Showing 1 - 10 of 31
This chapter surveys recent models of coalition and network formation in a unified framework. Comparisons are drawn among various procedures of network and coalition formation, involving simultaneous and sequential moves. The survey also covers models of group and network formation by farsighted...
Persistent link: https://www.econbiz.de/10014025687
maximum matching can avoid this risk and enjoy higher payoffs than inessential players. Although the search for partners is …
Persistent link: https://www.econbiz.de/10012104571
Using network control structures this paper introduces network communication games as a generalization of vertex games and edge games corresponding to communication situations and studies their decomposition into unanimity games. We obtain a relation between the dividends of the network...
Persistent link: https://www.econbiz.de/10013010479
Covert organizations are constantly faced with a tradeoff between secrecy and operational effciency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to determine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this...
Persistent link: https://www.econbiz.de/10014218001
Persistent link: https://www.econbiz.de/10001869674
A symmetric network consists of a set of positions and a set of bilateral links between these positions. Examples of such networks are exchange networks, communication networks, disease transmission networks, control networks etc. For every symmetric network we define a cooperative transferable...
Persistent link: https://www.econbiz.de/10011343952
This paper introduces a framework for joint hub network development. Building a joint physical hub for transhipment of goods is expensive and therefore involves considerable risks for the cooperating companies. In a practical setting, it is unlikely that an entire network will be built at once....
Persistent link: https://www.econbiz.de/10014223600
All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals....
Persistent link: https://www.econbiz.de/10014146450
Decision makers in the field of national security, counterterrorism and counterinsurgency are faced with an uncertain, adaptive and asymmetrical threat. It should come as no surprise that a great need exists to understand covert organizations, the structure of which becomes known partially only...
Persistent link: https://www.econbiz.de/10013143055
Persistent link: https://www.econbiz.de/10011404435