This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Asymptotically stable matchings and evolutionary dynamics of preference revelation games in marriage problems

Hidemasa Ishii [email protected] Nariaki Nishino Graduate School of Frontier Science, The University of Tokyo, Kashiwa-shi, Chiba 277-8561, Japan School of Engineering, The University of Tokyo, Bunkyo-ku, Tokyo 113-8656, Japan
Abstract

The literature on centralized matching markets often assumes that a true preference of each player is known to herself and fixed, but empirical evidence casts doubt on its plausibility. To circumvent the problem, we consider evolutionary dynamics of preference revelation games in marriage problems. We formulate the asymptotic stability of a matching, indicating the dynamical robustness against sufficiently small changes in players’ preference reporting strategies, and show that asymptotically stable matchings are stable when they exist. The simulation results of replicator dynamics are presented to demonstrate the asymptotic stability. We contribute a practical insight for market designers that a stable matching may be realized by introducing a learning period in which participants find appropriate reporting strategies through trial and error. We also open doors to a novel area of research by demonstrating ways to employ evolutionary game theory in studies on centralized markets.

keywords:
asymptotic stability , marriage problem , matching theory , evolutionary game theory
JEL:
C73 , C78 , D47

1 Introduction

The marriage problem is a simple and basic model of two-sided matching markets which involves one-to-one matchings. Suppose that there are two sets of players MM and WW, often referred to as men and women respectively. Each player has a preference relation defined over the other set and remaining single. A preference profile PP is a vector which consists of the preference relations of all players. A matching is said to be stable, if no player is worse off than to remain unmatched, and if no pair of a man and a woman prefer each other to their current partners. Gale and Shapley [1] formulated the marriage problem and showed that the set of stable matchings is always nonempty. In the proof, they presented the so-called deferred acceptance (DA) algorithm, which always yields a stable matching. They also showed the existence of the MM-optimal stable matching: i.e. a stable matching that is preferred to all the other stable matchings by all men. Similarly, there exists the WW-optimal stable matching.

In practice, a matching has to be determined based on the reported preferences, because a matchmaker can never know the true preferences of players. A matching algorithm induces the preference revelation game, a noncooperative game where players submit their preferences strategically. We refer to a preference profile submitted by the players as a report profile, in order to distinguish it from the true preference profile. A number of studies have investigated incentives of players to report their true preferences [2, 3, 4, 5, 6] and characterized the set of matchings resulting from the strategic reporting behavior [7, 8, 9, 10]. These studies considered centralized matching markets where participants submit their preferences to a clearinghouse based on which an algorithm generates the matching. Another line of research concerns decentralized markets and has analyzed dynamic processes in which matchings are updated in a pairwise manner [11, 12, 13, 14].

The literature on centralized markets often assumes that a true preference of each player is known to herself and fixed throughout the matching process. However several empirical works on school choice situations cast doubt on its plausibility. Dwenger et al. [15] concluded that participants in the university admissions centralized market in Germany chose to randomize their decisions. The preliminary results by Narita [16] and Grenet et al. [17] both suggest that preferences of players changed in time and learning was the prominent driver of those changes. The current paper explores the possibility of circumventing this problem by adopting an evolutionary uuapproach. The standard setting of game theory is that the game is played exactly once by fully rational players. The contrasting setting of evolutionary game theory [18, 19] is that players are not necessarily rational and their behavior changes in time through such processes as trial-and-error and social learning. Evolutionary dynamics of a game refers to such time evolution of the strategy profile. Since players learn their own and others’ preferences by experience, they need not be aware of their preferences when the process begins, unlike much of the literature on centralized markets.

In this paper, we theoretically investigate what kind of matchings will emerge through evolutionary dynamics of preference revelation games in marriage problems. We consider a class of continuous-time deterministic evolutionary dynamics which contains the famous replicator dynamics. We define the asymptotic stability of a matching, an analogue to the asymptotic stability of a fixed point in dynamical systems. When a matching is asymptotically stable, it is likely to be obtained at the equilibria of evolutionary dynamics. Furthermore, it turns out that an asymptotically stable matching may not exist, but when it does, it is also stable. The simulation results of the replicator dynamics are presented to demonstrate the dynamical robustness of an asymptotically stable matching against perturbation in the strategy profile. The asymptotic stability of a matching indicates the matching will be restored after another matching is realized due to sufficiently small changes in players’ reporting strategies. When a fixed point of a dynamical system is asymptotically stable, it intuitively means that sufficiently small perturbation results in a movement that goes back to the fixed point111Let xx^{*} be a fixed point of a system x˙=f(x)\dot{x}=f(x). xx^{*} is Lyapunov stable if, for each ϵ>0\epsilon>0, there exists a δ>0\delta>0 such that if x(0)x<δ\norm{x(0)-x^{*}}<\delta then x(t)x<ϵ\norm{x(t)-x^{*}}<\epsilon for all t0t\geq 0. xx^{*} is attracting if there exists δ>0\delta>0 such that if x(0)x<δ\norm{x(0)-x^{*}}<\delta then limtx(t)=x\lim_{t\to\infty}x(t)=x^{*}. xx^{*} is asymptotically stable if it is both Lyapunov stable and attracting [20]. . Our asymptotic stability of a matching is similar to the asymptotic stability in dynamical systems, but differs in that a focal state and perturbation are not in the same space. In matching problems, a focal state, a matching, is a point in the matching space, which is the set of all possible matchings. By contrast, perturbation corresponds to a change in the reporting strategy of a player, and players’ strategies are represented by a point in the strategy space.

This research contributes to matching theory in practical and theoretical manner. Firstly, we formulated the asymptotic stability of a matching, which characterize the matchings that emerge through evolutionary dynamics. An asymptotically stable matching is likely to be realized when players experiment or make mistakes occasionary. Furthermore we found that the asymptotic stability of a matching implies its stability. Thus the current paper suggests a novel practical strategy for market designers to implement stable matchings, which is to create a learning phase in which participants can try submitting various preferences and are informed of the would-be matchings many times over. Players would find reporting strategies that appropriately represent their true preferences during this learning phase. Accordingly an asymptotically stable and hence stable matching is realized. We emphasize that our argument does not neccesitate players’ initial awareness of their true preferences, unlike the literature. Secondly, we demonstrate how to employ evolutionary game theory in studying centralized matching markets, thereby opening doors to a novel area of research. Many directions can be taken: analytical research with machinery of evolutionary game theory, numerical analysis of evolutionary dynamics, and empirical work informed by such theoretical studies are all feasible.

The rest of the paper is organized as follows. Section 2 is the preliminaries, where formulation of marriage problems, preference revelation games, and some concepts from evolutionary game theory are presented. In the following section, we formulate the asymptotic stability of a matching. In section 4, we consider two instances of marriage problems and present simulation results of the replicator dynamics of preference revelation games. Section 5 is the discussion, and the concluding remark is in the last section.

2 Preliminaries

2.1 Marriage problem and the preference revelation game

An instance of the marriage problem is denoted by a tuple (M,W,P)(M,W,P), where MM and WW are the sets of players on each side, and PP is the preference profile. A one-to-one matching is a mapping μ:MWMW\mu:M\cup W\to M\cup W. Single players are considered to be paired with themselves. Thus μ(m)W{m}\mu(m)\in W\cup\{m\} for each mMm\in M, μ(w)M{w}\mu(w)\in M\cup\{w\} for each wWw\in W, and if μ(m)=w\mu(m)=w then μ(w)=m\mu(w)=m. A matching μ\mu is said to be individually rational if no player prefers being single to the current partner. We say that a pair (m,w)(m,w) blocks a matching μ\mu when mm prefers ww to μ(m)\mu(m) and ww prefers mm to μ(w)\mu(w). μ\mu is said to be stable if it is individually rational and has no blocking pair.

A matching algorithm induces the preference revelation game. A preference revelation game is characterized by a triplet (I,S,π)(I,S,\pi), where II is the set of players, SS is the pure strategy space, and π\pi is the tuple of payoff functions. Firstly, I=MWI=M\cup W in standard cases, but I=WI=W when all men are assumed to play their dominant strategies and report truthfully [3, 2]. As for the pure strategy space, SiS^{i}, the set of pure strategies for player iIi\in I, consists of ii’s all possible preferences. S=iISiS=\prod_{i\in I}S^{i} is the pure strategy space of the game. Denoting the set of all possible preferences of male and female players by SMS^{M} and SWS^{W} respectively, Si=SMS^{i}=S^{M} for all iMi\in M and Si=SWS^{i}=S^{W} for all iWi\in W. Furthermore, a simplex Δi={(xhi)hSi|Si||xhi0,hSixhi=1}|Si|\Delta^{i}=\quantity{\quantity(x^{i}_{h})_{h\in S^{i}}\in\mathbb{R}^{|S^{i}|}\mathrel{}\middle|\mathrel{}x^{i}_{h}\geq 0,\,\sum_{h\in S^{i}}x^{i}_{h}=1}\subset\mathbb{R}^{|S^{i}|} denotes the mixed strategy space for player ii, and Θ=iIΔi\Theta=\prod_{i\in I}\Delta^{i} is the mixed strategy space of the game. Lastly, the payoff function, which maps a strategy profile to a real-valued payoff, is a composition of two mappings. The first mapping, a matching algorithm, describes the correspondence between a strategy profile, i.e. a report profile, and the resulting matching. The second mapping, which we call a utility function, maps each matching to a payoff value. Formally, let \mathcal{M} denote the matching space, which is the set of all possible matchings. When a matching algorithm in use always yields the same matching from a given report profile, the algorithm Γ:S\Gamma:S\to\mathcal{M} is a mapping from the pure strategy space to the matching space . In this study, we assume that players’ preferences are strict and a MM-optimal stable algorithm is used, so that the above requirement is met. A utility function of player ii, ui:u^{i}:\mathcal{M}\to\mathbb{R}, maps the resulting matching to the player’s payoff. In the current paper, we write ui=(u1i,,uni)u^{i}=(u^{i}_{1},\dots,u^{i}_{n}) to describe a utility function where the payoff of ii when matched with jj-th preferable player is ujiu^{i}_{j}. Assuming u1i>>uniu^{i}_{1}>\dots>u^{i}_{n}, uiu^{i} is considered as ii’s cardinal preference. Player ii’s payoff function of the game πi:S\pi^{i}:S\to\mathbb{R} is the composition of the matching algorithm Γ\Gamma and the utility function uiu^{i}: πi=uiΓ\pi^{i}=u^{i}\circ\Gamma. π\pi in the triplet (I,S,π)(I,S,\pi) is the tuple of payoff functions: π=(πi)iI\pi=(\pi^{i})_{i\in I}.

Our formulation of preference revelation game has two characteristics. First, players are to report their entire preference lists only once, so that evolutionary game theory on normal form games is applicable. If players are to reveal their preferences one by one, the game becomes an extensive-form game. The analysis of such situations seems possible with evolutionary game theory on extensive-form games, but it is beyond the scope of this paper. Second, we consider cardinal preferences, turning preference relations into numerical payoffs with a utility function uiu^{i}. This enables us to formulate and solve systems of differential equations which represent evolutionary selection dynamics. When ordinal preferences are concerned, the payoff is determined solely by the rank of the partner in the preference list. With cardinal preferences, in contrast, payoffs may vary among players who are matched to their nn-th preferable partners. As the first attempt to study evolutionary selection dynamics of the preference revelation game, we would like to have as similar conditions as possible to existing studies, many of which adopted ordinal preferences. Therefore, we use identical uiu^{i} for all players 222Assigning different uiu^{i} for each player results in different selection pressures among players. Although such modificatoins lead to changes in specific trajectories in the strategy space, we expect that qualitative features of dynamics such as stabilities of fixed points would not be affected. , which makes payoff comparison among players pointless.

2.2 Evolutionary game dynamics

Replicator dynamics (RD) is one of the most significant evolutionary dynamics. A replicator corresponds to a pure strategy, and the payoff it gains is considered as its fitness. RD models the Darwinian natural selection, where strategies with higher payoffs prosper while ones with lower payoffs decline. This model was introduced by Taylor and Jonker [21] in the game theoretic context, and later named Replicator Dynamics by Schuster and Sigmund [22]. Researchers have actively studied RD thereafter, and it has also played a great role in analyzing human and social behavior [23]. Let d=|I|d=|I| be the number of players in the preference revelation game. Suppose there are dd large and finite populations of replicators, each of which corresponds to a player in the game. For instance, all replicators in the population corresponding to mMm\in M have the same true preferences, and the set of pure strategies available to them is SMS^{M}. Choosing one replicator from each population randomly, we have dd replicators, each of which plays preference revelation game as the corresponding player. Replicators earning payoffs higher than the average increase their share within their populations, while ones with payoffs lower than the average decline. The dynamics of natural selection can be modeled by the repetition of this process.

Suppose that each replicator in a population of player iIi\in I is programmed to use a fixed pure strategy hSih\in S^{i}. Let xhi[0,1]x^{i}_{h}\in[0,1] denote the population share of replicators which always use pure strategy hh and whose roles are player ii. Then a vector xi=(xhi)hSix^{i}=(x^{i}_{h})_{h\in S^{i}} indicates the state of the player ii population. It is formally equivalent to a mixed strategy of player ii: i.e. xiΔix^{i}\in\Delta_{i}. Let fhif^{i}_{h} be the average payoff of the replicators of player ii with pure strategy hh, which is equivalent to the expected payoff of hh. ϕi=hSixhifhi\phi^{i}=\sum_{h\in S^{i}}x^{i}_{h}f^{i}_{h} is the average payoff of all player ii replicators, or the expected payoff of mixed strategy xix^{i}. Replicator dynamics of a game with dd player is formulated as follows:

xhi˙=xhi(fhiϕi)iI,\dot{x^{i}_{h}}=x^{i}_{h}\quantity(f^{i}_{h}-\phi^{i})\quad\forall i\in I, (1)

where x˙=dxdt\dot{x}=\derivative{x}{t} and

hSixhi=1,fhi=s1,,sd1xs11xsi1i1xsii+1xsd1dπ(h;s1sd1),ϕi=hSixhifhi.\sum_{h\in S^{i}}x^{i}_{h}=1,\quad f^{i}_{h}=\sum_{s_{1},\dots,s_{d-1}}x^{1}_{s_{1}}\dots x^{i-1}_{s_{i-1}}x^{i+1}_{s_{i}}\dots x^{d}_{s_{d-1}}\pi(h;s_{1}\dots s_{d-1}),\quad\phi^{i}=\sum_{h\in S^{i}}x^{i}_{h}f^{i}_{h}. (2)

The summation in fhif^{i}_{h} is taken for s1,,sd1s_{1},\dots,s_{d-1}, the strategies of players other than ii. In words, xhix^{i}_{h} sums up to one for each player, fhif^{i}_{h} is the average payoff for pure strategy hh of player ii, and ϕi\phi^{i} is the average payoff for the player ii population. RD is a system of iI(|Si|1)\sum_{i\in I}(|S^{i}|-1) differential equations.

The idea of biological reproduction is the basis for RD. However, the selection of replicators, namely pure strategies, may well be driven by other mechanisms such as imitations, especially in the social and economic context. We consider some classes of continuous-time selection dynamics following Weibull [18], which are generalizations of RD.

To describe the selection process, the growth-rate function is considered. Let ghi(x)g^{i}_{h}(x) be the growth rate of the population share corresponding to player ii and pure strategy hh under population state xx, and

x˙hi=ghi(x)xhiiI,hSi,xΘ.\dot{x}^{i}_{h}=g^{i}_{h}(x)x^{i}_{h}\quad\forall i\in I,h\in S^{i},x\in\Theta. (3)

The growth-rate function is a vector g(x)=(gi(x))iIg(x)=(g^{i}(x))_{i\in I}, whose each component is a growth-rate function for player ii, gi(x)=(ghi(x))hSig^{i}(x)=(g^{i}_{h}(x))_{h\in S_{i}}. Note that the growth-rate function of RD is ghi(x)=fhiϕig^{i}_{h}(x)=f^{i}_{h}-\phi^{i}. Selection dynamics are classified based on the properties of the growth-rate function. A regular growth-rate function is a Lipschitz continuous333 A function ff is Lipschitz continuous if there exists a constant kk such that |f(x1)f(x2)|<k|x1x2||f(x_{1})-f(x_{2})|<k|x_{1}-x_{2}| for all x1,x2x_{1},x_{2}. function g:X|Si|g:X\to\mathbb{R}^{|S^{i}|} with open domain X|Si|X\subset\mathbb{R}^{|S^{i}|} containing Θ\Theta, such that gi(x)xi=0g^{i}(x)\cdot x^{i}=0 for all xΘx\in\Theta and iIi\in I [18, Definition 5.4]. GG denotes the set of regular growth-rate functions, and the selection dynamics induced by a regular growth-rate function will be called a regular selection dynamics on Θ\Theta. A regular growth-rate function gGg\in G is payoff positive, if sgn[ghi(x)]=sgn[ui(h,xi)ui(x)]\operatorname{sgn}\quantity[g^{i}_{h}(x)]=\operatorname{sgn}\quantity[u^{i}(h,x^{-i})-u^{i}(x)] for all xΘ,iIx\in\Theta,i\in I and hSih\in S_{i}, where sgn[z]\operatorname{sgn}\quantity[z] denotes the sign of zz\in\mathbb{R} [18, Definition 5.6]. GPGG^{P}\subset G denotes the set of payoff-positive growth-rate functions, and the induced selection dynamics will be called a payoff-positive selection dynamics. Note that RD of equation (1) is payoff positive.

