Showing 1 - 10 of 15
We study fundamental properties of monotone network enterprises which contain public vertices and have positive and negative costs on edges and vertices. Among the properties studied are the nonemptiness of the core, characterization of nonredundant core constraints, ease of computation of the...
Persistent link: https://www.econbiz.de/10014206480
Persistent link: https://www.econbiz.de/10010395521
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10009308025
Persistent link: https://www.econbiz.de/10009759689
Persistent link: https://www.econbiz.de/10003907319
Persistent link: https://www.econbiz.de/10003987175
Persistent link: https://www.econbiz.de/10009562859
Persistent link: https://www.econbiz.de/10003736604
Persistent link: https://www.econbiz.de/10003752309
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10014177191