Showing 11 - 20 of 8,546
We introduce ideas and methods from distribution theory into value theory. This new approach enables us to construct new diagonal formulas for the Mertens value (Int J Game Theory 17:1–65, <CitationRef CitationID="CR5">1988</CitationRef>) and the Neyman value (Isr J Math 124:1–27, <CitationRef CitationID="CR6">2001</CitationRef>) on a large space of non-differentiable games....</citationref></citationref>
Persistent link: https://www.econbiz.de/10010993409
We show that a mixed equilibrium of a semi-anonymous nonatomic game can be used to generate pure-strategy profiles for finite games randomly generated from the type distribution of the nonatomic game. As the numbers of players involved in the finite games increase, the generated profiles will be...
Persistent link: https://www.econbiz.de/10010875255
We consider a game, called newsvendor game, where several retailers, who face a random demand, can pool their resources and build a centralized inventory that stocks a single item on their behalf. Profits have to be allocated in a way that is advantageous to all the retailers. A game in...
Persistent link: https://www.econbiz.de/10005094075
We discuss linear production games or market games with a continuum of players which are represented as minima of finitely many nonatomic measures.<p>Within this context we consider vNM-Stable Sets according to von Neumann and Morgenstern. We classify or characterize all solutions of this type...</p>
Persistent link: https://www.econbiz.de/10005598491
We consider congestion games on networks with nonatomic users and user-specific costs. We are interested in the uniqueness property defined by Milchtaich (2005) as the uniqueness of equilibrium flows for all assignments of strictly increasing cost functions. He settled the case with two-terminal...
Persistent link: https://www.econbiz.de/10011097670
Many economic environments exhibit payoff discontinuity and indeterminacy, particularly those involving factors that are not under the deliberate control of players, such as prejudicial bias and trust. Simon and Zame (1990) introduce the concept of sharing rules as a means for endogenously...
Persistent link: https://www.econbiz.de/10010785389
Location Based Services (LBS) expose user data to malicious attacks. Approaches, evolved, so far, for preserving privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved. In particular, accuracy of results vs. privacy degree,...
Persistent link: https://www.econbiz.de/10012042666
. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs … system focused on: (i) anonymity and resilience to censorship; (ii) authenticatable content; (iii) semantic interoperability …
Persistent link: https://www.econbiz.de/10012044163
fall under a watchful eye on their Internet activities then maintaining anonymity it not only essential for getting out …
Persistent link: https://www.econbiz.de/10012045239
Social networks like Facebook, Twitter, Pinterest etc. provide data of its users to the demanding organizations to better comprehend the quality of their potential clients. Publishing confidential data of social network users in its raw form raises several privacy and security concerns....
Persistent link: https://www.econbiz.de/10012045678