Under the payoff-positive selection dynamics, a subset of the mixed strategy space Θ(H)Θ\Theta(H)\subset\Theta spanned by a set of pure strategy profiles H=iIHiSH=\prod_{i\in I}H^{i}\subset S is asymptotically stable if and only if HH is closed under weakly better replies [18, Theorem 5.3]. If a pure strategy hSih\in S^{i} earns at least as high payoff against a (mixed) strategy profile xΘx\in\Theta as xix^{i}, hh is a weakly better reply to xx. Let αi(H)\alpha^{i}(H) be

αi(H)={hSi|ui(h,xi)ui(x)for somexΘ(H)}.\alpha^{i}(H)=\quantity{h\in S^{i}\mathrel{}\middle|\mathrel{}u^{i}(h,x^{-i})\geq u^{i}(x)\ \text{for some}\ x\in\Theta(H)}. (4)

ui(h,xi)u^{i}(h,x^{-i}) denotes the payoff of hh for player position ii against xx, and ui(x)u^{i}(x) is the average payoff for ii under xx. HH is closed under weakly better replies (cuwbr) if αi(H)Hi\alpha^{i}(H)\subset H^{i} for all iIi\in I [18, Definition 5.9]. The property of cuwbr is a generalized concept of a strict Nash equilibrium444 A strategy profile xx is a strict Nash equilibrium if xx is the only best response to itself. to a set.

3 Asymptotic stability of a matching

In this section, we formulate asymptotic stability of a matching. When a matching is asymptotically stable, it will be restored after another matching is realized due to perturbation, which is a change in the reporting strategy of a player. Asymptotic stability of a matching differs from the asymptotic stability in dynamical systems in that a focal state and perturbation are not in the same space. Whereas a focal state is on the matching space, perturbation occurs in the strategy space. An evolutionary dynamics such as RD of equation (1) describes the time evolution of the strategy distributions in the mixed strategy space. A matching algorithm maps a point in the mixed strategy space to a set of matchings in the matching space. We utilize this relationship between the strategy space and the matching space, and define asymptotic stability of a matching through the asymptotic stability of a corresponding area in the mixed strategy space, where the conventional definition of the asymptotic stability in dynamical systems can be used.

First, we define a partial preimage of a matching μ\mu, a subset of the pure strategy space that corresponds to μ\mu. An obvious requirement for a partial preimage of μ\mu is that any report profile in the set yields μ\mu by the algorithm in use. In addition, we require the set to be a cartesian product of the subset of the each player’s pure strategy space. This is because players determine their strategy independently in preference revelation game. Formally, a partial preimage of a matching is defined as follows.

Definition 1.

Let Γ:S\Gamma:S\to\mathcal{M} be the matching algorithm in use. A subset of the pure strategy space H(μ)SH(\mu)\subset S is called a partial preimage of matching μ\mu, when it satisfies the following:

 a. Γ(r)=μrH(μ)\displaystyle\Gamma(r)=\mu\quad\forall\,r\in H(\mu) (5)
 b. (Hi)iI s.t. HiSiiI,H(μ)=iIHi.\displaystyle\exists\,\quantity(H^{i})_{i\in I}\mbox{\quad s.t.\quad}H^{i}\subset S^{i}\quad\forall\,i\in I,\quad H(\mu)=\prod_{i\in I}H^{i}. (6)

H(μ)H(\mu) is ”partial” in that it is included in the preimage of μ\mu under Γ\Gamma: i.e. H(μ){rS|Γ(r)=μ}H(\mu)\subset\quantity{r\in S\mathrel{}\middle|\mathrel{}\Gamma(r)=\mu}. There may exist multiple partial preimages for a matching. In particular, any subset of H(μ)H(\mu) is a trivial partial preimage of μ\mu. In later sections, we refer to a nontrivial one that is not included in any other partial preimage of μ\mu as a non-included partial preimage of μ\mu.

Now, we formulate asymptotic stability of a matching μ\mu using its partial preimage H(μ)=iIHi(μ)H(\mu)=\prod_{i\in I}H^{i}(\mu). Let Θ(H(μ))\Theta(H(\mu)) denote the subspace of the mixed strategy space spanned by H(μ)H(\mu):

Θ(H(μ))=iIΔi(H(μ)),Δi(H(μ))={(xhi)hHi(μ)|Hi(μ)||xhi0,hHi(μ)xhi=1}.\Theta(H(\mu))=\prod_{i\in I}\Delta^{i}(H(\mu)),\quad\Delta^{i}(H(\mu))=\quantity{\quantity(x^{i}_{h})_{h\in H^{i}(\mu)}\in\mathbb{R}^{\absolutevalue{H^{i}(\mu)}}\mathrel{}\middle|\mathrel{}x^{i}_{h}\geq 0,\,\sum_{h\in H^{i}(\mu)}x^{i}_{h}=1}. (7)

Note that any mixed report profile in Θ(H(μ))\Theta(H(\mu)) yields only μ\mu. Suppose that a mixed strategy profile xx is initially in Θ(H(μ))\Theta(H(\mu)), and then sufficiently small perturbation drives the point xx out of Θ(H(μ))\Theta(H(\mu)). While xx is not in Θ(H(μ))\Theta(H(\mu)), the algorithm may now yield matchings other than μ\mu. If Θ(H(μ))\Theta(H(\mu)) is asymptotically stable, xx moves back into Θ(H(μ))\Theta(H(\mu)) after some time, yielding only μ\mu. In short, μ\mu will be restored after sufficiently small perturbation, if Θ(H(μ))\Theta(H(\mu)) is asymptotically stable. As described in the previous section, under payoff-positive selection dynamics, Θ(H(μ))\Theta(H(\mu)) is asymptotically stable if and only if H(μ)H(\mu) is closed under weakly better replies (cuwbr). In this way, we formulate asymptotic stability of a matching.

Definition 2.

A matching μ\mu is asymptotically stable under payoff-positive selection dynamics if it has a partial preimage that is closed under weakly better replies.

An asymptotically stable matching does not always exist, but if it does, it is also stable.

Theorem 1.

When MM-optimal or WW-optimal stable algorithms are used, a matching that is asymptotically stable under payoff-positive selection dynamics is stable.

Proof.

We concentrate on the case where MM-optimal stable algorithms are used. The same argument holds for WW-optimal stable algorithms. Players are indifferent as to which of MM-optimal stable algorithms is in use, because all of them yield the same matching from a given report profile. Therefore we assume that the DA algorithm with men proposing [1] is used without loss of generality.

Contrary to the theorem, suppose that an unstable matching μu\mu_{u} is asymptotically stable. μu\mu_{u} has a partial preimage H(μu)H(\mu_{u}) that is cuwbr. The instability of μu\mu_{u} implies that it has a blocking pair or it is not individually rational. When it has a blocking pair (m,w)(m,w), the fact that mm and ww are not paired with each other under μu\mu_{u} indicates that mm did not propose to ww. Thus all the reports of mm in H(μu)H(\mu_{u}) rank μu(m)\mu_{u}(m) above ww. Let P(m)P(m) be such a preference, where μu(m)\mu_{u}(m) is ranked above ww, and P(m)P^{\prime}(m) be a preference of mm where ww is ranked above μu(m)\mu_{u}(m). Note that P(m)P^{\prime}(m) is not a element of H(μu)H(\mu_{u}).

  1. i.

    If all the reports of ww in H(μu)H(\mu_{u}) rank mm above μu(w)\mu_{u}(w), mm can be better off by reporting P(m)P^{\prime}(m). This contradicts the closure under weakly better replies (cuwbr) of H(μu)H(\mu_{u}).

  2. ii.

    If all the reports of ww in H(μu)H(\mu_{u}) rank μu(w)\mu_{u}(w) above mm, mm is not worse off by reporting P(m)P^{\prime}(m). This contradicts the cuwbr of H(μu)H(\mu_{u}).

  3. iii.

    If reports of ww in H(μu)H(\mu_{u}) include both types of preferences described above, mm is at least not worse off by reporting P(m)P^{\prime}(m). This contradicts the cuwbr of H(μu)H(\mu_{u}).

