<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cooperative Games on Lattices</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Paris School of Economics Universite ́ Paris I 106-112, Bd de l'Hoˆpital</institution>
          ,
          <addr-line>75013 Paris</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>In cooperative game theory, for a given set of players N, TU-games are functions v : 2N → R which express for each nonempty coalition S ⊆ N of players the best they can achieve by cooperation. In the classical setting, every coalition may form without any restriction, i.e., the domain of v is indeed 2N . In practice, this assumption is often unrealistic, since some coalitions may not be feasible for various reasons, e.g., players are political parties with divergent opinions, or have restricted communication abilities, or a hierarchy exists among players, and the formation of coalitions must respect the hierarchy, etc. Many studies have been done on games defined on specific subdomains of 2N , e.g., antimatroids [1], convex geometries [3, 4], distributive lattices [6], or others [2, 5]. In this paper, we mainly deal with the case of distributive lattices. To this end, we assume that there exists some partial order on N describing some hierarchy or precedence constraint among players, as in [6]. We say that a coalition S is feasible if the coalition contains all its subordinates, i.e., i ∈ S implies that any j i belongs to S as well. Then feasible coalitions are downsets, and by Birkhoff's theorem, form a distributive lattice. From now on, we denote by F the set of feasible coalitions, assuming that 0/ , N ∈ F .</p>
      </abstract>
      <kwd-group>
        <kwd>C (v) = {x ∈ Rn | x(S) ≥ v(S)</kwd>
        <kwd>∀S ∈ F</kwd>
        <kwd>x(N) = v(N)}</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        where x(S) is a shorthand for ∑i∈S xi. When F = 2N , the core is either empty or a convex
bounded polyhedron. However, for games whose cooperation is restricted, the study of
the core becomes much more complex, since it may be unbounded or even contain
no vertices (see a survey in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]). For the case of games with precedence constraints,
it is known that the core is always unbounded or empty, but contains no line (i.e., it
has vertices). The problem arises then, to select a significant bounded part of the core
as a reasonable concept of solution, since unbounded payments make no sense. We
propose to select a bounded face of the core. A systematic study of bounded faces is
done through the concept of normal collections.
      </p>
      <p>We also present some results when F is not a distributive lattice, but a set lattice
closed under intersection, or a regular set system.</p>
      <p>Lastly, we introduce games on concept lattices, show that this induces in fact two
games, and give some results on the core.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>E.</given-names>
            <surname>Algaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Bilbao</surname>
          </string-name>
          , R. van den Brink,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jime</surname>
          </string-name>
          <article-title>´nez-Losada. Cooperative games on antimatroids</article-title>
          .
          <source>Discrete Mathematics</source>
          ,
          <volume>282</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. S. Be´al, E. Re´mila, and
          <string-name>
            <surname>Ph</surname>
          </string-name>
          . Solal.
          <article-title>Rooted-tree solutions for tree games</article-title>
          .
          <source>European Journal of Operational Research</source>
          ,
          <volume>203</volume>
          (
          <issue>2</issue>
          ):
          <fpage>404</fpage>
          -
          <lpage>408</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Bilbao</surname>
          </string-name>
          .
          <article-title>Axioms for the Shapley value on convex geometries</article-title>
          .
          <source>European Journal of Operational Research</source>
          ,
          <volume>110</volume>
          :
          <fpage>368</fpage>
          -
          <lpage>376</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>J. M. Bilbao</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Lebro</surname>
          </string-name>
          <article-title>´n, and</article-title>
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>Jime´nez. The core of games on convex geometries</article-title>
          .
          <source>European Journal of Operational Research</source>
          ,
          <volume>119</volume>
          :
          <fpage>365</fpage>
          -
          <lpage>372</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>U.</given-names>
            <surname>Faigle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Heyne</surname>
          </string-name>
          .
          <article-title>Monge extensions of cooperation and communication structures</article-title>
          .
          <source>European Journal of Operational Research</source>
          ,
          <volume>206</volume>
          :
          <fpage>104</fpage>
          -
          <lpage>110</lpage>
          ,
          <year>2010</year>
          .
          <volume>10</volume>
          .1016/j.ejor.
          <year>2010</year>
          .
          <volume>01</volume>
          .043.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>U.</given-names>
            <surname>Faigle</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Kern</surname>
          </string-name>
          .
          <article-title>The Shapley value for cooperative games under precedence constraints</article-title>
          .
          <source>Int. J. of Game Theory</source>
          ,
          <volume>21</volume>
          :
          <fpage>249</fpage>
          -
          <lpage>266</lpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          .
          <article-title>The core of games on ordered structures and graphs</article-title>
          .
          <source>Annals of Operations Research</source>
          , Vol.
          <volume>204</volume>
          (
          <year>2013</year>
          ),
          <fpage>33</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          .
          <article-title>Ensuring the boundedness of the core of games with restricted cooperation</article-title>
          .
          <source>Annals of Operations Research</source>
          ,
          <volume>191</volume>
          :
          <fpage>137</fpage>
          -
          <lpage>154</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          and
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>Sudh o¨lter. On the restricted cores and the bounded core of games on distributive lattices</article-title>
          .
          <source>Technical Report</source>
          <year>2012</year>
          .67,
          <string-name>
            <surname>Centre d'Economie de la Sorbonne</surname>
          </string-name>
          , Paris,
          <year>2012</year>
          . http://ideas.repec.org/s/mse/cesdoc.html.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          and
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>Sudh o¨lter. The bounded core for games with precedence constraints</article-title>
          .
          <source>Annals of Operations Research</source>
          , Vol.
          <volume>201</volume>
          (
          <year>2012</year>
          ),
          <fpage>251</fpage>
          -
          <lpage>264</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10479-012-1228- 9.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabisch</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Xie</surname>
          </string-name>
          .
          <article-title>The restricted core of games on distributive lattices: how to share benefits in a hierarchy</article-title>
          .
          <source>Mathematical Methods of Operations Research</source>
          ,
          <volume>73</volume>
          :
          <fpage>189</fpage>
          -
          <lpage>208</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>