Showing 1 - 10 of 13
In this paper we present an axiomatic analysis of several ranking methods for tournaments. We find that two of them exhibit a very good behaviour with respect to the set of properties under consideration. One of them is the maximum likelihood ranking, the most common method in statistics and...
Persistent link: https://www.econbiz.de/10011092766
Persistent link: https://www.econbiz.de/10001713833
Persistent link: https://www.econbiz.de/10001713856
Persistent link: https://www.econbiz.de/10001919416
Persistent link: https://www.econbiz.de/10011092664
In this paper we consider communication situations in which utility is nontransferable. We compare this model with the more familiar model of transferable utility communication situations and point out an odd feature of the latter. We mainly focus on the inheritance of properties of the...
Persistent link: https://www.econbiz.de/10011092686
organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph … theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the …
Persistent link: https://www.econbiz.de/10011092758
This paper introduces a new class of transferable-utility games, called multi-issue allocation games.These games arise from various allocation situations and are based on the concepts underlying the bankruptcy model, as introduced by O'Neill (1982).In this model, a perfectly divisible good...
Persistent link: https://www.econbiz.de/10011092903
For cooperative games with transferable utility, convexity has turned out to be an important and widely applicable concept.Convexity can be defined in a number of ways, each having its own specific attractions.Basically, these definitions fall into two categories, namely those based on a...
Persistent link: https://www.econbiz.de/10011090592
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert...
Persistent link: https://www.econbiz.de/10011091475