Therefore an asymptotically stable matching cannot have a blocking pair. When μu\mu_{u} is not individually rational, some player ii is paired with someone unacceptable: i.e. ii prefers itself to μu(i)\mu_{u}(i). This indicates that all the reports of ii in H(μu)H(\mu_{u}) rank μu(i)\mu_{u}(i) above ii, and thus ii can be better off by reporting a preference where ii is preferred to μu(i)\mu_{u}(i), which contradicts the cuwbr of H(μu)H(\mu_{u}). Therefore an asymptotically stable matching must be individually rational, and this completes the proof. ∎

4 Simulations of replicator dynamics

Table 1: All the possible preferences, matchings, and their labels.
(a) Male’s possible preferences.
label preference
M1M1 (w1,w2,w3)(w_{1},w_{2},w_{3})
M2M2 (w1,w3,w2)(w_{1},w_{3},w_{2})
M3M3 (w2,w1,w3)(w_{2},w_{1},w_{3})
M4M4 (w2,w3,w1)(w_{2},w_{3},w_{1})
M5M5 (w3,w1,w2)(w_{3},w_{1},w_{2})
M6M6 (w3,w2,w1)(w_{3},w_{2},w_{1})
(b) Female’s possible preferences.
label preference
W1W1 (m1,m2,m3)(m_{1},m_{2},m_{3})
W2W2 (m1,m3,m2)(m_{1},m_{3},m_{2})
W3W3 (m2,m1,m3)(m_{2},m_{1},m_{3})
W4W4 (m2,m3,m1)(m_{2},m_{3},m_{1})
W5W5 (m3,m1,m2)(m_{3},m_{1},m_{2})
W6W6 (m3,m2,m1)(m_{3},m_{2},m_{1})
(c) All the possible matchings.
label matching
μ1\mu_{1} [(m1,w1),(m2,w2),(m3,w3)][(m_{1},w_{1}),(m_{2},w_{2}),(m_{3},w_{3})]
μ2\mu_{2} [(m1,w1),(m2,w3),(m3,w2)][(m_{1},w_{1}),(m_{2},w_{3}),(m_{3},w_{2})]
μ3\mu_{3} [(m1,w2),(m2,w1),(m3,w3)][(m_{1},w_{2}),(m_{2},w_{1}),(m_{3},w_{3})]
μ4\mu_{4} [(m1,w2),(m2,w3),(m3,w1)][(m_{1},w_{2}),(m_{2},w_{3}),(m_{3},w_{1})]
μ5\mu_{5} [(m1,w3),(m2,w1),(m3,w2)][(m_{1},w_{3}),(m_{2},w_{1}),(m_{3},w_{2})]
μ6\mu_{6} [(m1,w3),(m2,w2),(m3,w1)][(m_{1},w_{3}),(m_{2},w_{2}),(m_{3},w_{1})]
Refer to caption
(a) The dynamics of the first problem (M,W,P1)(M,W,P_{1}). 0.1 was added to xW5w1x^{w_{1}}_{W5} at t=1t=1 and to xW1w1x^{w_{1}}_{W1} at t=2t=2 as perturbations. The state got stationary at t=1,2,3t=1,2,3. At the stationary state, W1W1 and W2W2 survived in the w1w_{1} population, and no strategy went extinct in the w2w_{2} and w3w_{3} populations. There were 72 possible report profiles at the stationary state.
Refer to caption
(b) The dynamics of the second problem (M,W,P2)(M,W,P_{2}). 0.1 was added to xW5w2x^{w_{2}}_{W5} at t=3t=3 and to xW5w1x^{w_{1}}_{W5} at t=6t=6 as perturbations. The state got stationary at t=3,6,7t=3,6,7. At the stationary state, W1W1 and W2W2 in the w1w_{1} population and W6W6 in the w2w_{2} population survived. No strategy went extinct in the w3w_{3} population. There were 12 possible report profiles at the stationary state.
Figure 1: RD of equation (1) were numerically solved from the initial condition x0i=(16)hSix^{i}_{0}=\left(\frac{1}{6}\right)_{h\in S^{i}} for all iIi\in I. The utility function was set to uconv=(25,10,1)u_{\text{conv}}=(25,10,1). The player position ii and its true preference are shown on top of each plot. The lower right panel shows the shares of the resulting matchings at every time. The other three panels show the time evolutions of the strategy profile in each player population.

So far, we have discussed game dynamics of preference revelation games theoretically. In this section, we take two instances marriage problems, and present numerical simulations of replicator dynamics (RD) of preference revelation games. We pay particular attention to matchings that will be realized after report profiles evolve for some time according to RD. We consider marriage problems with three players on each side: i.e. M={m1,m2,m3}M=\quantity{m_{1},m_{2},m_{3}} and W={w1,w2,w3}W=\quantity{w_{1},w_{2},w_{3}}. It is assumed that male players do not use weakly dominated strategies, which means they always report truthfully. Thus in this section, the set of strategic players is I=WI=W. All the possible reports are shown in tables 1, where (m1,m2,m3)(m_{1},m_{2},m_{3}) denotes a preference of a woman who prefers m1m_{1} to m2m_{2}, and m2m_{2} to m3m_{3}. We will refer to a pure strategy by its label shown in the tables. The pure strategy space of the game is S={W1,W2,,W6}3S=\quantity{W1,W2,\dots,W6}^{3}. It is assumed in this section that all players are acceptable. RD of equation (1) were numerically solved with the initial condition where all pure strategies evenly exist: i.e. x0i=(16)hSix^{i}_{0}=\quantity(\frac{1}{6})_{h\in S^{i}} for all iIi\in I. The DA algorithm with men proposing was used in obtaining a matching from a report profile, and matchings were mapped to payoffs by the utility function uconv=(25,10,1)u_{\text{conv}}=(25,10,1). For example, when a replicator is paired with the most preferable man, its payoff is 25. We say the state xx is at the stationary state at time tt, if the maximum changes in xix^{i} during the last few calculation steps were sufficiently small555Let the state at time tt, which corresponds to the nn-th calculation point, be xnx_{n}. Let the state at ii calculation steps before xnx_{n} be xnix_{n-i}. We say xx is at the stationary at time tt, if maxiI(|xniixni1i|)<105\max_{i\in I}(\absolutevalue{x^{i}_{n-i}-x^{i}_{n-i-1}})<10^{-5} for i{0,,3}i\in\quantity{0,\dots,3}. . Furthermore, we say that a pure strategy survived when its population share at the stationary state was more than 0.1%.

The marriage problems we investigated are (M,W,P1)(M,W,P_{1}) and (M,W,P2)(M,W,P_{2}), where

P1=(M1,M1,M2,W1,W2,W1) and P2=(M3,M1,M1,W2,W5,W1).P_{1}=(M1,M1,M2,W1,W2,W1)\mbox{\quad and\quad}P_{2}=(M3,M1,M1,W2,W5,W1). (8)

The preference of m1m_{1} is shown first in a preference profile, that of m2m_{2} second and so on, the last being the preference of w3w_{3}. In the first problem with P1P_{1}, the MM-optimal and WW-optimal stable matchings are

μ1M=[(m1,w1),(m2,w2),(m3,w3)] and μ1W=[(m1,w1),(m2,w3),(m3,w2)].\mu^{M}_{1}=[(m_{1},w_{1}),(m_{2},w_{2}),(m_{3},w_{3})]\mbox{\quad and\quad}\mu^{W}_{1}=[(m_{1},w_{1}),(m_{2},w_{3}),(m_{3},w_{2})]. (9)

Under μ1M\mu^{M}_{1}, m1m_{1} is paired with w1w_{1}, m2m_{2} paired with w2w_{2}, and m3m_{3} paired with w3w_{3}. The MM-optimal and WW-optimal stable matchings do not coincide, but no woman has the incentive to falsify assuming others are truthful666Theorem 1 of Gale and Sotomeyer [4] asserts that there is at least one woman who will be better off by falsifying, if there is more than one stable matching. In the problem with P1P_{1}, no woman has the incentive to misreport even though there are multiple stable matchings, because we assumed that all players were acceptable. . In the second problem777P2P_{2} was taken from the proof of Theorem 3 in Roth [2]. with P2P_{2}, the MM-optimal and WW-optimal stable matchings are

μ2M=[(m1,w2),(m2,w3),(m3,w1)] and μ2W=[(m1,w1),(m2,w3),(m3,w2)].\mu^{M}_{2}=[(m_{1},w_{2}),(m_{2},w_{3}),(m_{3},w_{1})]\mbox{\quad and\quad}\mu^{W}_{2}=[(m_{1},w_{1}),(m_{2},w_{3}),(m_{3},w_{2})]. (10)

Under MM-optimal stable algorithms, at least one woman has the incentive to falsify so that μ2W\mu^{W}_{2} instead of μ2M\mu^{M}_{2} is obtained. For instance, μ2W\mu^{W}_{2} is realized if w2w_{2} falsely reports W6W6.

