Showing 1 - 10 of 74,641
In this paper, we present agent-based simulations that model the interactions between software buyers and vendors in a software market that offers Software-as-a-Service (SaaS) and perpetual software (PS) licensing under different pricing schemes. In particular, scenarios are simulated, in which...
Persistent link: https://www.econbiz.de/10008500564
a dynamic one. Existence of Nash equilibrium in the class of mixed strategies is proved for non …A dynamic normal formulation for differential games is introduced and the "pedestrian principle" is discussed as a … means of dynamically implementing the equilibrium strategy in a single game. Our formulation emphasizes the distinction …
Persistent link: https://www.econbiz.de/10005050946
The application of Nash bargaining solution to profit division in negotiation between opencast lignite mine and power plant has been discussed. Different proposals of status quo point usage and ways of its determination for profit sharing both in strategic and tactical/operational negotiation...
Persistent link: https://www.econbiz.de/10005260247
One of the important characteristics of Web2.0 is the collaboration between Web2.0 service providers. They allow users (i.e., providers, developers, consumers) to combine their services. The prerequisite for this collaboration is openness of the Web2.0 service system. Although the Web2.0...
Persistent link: https://www.econbiz.de/10008671534
Cloud computing markets face challenges, such as a large variety of different resource types in the market. A large variety of resource types results in a low number of matches of ask and bids. Consequently, the market has a low liquidity, which is economically inefficient and can lead to market...
Persistent link: https://www.econbiz.de/10008925089
Banks remain the most important credit source globally despite large-scale financial development. However, banking continues to be plagued by rising costs and information asymmetry. In this context, we show how an additional borrower characteristic, specifically the borrower's network strength,...
Persistent link: https://www.econbiz.de/10012845110
Trust and trust management represent the very foundations of Computer and Network Security Protocols enabling all cyber … leads to fundamental questioning of trust as the key enabler of all cyber phenomena in the unfolding era of exponentially … increasing distrust. It is, therefore, necessary to understand the current state of trust and trust management modeling and …
Persistent link: https://www.econbiz.de/10014120820
Many IT service platforms (e.g., cloud computing platforms) are built as closed systems. They do not allow their customers to interoperate with other platforms or port their data to other platforms. As switching to different system is costly, customer of a closed IT system can be considered...
Persistent link: https://www.econbiz.de/10010593113
We contrast a standard deterministic signaling game with one where the signal-generating mechanism is stochastic. With … stochastic signals a unique equilibrium emerges that involves separation and has intuitive comparative-static properties as the … degree of signaling depends on the prior type distribution. With deterministic signals both pooling and separating …
Persistent link: https://www.econbiz.de/10009355251
decisions in a dynamic context. Uncertainty about income and interest rates are introduce in the second part of the paper. The …
Persistent link: https://www.econbiz.de/10009647429