Bargaining towards collusion

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bargaining and collusion in a regulatory relationship

We investigate regulation as the outcome of a bargaining process between a regulator and a regulated firm. The regulator is required to monitor the firm’s costs and reveal its information to a political principal (Congress). In this setting, we explore the scope for collusion between the regulator and the firm, which results in the manipulation of the regulator’s report on the firm’s costs to C...

متن کامل

Collusion, Exclusion, and Inclusion in Random-Order Bargaining

This paper examines the profitability of three types of integration in a cooperative game solved by a random-order value (e.g. the Shapley value). Collusion between players i and j is a contract merging their resources in the hands of one of them, say i . This contract can be represented as a combination of exclusion, which lets i exclude j’s resource but not use it himself, and inclusion, whic...

متن کامل

Towards Swift and Accurate Collusion Detection

Collusion is covert co-operation between participants of a game. It poses serious technical, game design, and communal problems to multiplayer games that do not allow the players to share knowledge or resources with other players. In this paper, we review different types of collusion and introduce two measures for collusion detection. We also propose a model and a simple game, implemented in a ...

متن کامل

Towards Automated Android App Collusion Detection

Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.

متن کامل

Towards full collusion resistant ID-based establishment of pairwise keys

Usually a communication link is secured by means of a symmetric-key algorithm. For that, a method is required to securely establish a symmetric-key for that algorithm. This old problem is still relevant and of paramount importance both in existing computer networks and new large-scale ubiquitous systems comprising resource-constrained devices. Identity-based pairwise key agreement allows for th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Oxonomics

سال: 2008

ISSN: 1752-5195,1752-5209

DOI: 10.1111/j.1752-5209.2008.00020.x