Before presenting the simulation results, we check if asymptotically stable matchings exist in the two marriage problems888 In practice, we first simulated replicator dynamics and then studied asymptotically stable matchings referring to the simulation results. . In the first problem with P1P_{1}, the following set is a non-included partial preimage of μ1M\mu^{M}_{1} under MM-optimal stable algorithms:

H(μ1M):={W1,W2}×{W1,,W6}×{W1,,W6}.H(\mu^{M}_{1}):=\{W1,W2\}\times\{W1,\dots,W6\}\times\{W1,\dots,W6\}. (11)

H(μ1M)H(\mu^{M}_{1}) turns out to be cuwbr, and thus μ1M\mu^{M}_{1} is asymptotically stable, as shown in B.1. In the proof, we essentially checked if α(H(μ1M))\alpha(H(\mu^{M}_{1})) of equation (4) satisfied the definition of cuwbr with payoff tables, which was made workable due to the assumption of I=WI=W. In the second problem with P2P_{2}, one finds two non-included partial preimages of μ2W\mu^{W}_{2} under MM-optimal stable algorithms:

H1(μ2W)\displaystyle H_{1}(\mu^{W}_{2}) ={W1,W2}×{W6}×{W1W6},\displaystyle=\{W1,W2\}\times\{W6\}\times\{W1\dots W6\}, (12)
H2(μ2W)\displaystyle H_{2}(\mu^{W}_{2}) ={W1}×{W5,W6}×{W1W6}.\displaystyle=\{W1\}\times\{W5,W6\}\times\{W1\dots W6\}. (13)

The following relations hold for H1H_{1} and H2H_{2}, where HiH^{i} satisfies H=iIHiH=\prod_{i\in I}H^{i}:

αw1(H1)\displaystyle\alpha^{w_{1}}(H_{1}) H1w1\displaystyle\subset H^{w_{1}}_{1} (14)
αw2(H1)\displaystyle\alpha^{w_{2}}(H_{1}) H1w2{W5}H1w2\displaystyle\subset H^{w_{2}}_{1}\cup\{W5\}\not\subset H^{w_{2}}_{1}
αw1(H2)\displaystyle\alpha^{w_{1}}(H_{2}) H2w1{W2}H2w1\displaystyle\subset H^{w_{1}}_{2}\cup\{W2\}\not\subset H^{w_{1}}_{2} (15)
αw2(H2)\displaystyle\alpha^{w_{2}}(H_{2}) H2w2\displaystyle\subset H^{w_{2}}_{2}

Equations (14) and (15) indicate that neither H1H_{1} nor H2H_{2} is cuwbr. Indeed, one can show that there is no partial preimage of μ2W\mu^{W}_{2} that is cuwbr, implying that μ2W\mu^{W}_{2} is not asymptotically stable. Details on the proofs are in B.2 and B.3. In addition, there is no partial preimage of μ2M\mu^{M}_{2} that is cuwbr, since w1w_{1}’s reporting W1W1 earns a higher payoff when others are reporting truthfully. Therefore, no asymptotically stable matching exists in the second problem.

In figures 1, the time evolution of xix^{i} and the resulting matchings are presented. In the first problem (figure 1), truthful reportings of all players have survived. All the possible report profiles at the stationary state result in the MM-optimal stable matching μ1M\mu^{M}_{1}. One can see that although the values of some xhix^{i}_{h} changed after perturbation (e.g. xW1w1x^{w_{1}}_{W1} at t=2t=2), the set of surviving reports were always H(μ1M)H(\mu^{M}_{1}), and the resulting matching remained μ1M\mu^{M}_{1} regardless of the perturbations. This demonstrates the asymptotic stability of H(μ1M)H(\mu^{M}_{1}) and thus μ1M\mu^{M}_{1}. In the second problem (figure 1), truthful reporting went extinct in the w2w_{2} population. All the possible report profiles at the stationary state result in the WW-optimal stable matching μ2W\mu^{W}_{2}, not μ2M\mu^{M}_{2}. However, while the set of surviving reports was H1(μ2W)H_{1}(\mu^{W}_{2}) at t=3t=3, it changed to H2(μ2W)H_{2}(\mu^{W}_{2}) as the result of the perturbation at t=3t=3. In short, even though μ2W\mu^{W}_{2} seemed robust against the perturbations, it is not asymptotically stable in our definition. We will explore this situation in the next section.

To conclude this section, we briefly discuss the simulation results. Firstly, the selection favored only one matching in both cases, even though several strategies coexisted in many player populations at the stationary state. This is not due to the choice of the preference profiles. Assuming that three players are present on each side and all players are acceptable, there are 666^{6} possible preference profiles. We fixed the preference of m1m_{1} without loss of generality, and conducted the simulation of RD for all 656^{5} possible preference profiles in case of I=WI=W. Except the 18 cases (0.2%) where xx kept fluctuating and thus we could not determine the final states, only one matching was possible at the final state in all instances. These observations imply that it is natural to consider the asymptotic stability of a matching. Secondly, the simulation results were consistent with previous research on the incentives of players. In the first problem, where no woman has the incentive to misreport, the truthful reporting strategies of women survived. In the second problem, at least one woman has the incentive to falsify, and only the false reporting survived in the w2w_{2} population accordingly. Still, w2w_{2} truthfully reported the most preferable men, which is consistent with the result of Roth [2] that no woman has the incentive to falsify her most preferred man.

5 Discussion

Refer to caption
(a) The time evolution of xix^{i} with P1P_{1}. ulin=(15,10,5)u_{\text{lin}}=(15,10,5) was used as the utility function. The dynamics of xix^{i} look similar with figure 1, but the time scale was slower with ulinu_{\text{lin}} than with uconvu_{\text{conv}}.
Refer to caption
(b) The time evolution of xix^{i} with P2P_{2}. uconc=(53,52,5)u_{\text{conc}}=(5\sqrt{3},5\sqrt{2},5) was used as the utility function. Not only the transient dynamics but also the share of W1W1 in the w1w_{1} population at the stationary state differed from figure 1, where uconvu_{\text{conv}} was used.
Figure 2: RD of equation (1) were numerically solved from the initial condition x0i=(16)hSix^{i}_{0}=\quantity(\frac{1}{6})_{h\in S^{i}} for all iIi\in I. The player position ii and its true preference are shown on top of each plot. The lower right panel shows the shares of the resulting matchings at every time. The other three panels show the time evolutions of the strategy profile in each player population.

The simulation result of the second problem (M,W,P2)(M,W,P_{2}) in figure 1 suggests that the WW-optimal stable matching μ2W\mu^{W}_{2} was restored after small perturbations were given, even though μ2W\mu^{W}_{2} is not asymptotically stable. What equations (14) and (15) tell us about two non-included partial preimages of μ2W\mu^{W}_{2} are that H1H_{1} is not cuwbr because W5W5 of w2w_{2} is a weakly better reply to some xΘ(H1)x\in\Theta(H_{1}), and that H2H_{2} is not cuwbr because W2W2 of w1w_{1} is a weakly better reply to some xΘ(H2)x\in\Theta(H_{2}). Suppose that the current population state is xΘ(H1)x\in\Theta(H_{1}), and some replicators in w2w_{2} population start to use W5W5. This would move the population state to xΘ(H)x^{\prime}\in\Theta(H^{\prime}), where

H:={W1,W2}×{W5,W6}×{W1,,W6}.H^{\prime}:=\{W1,W2\}\times\{W5,W6\}\times\{W1,\dots,W6\}. (16)

If we start from xΘ(H2)x\in\Theta(H_{2}) and some replicators in w1w_{1} population come to use W2W2, the population state would also get xΘ(H)x^{\prime}\in\Theta(H^{\prime}). In addition, one can show that xΘ(H)x^{\prime}\in\Theta(H^{\prime}) evolves into another state x′′Θ(H1H2)x^{\prime\prime}\in\Theta(H_{1}\cup H_{2}), where only μ2W\mu^{W}_{2} is obtained, as long as selection dynamics are payoff-positive999Details are in C. . Therefore μ2W\mu^{W}_{2} will in fact be restored after small perturbations are given.

In the second problem with P2P_{2}, μ2W\mu^{W}_{2} is not asymptotically stable, even though it will be restored after small perturbations. The essentials behind this confusing situation are two non-included partial preimages of μ2W\mu^{W}_{2}, one of which contains a weakly better reply to the other and vice versa. All partial preimages are not cuwbr and thus μ2W\mu^{W}_{2} is not asymptotically stable by our definition, but still, a mixed strategy profile xx moves only within partial preimages of the same matching. In order to characterize the robustness of μ2W\mu^{W}_{2}, we propose a weaker property of a matching, quasi-asymptotic stability:

Definition 3.

A matching μ\mu is quasi-asymptotically stable if it has a set of partial preimages

{H1(μ),,Hn(μ)} such that αi(Hm(μ))k=1nHki(μ)m{1,,n},iI.\quantity{H_{1}(\mu),\dots,H_{n}(\mu)}\mbox{\quad such that\quad}\alpha^{i}(H_{m}(\mu))\subset\bigcup_{k=1}^{n}H^{i}_{k}(\mu)\quad\forall\ m\in\{1,\dots,n\},\ i\in I. (17)

When n=1n=1, it is equivalent to the asymptotic stability of Definition 2. μ2W\mu^{W}_{2} is quasi-asymptotically stable with {H1,H2}\quantity{H_{1},H_{2}}. We presume the quasi-asymptotic stability portrays some kind of dynamical stability of a matching similar to the asymptotic stability, but we have not yet been able to neither prove it nor find a counterexample.

