نتایج جستجو برای: interdependent security
تعداد نتایج: 185170 فیلتر نتایج به سال:
Interdependent self-construal refers to a view of the self as embedded in relationships with others. Prior work suggests that this construal is linked to a strong value placed on social obligations and duties. Interdependent people are therefore cognitively attuned to others and various social events in their surroundings while down-regulating their personal goals. In the present work, we exami...
In interdependent networks, it is usually assumed, based on percolation theory, that nodes become nonfunctional if they lose connection to the network giant component. However, in reality, some nodes, equipped with alternative resources, together with their connected neighbors can still be functioning after disconnected from the giant component. Here, we propose and study a generalized percolat...
Designing optimal interdependent networks is important for the robustness and efficiency of national critical infrastructures. Here, we establish a two-person game-theoretic model in which two network designers choose to maximize the global connectivity independently. This framework enables decentralized network design by using iterative algorithms. After a finite number of steps, the algorithm...
A seller and a buyer bargain over the terms of trade for an object. The seller receives a perfect signal determining the value of the object to both players, while the buyer remains uninformed. We analyze the infinite horizon bargaining game in which the buyer makes all the offers. When the static incentive constraints permit first-best efficiency, then under some regularity conditions the outc...
392 ∗ Sobel: University of California, San Diego. I presented a version of this paper at the First World Congress of the Game Theory Society and to my colleagues at the Center for Advanced Study in the Behavioral Sciences. I thank Eli Berman, Antonio Cabrales, Miguel CostaGomes, Vincent Crawford, David M. Kreps, Herbert Gintis, Mark Machina, Efe Ok, Luís Pinto, Matthew Rabin, Paul Romer, Klaus ...
We propose and analyze a graph model to study the connectivity of interdependent networks. Two interdependent networks of arbitrary topologies are modeled as two graphs, where every node in one graph is supported by supply nodes in the other graph, and a node fails if all of its supply nodes fail. Such interdependence arises in cyber-physical systems and layered network architectures. We study ...
The purpose of this study is to critically evaluate three scholarly perspectives -balance of power, institutional, and security complex -to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empiri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید