures
%
%Prepare
%
%Before the game starts, there is a preparation period. In the period, you need to make friends in order to hunt for food together.
%
%\circled{\small{1}} The current participant panel shows all the opponents you can see. You can choose some of them to chat or to make friends with.
%
%\circled{\small{2}} The chat panel shows private and public messages.
%
%\circled{\small{3}} The friend-request panel shows the friend requests sent by other participants.
%
%Survive
%
%When the game starts, you can play the game with your friends.
%
%\circled{\small{1}} Displays the current day and remaining operation time in the day. Interaction is merely allowed in the daytime. You can check the payoff of the game at night.
%
%\circled{\small{2}} The interface displays all the friends whom you can send requests to.
%
%\circled{\small{3}} You can send a request to your friend. See the next section.
%
%\circled{\small{4}} If your friend doesn't accept your request for a long time, you can cancel the request or wait.
%
%\circled{\small{5}} If your friend accepts your request, you both will become partners and your interaction will be settled for today, which cannot be changed anymore.
%
%\circled{\small{6}} If you receive a request from your friend, the button will appear.
%
%Request
%
%If you want to interact with your friend, you have to operate the request interface.
%
%\circled{\small{1}} You can choose to cooperate or to compete, which directly affects your food payoff.
%
%\circled{\small{2}} The time resource is restricted to 1,440 units. Arrange your time reasonably.
%
%\circled{\small{3}} When you have decided, press OK.
%
%\circled{\small{4}} This panel shows your gaming history with that friend, FYI.
%
%Response
%
%You can handle the requests from your friends in this modal dialog box.
%
%\circled{\small{1}} The duration of the request. If your remaining time resource is less than the requirement, you cannot accept the request.
%
%\circled{\small{2}} Your decision.
%
%\circled{\small{3}} Your gaming history with the requester.
%
%If you accept the request, then
%
%\circled{\small{4}} Choose your move.
%
%\circled{\small{5}} Your decision.
%
%Casual Mode
%
%You can select the ``Casual Mode'' in the landing page to be familiar with the experiment process and test your strategies. The result of the casual mode will not be accumulated in your account.
%
%Strategy
%
%If you have no idea of how to design your own strategy, a sample ``Tit-for-Tat'' strategy is provided.
%
%\begin{enumerate}
% \item Make more friends.
% \item Cooperate first.
% \item If the opponent cooperates, cooperate.
% \item If the opponent competes, compete or seek for new friends.
%\end{enumerate}
%
%}
\newpage
\section*{Experiment Procedures}
In a round of the match, a player's operation flow is listed below:
\begin{enumerate}
\item Refill the time resource
\item Choose a friend to interact with
\begin{enumerate}
\item Choose your move and assign proper time resources to the game
\item Send request
\item Wait for response
\item Cancel the request if necessary
\end{enumerate}
\item Handle the requests from friends
\begin{enumerate}
\item Deny the request if the remaining time resource is not sufficient
\item Accept the request and choose your move
\item Reject the request
\item Ignore the request
\end{enumerate}
\item Repeat the above two steps until the decision-making time is up
\item Review the strategy and prepare for the next round.
\item Go to step (a)
\end{enumerate}
\section*{Top Voted Strategies}
The top three winning strategies in the temporal games are listed below.
\textbf{Strategy 1}
Round 1:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
Round 2:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
4. He/She denied the request from player 20024.
Round 3:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
Round 4:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
4. He/She denied the request from player 19982.
Round 5:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
Round 6:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20024.
4. He/She denied the request from player 19971.
Round 7:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
Round 8:
1. He/She played `C,' and player 20047 played `C' with time resource 1440.
2. He/She denied the request from player 20039.
3. He/She denied the request from player 19982.
Round 9:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 19971.
Round 10:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 19982.
4. He/She denied the request from player 19971.
Round 11:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
4. He/She denied the request from player 20039.
Round 12:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 19982.
Round 13:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20024.
4. He/She denied the request from player 19971.
Round 14:
1. He/She sent request `C' to 20047 with time resource 1440.
2. He/She played `C,' and player 20047 played `C' with time resource 1440.
Round 15:
1. He/She sent request `D' to 20047 with time resource 1440.
2. He/She played `D,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
4. He/She denied the request from player 20024.
5. He/She denied the request from player 20039.
Round 16:
1. He/She sent request `D' to 20047 with time resource 1440.
2. He/She played `D,' and player 20047 played `C' with time resource 1440.
3. He/She denied the request from player 20039.
\textbf{Strategy 2}
Round 1:
1. He/She sent request `C' to 19844 with time resource 720.
2. He/She played `C,' and player 19902 played `C' with time resource 120.
3. He/She sent request `C' to 19890 with time resource 600.
4. He/She played `C,' and player 19890 played `C' with time resource 600.
5. He/She played `C,' and player 19863 played `C' with time resource 360.
6. He/She sent request `C' to 19868 with time resource 360.
7. He/She sent request `C' to 19873 with time resource 360.
8. He/She sent request `C' to 19873 with time resource 360.
9. He/She played `C,' and player 19868 played `C' with time resource 340.
10. He/She sent request `C' to 19896 with time resource 20.
Round 2:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She sent request `C' to 19890 with time resource 720.