In the current paper, preference relations are described by numerical values. Obviously, the payoff values must satisfy u1i>>uniu^{i}_{1}>\dots>u^{i}_{n}, but still there are countless candidates for the utility function. To examine whether the choice of the utility function affects the dynamics, we conducted simulations of RD in the two marriage problems with two other utility functions, ulin=(15,10,5)u_{\text{lin}}=(15,10,5) and uconc=(53,52,5)u_{\text{conc}}=(5\sqrt{3},5\sqrt{2},5). The utility function used in the preceding section was uconv=(25,10,1)u_{\text{conv}}=(25,10,1). uconvu_{\text{conv}}, ulinu_{\text{lin}} and uconcu_{\text{conc}} are convex, linear and concave, respectively. In the first problem with P1P_{1}, the dynamics of xix^{i} did not seem to be affected by the choice of the utility function, but their time scales differed. The dynamics with the linear utility function is shown in figure 2. In the second problem with P2P_{2}, transient dynamics slightly varied and the share of W1W1 in the w1w_{1} population at the last state was also affected by the choice of the utility function. Figure 2 shows the dynamics with the concave utility function. Nevertheless, strategies that survived remained the same regardless of the utility function. Our analysis have mainly focused on the last states of dynamics and the matchings which were obtained there. Thus, in view of the observations above, we expect our simulation results to be independent on the choice of the utility function.

6 Conclusion

Although the literature on centralized matching markets often assumes that a true preference of each player is known to herself and fixed throughout the matching process, several empirical results [15, 16, 17] cast doubt on the assumption. To circumvent the problem, evolutionary dynamics of preference revelation games are considered. We formulated the asymptotic stability of a matching, which indicates the dynamical robustness of the matching against sufficiently small changes in players’ reporting strategies. We showed that the asymptotic stability of a matching implies its stability, thereby contributing a practical suggestion on how to obtain stable matchings in centralized markets: by having a learning phase during which players find reporting strategies that suit their true preferences through trial and error, an asymptotically stable and hence stable matching would be obtained. Note that our insight does not assume players’ initial awareness of their true preferences, unlike much of the literature.

We believe the current paper lays a foundation for dynamical approach to centralized matching markets with evolutionary dynamics of preference revelation games, and there is plenty of room for future research. One issue that should be tackled is the difficulty in finding asymptotically stable matchings. We checked the asymptotic stability according to its definition, looking at payoff matrices, but this procedure quickly becomes unfeasible as the number of players increase. Our approach with continuous-time deterministic selection dynamics is applicable to wider range of problems, provided the payoff function is deterministic and thus payoffs are never determined randomly. We assumed preferences were strict and MM-optimal stable algorithms were used, but players’ preferences need not be strict. When preferences are not strict, deterministic payoff functions can be constructed by employing matching algorithms that have deterministic tie-breaking rules. Our approach can also be adopted to many-to-one or many-to-many matching problems. In these cases, payoff functions are likely to be much complicated and straightforward analysis may get cumbersome. Directions for future research include analyses of other types of game dynamics, such as ones with mutations or on graphs, and search for connections between the asymptotic stability of a matching and stochastic stability analyzed in research on decentralized markets [12, 13, 14]. Another interesting topic would be a partial preimage of a matching. We introduced a partial preimage to formulate the asymptotic stability of a matching based on the concept, but a partial preimage itself may hold information that characterizes the matching. For instance, the cardinality of a non-included partial preimage is likely to reflect the likelihood that a matching is realized when all players randomly submit their reports.

References

  • [1] D. Gale, L. S. Shapley, College Admissions and the Stability of Marriage, The American Mathematical Monthly 69 (1) (1962) 9–15. doi:10.2307/2312726.
  • [2] A. E. Roth, The Economics of Matching: Stability and Incentives, Mathematics of Operations Research 7 (4) (1982) 617–628. doi:10.1287/moor.7.4.617.
  • [3] L. E. Dubins, D. A. Freedman, Machiavelli and the Gale-Shapley Algorithm, The American Mathematical Monthly 88 (7) (1981) 485–494. doi:10.2307/2321753.
  • [4] D. Gale, M. Sotomayor, Ms. Machiavelli and the Stable Matching Problem, The American Mathematical Monthly 92 (4) (1985) 261–268. doi:10.2307/2323645.
  • [5] N. Immorlica, M. Mahdian, Marriage, honesty, and stability, in: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’05, Society for Industrial and Applied Mathematics, USA, 2005, pp. 53–62.
  • [6] F. Kojima, P. A. Pathak, Incentives and Stability in Large Two-Sided Matching Markets, American Economic Review 99 (3) (2009) 608–627. doi:10.1257/aer.99.3.608.
  • [7] A. E. Roth, Misrepresentation and stability in the marriage problem, Journal of Economic Theory 34 (2) (1984) 383–387. doi:10.1016/0022-0531(84)90152-2.
  • [8] J. Ma, Stable Matchings and Rematching-Proof Equilibria in a Two-Sided Matching Market, Journal of Economic Theory 66 (2) (1995) 352–369. doi:10.1006/jeth.1995.1045.
  • [9] J. Alcalde, Implementation of Stable Solutions to Marriage Problems, Journal of Economic Theory 69 (1) (1996) 240–254. doi:10.1006/jeth.1996.0050.
  • [10] T. Sönmez, Games of Manipulation in Marriage Problems, Games and Economic Behavior 20 (2) (1997) 169–176. doi:10.1006/game.1997.0559.
  • [11] A. E. Roth, J. H. V. Vate, Random Paths to Stability in Two-Sided Matching, Econometrica 58 (6) (1990) 1475. doi:10.2307/2938326.
  • [12] M. O. Jackson, A. Watts, The Evolution of Social and Economic Networks, Journal of Economic Theory 106 (2) (2002) 265–295. doi:10.1006/jeth.2001.2903.
  • [13] J. Newton, R. Sawa, A one-shot deviation principle for stability in matching problems, Journal of Economic Theory 157 (2015) 1–27. doi:10.1016/j.jet.2014.11.015.
  • [14] E. Bilancini, L. Boncinelli, J. Newton, Evolution and Rawlsian social choice in matching, Games and Economic Behavior 123 (2020) 68–80. doi:10.1016/j.geb.2020.06.004.
  • [15] N. Dwenger, D. Kübler, G. Weizsäcker, Flipping a coin: Evidence from university applications, Journal of Public Economics 167 (2018) 240–250. doi:10.1016/j.jpubeco.2018.09.014.
  • [16] Y. Narita, Match or Mismatch? Learning and Inertia in School Choice, SSRN Scholarly Paper 3198417, Social Science Research Network, Rochester, NY (Jun. 2018). doi:10.2139/ssrn.3198417.
  • [17] J. Grenet, Y. He, D. Kübler, Decentralizing Centralized Matching Markets: Implications from Early Offers in University Admissions (Jul. 2021). arXiv:2107.01532, doi:10.48550/arXiv.2107.01532.
  • [18] J. W. Weibull, Evolutionary Game Theory, MIT Press, 1997.
  • [19] J. Newton, Evolutionary Game Theory: A Renaissance, Games 9 (2) (2018) 31. doi:10.3390/g9020031.
  • [20] S. Strogatz, Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering, 2nd Edition, Westview Press, Boulder, Colo., 2015.
  • [21] P. D. Taylor, L. B. Jonker, Evolutionary stable strategies and game dynamics, Mathematical Biosciences 40 (1) (1978) 145–156. doi:10.1016/0025-5564(78)90077-9.
  • [22] P. Schuster, K. Sigmund, Replicator dynamics, Journal of Theoretical Biology 100 (3) (1983) 533–538. doi:10.1016/0022-5193(83)90445-9.
  • [23] R. Cressman, Y. Tao, The replicator equation and other game dynamics, Proceedings of the National Academy of Sciences 111 (Supplement_3) (2014) 10810–10817. doi:10.1073/pnas.1400823111.

