Showing 1 - 10 of 11
Persistent link: https://www.econbiz.de/10001713833
Persistent link: https://www.econbiz.de/10001713856
Persistent link: https://www.econbiz.de/10001919416
We consider the allocation of a finite number of indivisible objects to the same number of agents according to an exogenously given queue.We assume that the agents collaborate in order to achieve an efficient outcome for society.We allow for side-payments and provide a method for obtaining...
Persistent link: https://www.econbiz.de/10011092641
organizations when considering the tradeoff between secrecy and operational efficiency. We use elements from game theory and graph … theory to determine the `optimal' communication structure a covert network should adopt. Every covert organization faces the …
Persistent link: https://www.econbiz.de/10011092758
This study considers a supply chain that consists of n retailers, each of them facing a newsvendor problem, m warehouses and a supplier.The retailers are supplied with a single product via some warehouses.In these warehouses, the ordered amounts of goods of these retailers become available after...
Persistent link: https://www.econbiz.de/10011092851
This study considers a simple newsvendor situation that consists of n retailers, all selling the same item with common purchasing costs and common selling prices.Groups of retailers might increase their expected joint profit by inventory centralization, which means that they make a joint order...
Persistent link: https://www.econbiz.de/10011090367
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert...
Persistent link: https://www.econbiz.de/10011091475
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper...
Persistent link: https://www.econbiz.de/10011091539
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10011091910