Showing 1 - 10 of 37
mobile phone service. It also includes a quantitative experiment with 517 participants to examine, under close to real …
Persistent link: https://www.econbiz.de/10009483985
behavioral experiment (N=117) comparing three communication media (face-to-face, email, and Internet reverse auctions) and two …
Persistent link: https://www.econbiz.de/10009431843
Funding Material, Control and Accountability (MC&A) system upgrades has been identified as a partial solution for mitigating the diversion threat of weapons-grade nuclear material. Effective MC&A system upgrades are dependent on appropriate decisions based on based on funding, implementation,...
Persistent link: https://www.econbiz.de/10009435804
This paper presents a comprehensive analysis of the impact of solid waste technical options on values and objectives that are important to the public. It is written in support of the Solid Waste and Materials Systems Alternatives Study (WHC, 1995). Described are the values that were identified,...
Persistent link: https://www.econbiz.de/10009436048
Prosperity Games TM are an outgrowth and adaptation move/countermove and seminar War Games. Prosperity Games TM are simulations that explore complex issues in a variety of areas including economics, politics, sociology, environment, education, and research. These issues can be examined from a...
Persistent link: https://www.econbiz.de/10009436398
A simple model is used to analyze the performance of a system for verifying compliance with an arms control treaty. Blue and Red are partners in to a treaty. Blue prefers to comply, but is uncertain whether Red similarly prefers compliance (in the absence of threatened violation detection)....
Persistent link: https://www.econbiz.de/10009436809
In this paper we study an experiment with human agents strategically interacting in a game characterized by continuous … learning models. The Cox Walker experiment differs from our settings because it is in discrete time and is an evolutionary …
Persistent link: https://www.econbiz.de/10009436918
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also...
Persistent link: https://www.econbiz.de/10009437335
We consider a network in which several service providers offer wireless access service to their respective subscribed customers through potentially multi-hop routes. If providers cooperate, i.e., pool their resources, such as spectrum and base stations, and agree to serve each others' customers,...
Persistent link: https://www.econbiz.de/10009438862
tests and an EBO experiment is then run for each case. We conclude by arguing that substantial effort on game realism, best …
Persistent link: https://www.econbiz.de/10009438897