Appendix A Payoff matrices

Table 2: The payoff matrices when the preference profile is P1P_{1}, I=WI=W, and the utility function is 𝒖conv=(25,5,1)\bm{u}_{conv}=(25,5,1). Each subtable shows the payoff matrix when the strategy of w3w_{3} is fixed. The row and column labels indicate the strategy of w1w_{1} and w2w_{2}, respectively. Each entry denotes the payoffs for w1w_{1}, w2w_{2}, and w3w_{3} from the top.
(a) The payoffs when w3w_{3} uses W1W1.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
(b) The payoffs when w3w_{3} uses W2W2.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
(c) The payoffs when w3w_{3} uses W3W3.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
(d) The payoffs when w3w_{3} uses W4W4.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
(e) The payoffs when w3w_{3} uses W5W5.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
(f) The payoffs when w3w_{3} uses W6W6.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W2W2 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix}
W3W3 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W4W4 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix} 5251\begin{matrix}5\\ 25\\ 1\end{matrix}
W5W5 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
W6W6 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix} 1255\begin{matrix}1\\ 25\\ 5\end{matrix} 1125\begin{matrix}1\\ 1\\ 25\end{matrix}
Table 3: The payoff matrices when the preference profile is P2P_{2}, I=WI=W, and the utility function is 𝒖conv=(25,5,1)\bm{u}_{conv}=(25,5,1). Each subtable shows the payoff matrix when the strategy of w3w_{3} is fixed. The row and column labels indicate the strategy of w1w_{1} and w2w_{2}, respectively. Each entry denotes the payoffs for w1w_{1}, w2w_{2}, and w3w_{3} from the top.
(a) The payoffs when w3w_{3} uses W1W1.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
(b) The payoffs when w3w_{3} uses W2W2.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
(c) The payoffs when w3w_{3} uses W3W3.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
(d) The payoffs when w3w_{3} uses W4W4.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
(e) The payoffs when w3w_{3} uses W5W5.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
(f) The payoffs when w3w_{3} uses W6W6.
w2w_{2}
w1w_{1} W1W1 W2W2 W3W3 W4W4 W5W5 W6W6
W1W1 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W2W2 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 2511\begin{matrix}25\\ 1\\ 1\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 25255\begin{matrix}25\\ 25\\ 5\end{matrix}
W3W3 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W4W4 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 151\begin{matrix}1\\ 5\\ 1\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix} 12525\begin{matrix}1\\ 25\\ 25\end{matrix}
W5W5 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}
W6W6 555\begin{matrix}5\\ 5\\ 5\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix} 555\begin{matrix}5\\ 5\\ 5\end{matrix} 5125\begin{matrix}5\\ 1\\ 25\end{matrix}

The payoff matrices of the preference revelation games analyzed in section 4 are presented in tables 2 and 3. The utility function is set to 𝒖conv=(25,10,1)\bm{u}_{\text{conv}}=(25,10,1). We assume that men always report truthfully: i.e. I=WI=W.

Appendix B Proofs for section 4

B.1 Closure under weakly better replies of H(μ1M)H(\mu^{M}_{1})

We show that H(μ1M)H(\mu^{M}_{1}) of equation (11) is cuwbr.

Proof.

First, recall that H=iIHiH=\prod_{i\in I}H^{i} is cuwbr if αi(H)Hi\alpha^{i}(H)\subset H^{i} for all iIi\in I, where

αi(H)={hSixΘ(H)s.t.ui(h,xi)ui(x)}.\alpha^{i}(H)=\{h\in S^{i}\mid\exists\,x\in\Theta(H)\ \text{s.t.}\ u^{i}(h,x^{-i})\geq u^{i}(x)\}. (18)

We consider the following sets:

αini(H)\displaystyle\alpha^{i}_{\text{in}}(H) ={hHixΘ(H)s.t.ui(h,xi)ui(x)}\displaystyle=\{h\in H^{i}\mid\exists\,x\in\Theta(H)\ \text{s.t.}\ u^{i}(h,x^{-i})\geq u^{i}(x)\} (19)
αouti(H)\displaystyle\alpha^{i}_{\text{out}}(H) ={hSiHixΘ(H)s.t.ui(h,xi)ui(x)}.\displaystyle=\{h\in S^{i}\setminus H^{i}\mid\exists\,x\in\Theta(H)\ \text{s.t.}\ u^{i}(h,x^{-i})\geq u^{i}(x)\}. (20)

One can see that αi(H)=αini(H)αouti(H)\alpha^{i}(H)=\alpha^{i}_{\text{in}}(H)\cup\alpha^{i}_{\text{out}}(H), αini(H)Hi\alpha^{i}_{\text{in}}(H)\subset H^{i}, and αouti(H)Hi\alpha^{i}_{\text{out}}(H)\not\subset H^{i}, which indicate

αi(H)Hiαouti(H)=.\alpha^{i}(H)\subset H^{i}\iff\alpha^{i}_{\text{out}}(H)=\emptyset. (21)

Therefore it suffices to examine if ui(h,xi)ui(x)u^{i}(h,x^{-i})\geq u^{i}(x) holds for hSiHih\in S^{i}\setminus H^{i}.

Table 2 tells us that the reports of w2w_{2} and w3w_{3} do not change the outcome when w1w_{1} reports W1W1 or W2W2. We can therefore assume that w2w_{2} and w3w_{3} report W1W1 without loss of generality, and what we need to show is that H={W1,W2}×{W1}×{W1}H=\{W1,W2\}\times\{W1\}\times\{W1\} is cuwbr.

Let xΘ(H)x\in\Theta(H) be x=((p1,1p1),(1),(1))x=\quantity((p_{1},1-p_{1}),(1),(1)). Each element in xx denotes the probability distribution describing the mixed strategy of each player, and p1p_{1} is the probability that w1w_{1} reports W1W1. When all players use xx, payoffs are uw1=25u^{w_{1}}=25 and uw2=uw3=1u^{w_{2}}=u^{w_{3}}=1. From table 2(a), following inequalities hold:

uw1(3,xw1)=uw1(4,xw1)=5<uw1(x),uw1(5,xw1)=uw1(6,xw1)=1<uw1(x).u^{w_{1}}(3,x^{-w_{1}})=u^{w_{1}}(4,x^{-w_{1}})=5<u^{w_{1}}(x),\quad u^{w_{1}}(5,x^{-w_{1}})=u^{w_{1}}(6,x^{-w_{1}})=1<u^{w_{1}}(x). (22)

Thus αw1(H)Hw1\alpha^{w_{1}}(H)\subset H^{w_{1}} holds, completing the proof. ∎

B.2 Nonclosure under weakly better replies of H1(μ2W)H_{1}(\mu^{W}_{2}) and H2(μ2W)H_{2}(\mu^{W}_{2})

First, we show that H1(μ2W)H_{1}(\mu^{W}_{2}) of equation (12) is not cuwbr.

Proof.

As in the preceding subsections, it suffices to examine if ui(h,xi)ui(x)u^{i}(h,x^{-i})\geq u^{i}(x) holds for hSiHih\in S^{i}\setminus H^{i}. Table 3 tells us that the report of w3w_{3} does not affect the outcome. We therefore assume that w3w_{3} submits W1W1 without loss of generality, and what we need to show is that H={W1,W2}×{W6}×{W1}H=\{W1,W2\}\times\{W6\}\times\{W1\} is not cuwbr.

Let xΘ(H)x\in\Theta(H) be x=((p1,1p1),(1),(1))x=\quantity((p_{1},1-p_{1}),(1),(1)). Each element in xx denotes the probability distribution describing the mixed strategy of each player, and p1p_{1} is the probability that w1w_{1} reports W1W1. When all players use xx, payoffs are uw1=uw2=25u^{w_{1}}=u^{w_{2}}=25, uw3=5u^{w_{3}}=5. From table 3(a), following expressions hold:

uw1(2,xw1)=\displaystyle u^{w_{1}}(2,x^{-w_{1}})= uw1(3,xw1)\displaystyle\ u^{w_{1}}(3,x^{-w_{1}}) =1\displaystyle=1 <uw1(x),\displaystyle<u^{w_{1}}(x), uw1(4,xw1)=\displaystyle\quad u^{w_{1}}(4,x^{-w_{1}})= uw1(5,xw1)\displaystyle\ u^{w_{1}}(5,x^{-w_{1}}) =5\displaystyle=5 <uw1(x)\displaystyle<u^{w_{1}}(x) (23)
uw2(0,xw2)=\displaystyle u^{w_{2}}(0,x^{-w_{2}})= uw2(1,xw2)\displaystyle\ u^{w_{2}}(1,x^{-w_{2}}) =5\displaystyle=5 <uw2(x),\displaystyle<u^{w_{2}}(x), uw2(2,xw2)=\displaystyle u^{w_{2}}(2,x^{-w_{2}})= 1+4p1\displaystyle\ 1+4p_{1} 5\displaystyle\leq 5 <uw2(x)\displaystyle<u^{w_{2}}(x)
uw2(3,xw2)\displaystyle\ u^{w_{2}}(3,x^{-w_{2}}) =1\displaystyle=1 <uw2(x),\displaystyle<u^{w_{2}}(x), uw2(4,xw2)=\displaystyle u^{w_{2}}(4,x^{-w_{2}})= 5+20p1\displaystyle\ 5+20p_{1} 25\displaystyle\leq 25 =uw2(x).\displaystyle=u^{w_{2}}(x).

