We use a large-scale internet experiment to explore how subjects learn to play against computers that are programmed to follow
one of a number of standard learning algorithms. The learning theories are (unbeknown to subjects) a best response process,
fictitious play, imitation, reinforcement learning, and a trial & error process. We explore how subjects’ performances depend
on their opponents’
... [Show full abstract] learning algorithm. Furthermore, we test whether subjects try to influence those algorithms to their advantage
in a forward-looking way (strategic teaching). We find that strategic teaching occurs frequently and that all learning algorithms
are subject to exploitation with the notable exception of imitation.
KeywordsLearning-Fictitious play-Imitation-Reinforcement-Trial & error-Strategic teaching-Cournot duopoly-Experiments-Internet
JEL ClassificationC72-C91-C92-D43-L13