3. He/She played `C,' and player 19863 played `C' with time resource 360.
4. He/She sent request `C' to 19868 with time resource 360.
5. He/She played `C,' and player 19868 played `C' with time resource 360.
Round 3:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She denied the request from player 19863.
3. He/She sent request `C' to 19863 with time resource 720.
4. He/She played `C,' and player 19863 played `C' with time resource 720.
Round 4:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She sent request `D' to 19890 with time resource 720.
3. He/She denied the request from player 19863.
4. He/She sent request `C' to 19863 with time resource 720.
5. He/She played `C,' and player 19863 played `C' with time resource 720.
6. He/She had to deny playing with player 19873 due to a lack of time.
Round 5:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She sent request `D' to 19890 with time resource 720.
3. He/She sent request `D' to 19873 with time resource 720.
4. He/She denied the request from player 19863.
5. He/She sent request `D' to 19863 with time resource 720.
6. He/She played `D,' and player 19873 played `C' with time resource 720.
7. He/She denied the request from player 19863.
Round 6:
1. He/She sent request `C' to 19863 with time resource 720.
2. He/She played `C,' and player 19863 played `C' with time resource 720.
3. He/She played `C,' and player 19902 played `C' with time resource 720.
4. He/She denied the request from player 19890.
Round 7:
1. He/She sent request `D' to 19890 with time resource 360.
2. He/She played `C,' and player 19902 played `C' with time resource 720.
3. He/She sent request `C' to 19863 with time resource 360.
4. He/She played `C,' and player 19863 played `C' with time resource 360.
5. He/She sent request `D' to 19896 with time resource 360.
6. He/She sent request `D' to 19844 with time resource 360.
7. He/She sent request `D' to 19868 with time resource 360.
Round 8:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She played `C,' and player 19863 played `C' with time resource 720.
3. He/She denied the request from player 19890.
Round 9:
1. He/She sent request `D' to 19890 with time resource 360.
2. He/She played `C,' and player 19902 played `C' with time resource 720.
3. He/She denied the request from player 19863.
4. He/She sent request `C' to 19863 with time resource 360.
5. He/She played `D,' and player 19890 played `C' with time resource 360.
6. He/She denied the request from player 19896.
7. He/She played `C,' and player 19863 played `C' with time resource 360.
Round 10:
1. He/She sent request `D' to 19896 with time resource 720.
2. He/She played `C,' and player 19902 played `C' with time resource 720.
3. He/She played `D,' and player 19896 played `D' with time resource 720.
4. He/She denied the request from player 19863.
Round 11:
1. He/She played `C,' and player 19902 played `C' with time resource 720.
2. He/She sent request `C' to 19863 with time resource 720.
3. He/She played `C,' and player 19863 played `C' with time resource 720.
Round 12:
1. He/She played `C,' and player 19863 played `C' with time resource 720.
2. He/She played `C,' and player 19902 played `C' with time resource 720.
Round 13:
1. He/She sent request `D' to 19844 with time resource 720.
2. He/She played `C,' and player 19863 played `C' with time resource 720.
3. He/She denied the request from player 19902.
4. He/She sent request `C' to 19902 with time resource 720.
5. He/She played `C,' and player 19902 played `C' with time resource 720.
Round 14:
1. He/She sent request `D' to 19863 with time resource 1080.
2. He/She sent request `C' to 19902 with time resource 360.
3. He/She played `D,' and player 19863 played `C' with time resource 1080.
4. He/She played `C,' and player 19902 played `C' with time resource 360.
\textbf{Strategy 3}
Round 1:
1. He/She sent request `C' to 19840 with time resource 300.
2. He/She played `C,' and player 19866 played `C' with time resource 360.
3. He/She sent request `C' to 19862 with time resource 360.
4. He/She played `C,' and player 19904 played `C' with time resource 360.
5. He/She played `C,' and player 19897 played `C' with time resource 360.
6. He/She played `C,' and player 19862 played `C' with time resource 360.
7. He/She denied the request from player 19840.
Round 2:
1. He/She sent request `C' to 19840 with time resource 700.
2. He/She played `C,' and player 19897 played `C' with time resource 360.
3. He/She played `C,' and player 19904 played `C' with time resource 360.
4. He/She had to deny playing with player 19866 due to a lack of time.
5. He/She played `C,' and player 19840 played `C' with time resource 720.
6. He/She denied the request from player 19862.
7. He/She denied the request from player 19862.
Round 3:
1. He/She sent request `C' to 19897 with time resource 360.
2. He/She sent request `C' to 19904 with time resource 360.
3. He/She played `C,' and player 19840 played `C' with time resource 720.
4. He/She played `C,' and player 19904 played `C' with time resource 360.
5. He/She played `C,' and player 19897 played `C' with time resource 360.
6. He/She denied the request from player 19866.
7. He/She denied the request from player 19884.
8. He/She denied the request from player 19862.
Round 4:
1. He/She sent request `C' to 19904 with time resource 360.
2. He/She played `C,' and player 19904 played `C' with time resource 360.
3. He/She sent request `C' to 19897 with time resource 360.
4. He/She played `C,' and player 19840 played `C' with time resource 720.
5. He/She played `C,' and player 19897 played `C' with time resource 126.
6. He/She sent request `C' to 19884 with time resource 234.
7. He/She denied the request from player 19862.
8. He/She sent request `C' to 19862 with time resource 234.
9. He/She played `C,' and player 19862 played `C' with time resource 234.
Round 5:
1. He/She sent request `C' to 19840 with time resource 1440.
2. He/She had to deny playing with player 19862 due to a lack of time.
3. He/She sent request `C' to 19862 with time resource 700.
4. He/She sent request `C' to 19868 with time resource 740.
5. He/She played `C,' and player 19862 played `C' with time resource 700.
6. He/She had to deny playing with player 19877 due to a lack of time.
7. He/She sent request `C' to 19884 with time resource 740.
8. He/She played `C,' and player 19840 played `C' with time resource 720.
Round 6:
1. He/She sent request `C' to 19890 with time resource 20.
2. He/She played `C,' and player 19866 played `C' with time resource 720.
3. He/She sent request `C' to 19840 with time resource 700.
4. He/She denied the request from player 19897.
5. He/She sent request `C' to 19897 with time resource 20.
6. He/She played `C,' and player 19897 played `C' with time resource 20.
7. He/She played `C,' and player 19877 played `C' with time resource 40.
8. He/She had to deny playing with player 19862 due to a lack of time.
9. He/She sent request `C' to 19862 with time resource 660.
10. He/She played `C,' and player 19862 played `C' with time resource 660.
Round 7:
1. He/She sent request `C' to 19904 with time resource 360.
2. He/She played `C,' and player 19904 played `C' with time resource 360.
3. He/She played `C,' and player 19897 played `C' with time resource 720.
4. He/She denied the request from player 19866.
5. He/She sent request `C' to 19866 with time resource 360.
6. He/She played `C,' and player 19866 played `C' with time resource 360.
7. He/She denied the request from player 19840.
8. He/She denied the request from player 19862.
Round 8:
1. He/She sent request `C' to 19840 with time resource 720.
2. He/She played `C,' and player 19904 played `C' with time resource 360.
3. He/She played `C,' and player 19840 played `C' with time resource 720.
4. He/She denied the request from player 19866.
5. He/She sent request `C' to 19866 with time resource 360.
6. He/She played `C,' and player 19866 played `C' with time resource 360.
7. He/She denied the request from player 19862.
8. He/She denied the request from player 19877.
9. He/She denied the request from player 19897.
10. He/She denied the request from player 19877.
11. He/She denied the request from player 19897.
Round 9:
1. He/She played `C,' and player 19897 played `C' with time resource 1000.
2. He/She sent request `C' to 19840 with time resource 440.
3. He/She played `C,' and player 19862 played `C' with time resource 360.
4. He/She denied the request from player 19877.
5. He/She denied the request from player 19890.
6. He/She sent request `C' to 19890 with time resource 80.
7. He/She played `C,' and player 19890 played `D' with time resource 80.
Round 10:
1. He/She played `C,' and player 19866 played `C' with time resource 360.
2. He/She played `C,' and player 19897 played `C' with time resource 1000.
3. He/She denied the request from player 19862.
4. He/She sent request `C' to 19862 with time resource 80.
5. He/She played `C,' and player 19862 played `C' with time resource 80.
6. He/She denied the request from player 19877.
Round 11:
1. He/She played `C,' and player 19862 played `C' with time resource 360.
2. He/She played `C,' and player 19897 played `C' with time resource 1000.
3. He/She denied the request from player 19884.
4. He/She sent request `C' to 19884 with time resource 80.
5. He/She denied the request from player 19840.
6. He/She sent request `C' to 19840 with time resource 80.
7. He/She sent request `C' to 19904 with time resource 80.
8. He/She sent request `C' to 19890 with time resource 80.
9. He/She denied the request from player 19866.
Round 12:
1. He/She played `C,' and player 19897 played `C' with time resource 1440.
2. He/She denied the request from player 19884.
3. He/She denied the request from player 19862.
4. He/She denied the request from player 19877.
5. He/She denied the request from player 19866.
6. He/She denied the request from player 19840.
Round 13:
1. He/She played `D,' and player 19897 played `C' with time resource 1440.
2. He/She denied the request from player 19866.
3. He/She denied the request from player 19862.
4. He/She denied the request from player 19840.
5. He/She denied the request from player 19877.
6. He/She denied the request from player 19866.
Round 14:
1. He/She sent request `D' to 19840 with time resource 700.
2. He/She sent request `D' to 19866 with time resource 500.
3. He/She had to deny playing with player 19904 due to a lack of time.
4. He/She sent request `D' to 19904 with time resource 240.
5. He/She played `D,' and player 19866 played `D' with time resource 500.
6. He/She played `D,' and player 19904 played `C' with time resource 240.
7. He/She had to deny playing with player 19884 due to a lack of time.
\end{appendices}
% Bibliography
\bibliographystyle{unsrt}
% \bibliography{egt}
\begin{thebibliography}{10}
\bibitem{RN254}
U Fischbacher, z-tree: Zurich toolbox for ready-made economic experiments.
\newblock {\em\protect{Experimental Economics}} \textbf{10},
171--178 (2007).
\bibitem{RN255}
S Balietti, nodegame: Real-time, synchronous, online experiments in the
browser.
\newblock {\em\protect{Behavior Research Methods}} \textbf{49},
1696--1715 (2017).
\bibitem{RN256}
RX Hawkins, Conducting real-time multiplayer experiments on the web.
\newblock {\em\protect{Behavior Research Methods}} \textbf{47},
966--976 (2015).
\bibitem{RN257}
J Pettit, D Friedman, C Kephart, R Oprea, Software for continuous game
experiments.
\newblock {\em\protect{Experimental Economics}} \textbf{17},
631--648 (2014).
\bibitem{RN258}
UD Reips, C Neuhaus, Wextor: A web-based tool for generating and visualizing
experimental designs and procedures.
\newblock {\em\protect{Behavior Research Methods, Instruments, \&
Computers}} \textbf{34}, 234--240 (2002).
\bibitem{RN259}
MH Birnbaum, Surveywiz and factorwiz: Javascript web pages that make html forms
for research on the internet.
\newblock {\em\protect{Behavior Research Methods, Instruments, \&
Computers}} \textbf{32}, 339--346 (2000).
\bibitem{RN260}
F Cole, Understanding knowledge as a commons: From theory to practice.
\newblock {\em\protect{The Electronic Library}} \textbf{25},
630--631 (2007).
\bibitem{RN261}
K Lakkaraju, et~al., The controlled, large online social experimentation
platform (close) in {\em International Conference on Social Computing,
Behavioral-Cultural Modeling, and Prediction}.
\newblock (Springer), pp. 339--344 (2015).
\bibitem{RN262}
DL Chen, M Schonger, C Wickens, oTree--An open-source platform for laboratory,
online, and field experiments.
\newblock {\em\protect{Journal of Behavioral and Experimental
Finance}} \textbf{9}, 88--97 (2016).
\bibitem{mturk}
Amazon mechanical turk (https://www.mturk.com/).
\bibitem{psql}
Postgresql: The world's most advanced open source database
(https://www.postgresql.org/).
\bibitem{redis}
Redis (https://redis.io/).
\bibitem{sinatra}
Sinatra (http://sinatrarb.com/).
\bibitem{ruby}
Ruby programming language (http://www.ruby-lang.org/en/).
\bibitem{thin}
Thin - yet another web server (http://code.macournoyer.com/thin/).
\bibitem{rfc6455}
I Fette, A Melnikov, The websocket protocol, (Google Inc. and Isode Ltd.),
{RFC} 6455 (2011).
\bibitem{fws}
Github - faye/faye-websocket-ruby: Standards-compliant websocket client and
server (https://github.com/faye/faye-websocket-ruby).
\bibitem{json}
Json (http://www.json.org/).
\end{thebibliography}
\end{document}