Therefore

αw1(H)\displaystyle\alpha^{w_{1}}(H) Hw1\displaystyle\subset H^{w_{1}} (14)
αw2(H)\displaystyle\alpha^{w_{2}}(H) Hw2{W5}Hw2,\displaystyle\subset H^{w_{2}}\cup\{W5\}\not\subset H^{w_{2}},

and HH is not cuwbr. ∎

Next, we show that H2(μ2W)H_{2}(\mu^{W}_{2}) of equation (13) is not cuwbr either.

Proof.

In the same way as above, we examine if ui(h,xi)ui(x)u^{i}(h,x^{-i})\geq u^{i}(x) holds for hSiHih\in S^{i}\setminus H^{i}. Table 3 tells us that the report of w3w_{3} does not affect the outcome. We therefore assume that w3w_{3} submits W1W1 without loss of generality, and what we need to show is that H={W1}×{W5,W6}×{W1}H=\{W1\}\times\{W5,W6\}\times\{W1\} is not cuwbr.

Let xΘ(H)x\in\Theta(H) be x=((1),(q5,1q5),(1))x=\quantity((1),(q_{5},1-q_{5}),(1)). Each element in xx denotes the probability distribution describing the mixed strategy of each player, and q5q_{5} is the probability that w2w_{2} reports W5W5. When all players use xx, payoffs are uw1=uw2=25u^{w_{1}}=u^{w_{2}}=25, uw3=5u^{w_{3}}=5. From table 3, following expressions hold:

uw1(1,xw1)\displaystyle u^{w_{1}}(1,x^{-w_{1}}) =2520q5\displaystyle=25-20q_{5} 25\displaystyle\leq 25 =uw1(x)\displaystyle=u^{w_{1}}(x) (24)
uw1(2,xw1)\displaystyle u^{w_{1}}(2,x^{-w_{1}}) =uw1(3,xw1)\displaystyle=u^{w_{1}}(3,x^{-w_{1}}) =1\displaystyle=1 <uw1(x)\displaystyle<u^{w_{1}}(x)
uw1(4,xw1)\displaystyle u^{w_{1}}(4,x^{-w_{1}}) =uw1(5,xw1)\displaystyle=u^{w_{1}}(5,x^{-w_{1}}) =5\displaystyle=5 <uw1(x)\displaystyle<u^{w_{1}}(x)
uw2(0,xw2)\displaystyle u^{w_{2}}(0,x^{-w_{2}}) =uw2(1,xw2)\displaystyle=u^{w_{2}}(1,x^{-w_{2}}) =uw2(2,xw2)\displaystyle=u^{w_{2}}(2,x^{-w_{2}}) =5\displaystyle=5 <uw2(x)\displaystyle<u^{w_{2}}(x)
uw2(3,xw2)\displaystyle u^{w_{2}}(3,x^{-w_{2}}) =1\displaystyle=1 <uw2(x)\displaystyle<u^{w_{2}}(x)

Therefore

αw1(H)\displaystyle\alpha^{w_{1}}(H) Hw1{W2}Hw1\displaystyle\subset H^{w_{1}}\cup\{W2\}\not\subset H^{w_{1}} (15)
αw2(H)\displaystyle\alpha^{w_{2}}(H) Hw2,\displaystyle\subset H^{w_{2}},

and HH is not cuwbr. ∎

B.3 Nonexistence of a partial preimage of μ2W\mu^{W}_{2} closed under weakly better replies

We have already shown that H1(μ2W)H_{1}(\mu^{W}_{2}) and H2(μ2W)H_{2}(\mu^{W}_{2}) are not cuwbr. We prove that its other partial preimages are not cuwbr either to show that there is no partial preimage of μ2W\mu^{W}_{2} that is cuwbr.

Proof.

In the 666^{6} possible report profiles for women, eighteen result in μ2W\mu^{W}_{2}, all of which are in H1(μ2W)H2(μ2W)H_{1}(\mu^{W}_{2})\cup H_{2}(\mu^{W}_{2}). Thus their subsets are the only candidates for a partial preimage that is cuwbr. Let us consider the partial preimage H3(μ2W)={W1}×{W6}×{W1,,W6}H_{3}(\mu^{W}_{2})=\{W1\}\times\{W6\}\times\{W1,\dots,W6\}. Since the report of w3w_{3} does not change the outcome, we may assume that w3w_{3} reports W1W1 without loss of generality. Then the partial preimage to examine is H={W1}×{W6}×{W1}H=\{W1\}\times\{W6\}\times\{W1\}, which is a pure strategy profile. Since the cuwbr of HH is equivalent to that HH is a strict Nash equilibrium, and there is no strategy profile that is a strict Nash equilibrium in the current setting as we mentioned in section 4, HH is not cuwbr. The same argument holds for all other partial preimages of μ2W\mu^{W}_{2}, and thus there is no partial preimage of μ2W\mu^{W}_{2} that is cuwbr. ∎

Appendix C Proof for section 5

We show that a trajectory starting from xΘ(H)x^{\prime}\in\Theta(H^{\prime}) ends up at some x′′Θ(H1H2)x^{\prime\prime}\in\Theta(H_{1}\cup H_{2}) under payoff-positive selection dynamics.

Proof.

First, observe that HH^{\prime} is not a partial preimage of μ2W\mu^{W}_{2}, since its subset

H3:={W2}×{W5}×{W1,,W6}H_{3}:=\{W2\}\times\{W5\}\times\{W1,\dots,W6\} (25)

is a partial preimage of μ2M\mu^{M}_{2}. Because H(H1H2)=H3H^{\prime}\setminus\quantity(H_{1}\cup H_{2})=H_{3}, trajectories starting in Θ(H)\Theta(H^{\prime}) go into either Θ(H1H2)\Theta(H_{1}\cup H_{2}) or Θ(H3)\Theta(H_{3}). Now, we look at dynamics. From the payoff matrices in Table 3, one finds that the report of w3w_{3} does not change the outcome. Therefore we can assume w3w_{3} always reports W1W1 without loss of generality. When the state xx^{\prime} is in Θ(H)\Theta(H^{\prime}), xhw1=0x^{w_{1}}_{h}=0 for h{W3,W4,W5,W6}h\in\quantity{W3,W4,W5,W6} and xhw2=0x^{w_{2}}_{h}=0 for h{W1,W2,W3,W4}h\in\quantity{W1,W2,W3,W4}. Using xW1w1+xW2w1=xW5w2+xW6w2=1x^{w_{1}}_{W1}+x^{w_{1}}_{W2}=x^{w_{2}}_{W5}+x^{w_{2}}_{W6}=1, dynamics of xx^{\prime} become two-dimensional dynamical systems:

{x˙W1w1=gW1w1(x)xW1w1x˙W6w2=gW6w2(x)xW6w2.\begin{cases}\dot{x}^{w_{1}}_{W1}=g^{w_{1}}_{W1}(x)\,x^{w_{1}}_{W1}\\ \dot{x}^{w_{2}}_{W6}=g^{w_{2}}_{W6}(x)\,x^{w_{2}}_{W6}.\end{cases} (26)

Recalling the definition of the payoff-positivity and looking at the payoff matrix in Table 3(a), we find

gW1w1(x)0\displaystyle g^{w_{1}}_{W1}(x)\lessgtr 0 uw1(W1,xw1)uw1(x)020(1xW1w1)(1xW6w2)0\displaystyle\iff u^{w_{1}}(W1,x^{-w_{1}})-u^{w_{1}}(x)\lessgtr 0\iff 20\quantity(1-x^{w_{1}}_{W1})\quantity(1-x^{w_{2}}_{W6})\lessgtr 0 (27)
gW6w2(x)0\displaystyle g^{w_{2}}_{W6}(x)\lessgtr 0 uw2(W6,xw1)uw2(x)020(1xW1w1)(1xW6w2)0.\displaystyle\iff u^{w_{2}}(W6,x^{-w_{1}})-u^{w_{2}}(x)\lessgtr 0\iff 20\quantity(1-x^{w_{1}}_{W1})\quantity(1-x^{w_{2}}_{W6})\lessgtr 0. (28)

Hence, x˙W1w1>0\dot{x}^{w_{1}}_{W1}>0 and x˙W6w2>0\dot{x}^{w_{2}}_{W6}>0 until either xW1w1x^{w_{1}}_{W1} or xW6w2x^{w_{2}}_{W6} gets to be one. As xΘ(H1)x\in\Theta(H_{1}) when xW6w2=1x^{w_{2}}_{W6}=1, and xΘ(H2)x\in\Theta(H_{2}) when xW1w1=1x^{w_{1}}_{W1}=1, we have established that trajectories starting in Θ(H)\Theta(H^{\prime}) go into either Θ(H1)\Theta(H_{1}) or Θ(H2)\Theta(H_{2}) under payoff-positive selection dynamics. ∎