Closed marcharper closed 6 years ago
See Figure 2 in particular where the extortionate strategies are described along the boundary of a region. This paper also defines the LR-strategy parameterization that we use in the Axelrod library.
Take a look at equations (54) and (56) in:
It looks similar to the characterization / parameterization of extortionate memory-one strategies in the manuscript.
Parameterization for extortionate strategies in a noisy environment:
Thanks for chasing these down @marcharper :+1:
See the section "Stability of extortionate ZD strategies" and also the the remark that