Search Results

1 - 10 of 164 items :

  • "game theory" x
Clear All
Game theory in designing mHealth apps for monitoring hypertension

making: models and current research. Journal of clinical nursing, 17 (2), 187-195. Bettinger, B. (2016). Game theory and mechanism design for cooperative competition dilemmas between healthcare providers, PhD Thesis. Bevington, P.R., Robinson, D.K., (2003). Data Reduction and Error Analysis for the Physical Sciences. McGraw-Hill. Bryan, K. (2009). Communication in Healthcare. Peter Lang Publishing. Caplan, A. (2011). Will evidence ever be sufficient to resolve the challenge of cost containment? Journal of Clinical Oncology, 29 , 1946

Open access
Game Theory Based Radio Resource Management Algorithm for Packet Access Cellular Networks

., “Game Theory”, MIT Press Cambridge, MA, 1991. [13] Han, Z., et al., “Fair Multiuser Channel Allocation for OFDMA Networks Using Nash Bargaining Solutions and Coalitions”, IEEE Transactions on Communications , vol. 53, no. 8, pp.1366-1376, 2005. [14] Touati, C., et al., “Generalised Nash Bargaining Solution for Bandwidth Allocation”, Computer Networks , vol. 50, pp.3243-3263, 2006. [15] 3GPP, “Evolved Universal Terrestrial Radio Access (E-UTRA); Multiplexing and channel coding”, 3GPP Tech. Rep. TS 36.212, Release 9, 2010. (online), Available from

Open access
A Game Theory Based Model for Internet Public Opinion’s Embryonic Stage

-39. 11. Bi, H. Ten Years the Review and Reflection of Modern Public Opinion Research. Journal of Tianjin Academy of Social Sciences, Vol. 4 , 2013, No 4, pp. 67-71. 12. Wang, J., S. Yuwen. Structure and Operation Mechanism of Network Public Opinion Ecosystem Research. Journal of Intelligence Theory and the Practice, Vol. 37 , 2014, No 1, pp. 55-58. 13. Wang, Y., K. You, M. Wang. Network Public Opinion Propagation Model Based on Game Theory. Journal of Research in Computer Application, Vol. 30 , 2013, No 8, pp. 2480-2482. 14. Blumer, H. Public

Open access
Distributive Justice: From Steinhaus, Knaster, and Banach to Elster and Rawls — The Perspective of Sociological Game Theory

, T. R., Caldas J.C., Roszkowska E. (2005). Generalized Game Theory's Contribution to Multi-agent Modelling: Addressing Problems of Social Regulatiion, Social Order, and Effective Security . In: B. Dunin-Keplicz, A. Jankowski, A. Skowron, M. Szczuka (Eds.), Monitoring, Security and Rescue Techniques in Multiagent Systems. Springer Verlag: Berlin/London. Burns, T.R, DeVille P. (1999). On Social Equilibria . Paper prepared for presentation at the International Economic Association's XIIth World Congress, Buenos Aires, Argentina. Burns, T.R., Flam, H. (1987

Open access
Vendor Selection and Supply Quotas Determination by Using a New Multi-Objective Programming Method Based on Cooperative Game Theory

. 243, No. 9, pp. 746-754. 10. Osborne, J. M. (2004) An introduction to game theory, Oxford University Press, New York, 11. Perić, T., Babić, Z. (2010) “Vendor Selection by Application of Revised Weighting Method and Fuzzy Multicriteria Linear Programming”, Proceedings of the Challenges for Analysis of the Economy, the Businesses, and Social Progress, International Scientific Conference, Szeged, November 19-21, 2009. www.edoc.hu/conferences/statconf2009 , Edited by Peter Kovacs, Katalin Szep and Tamas Katona, Published by Unidocument Kft. www

Open access
A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach

References Barron, E. (2013). Game Theory, an Introduction, Second Edition, ch. 3., John Wiley & Sons, Inc. Heriyanto, T., & Allen, L. (2014). Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing. Min Xie Yuan-Shun Dai, & K.-L. Poh. (2004). Computing System Reliability Models and Analysis, Kluwer Academic Publishers, 101-104. Moga, H., & Boşcoianu, M. (2015). Massive Cyber-attacks Patterns Implemented with BDI Agents, 6th International Conference on Aerospace

Open access
A Two Person Zero Sum Game Oriented to Integration of Objectives

References Arslan S. (2006). Game Theory Approach In Telecommunications Networks. Gazi University Institute of Science and Technology, Ph.D Thesis, 43. Bellmann R.E. and Zadeh L.A. (1970). Decision making in a fuzzy environment. Management Sciences, 17: 141-164. Brown G., Kline J., Thomas A., Washburn A. and Wood K. (2011). A game theoretic model for defense of an oceanic bastion against submarine. Military Operation Research 16(4):25-40 Cantwell G.L. (2003). Can Two Person Zero Sum Game Theory

Open access
A computational model of outguessing in two-player non-cooperative games

, Washington and Lee University working paper, 2002. ⇒72 [4] C.F. Camerer, Behavioral Game Theory: Experiments in Strategic Interaction, Princeton University Press, 2003, pp. 199-264. ⇒71, 72 [5] C. M. Capra, J.K. Goeree, R. Gomez, C. Holt, Anomalous behavior in traveller’s dilemma?, Amer. Economic Review 89, 3 (1999) 678-690. ⇒72 [6] S. N. Ethier, The Doctrine of Chances, Springer, 2010, pp. 119-155. ⇒73 [7] J. K. Goeree, C. Holt, Stochastic game theory: For playing games, not just for doing theory, Proc

Open access
TCP Performance in Multi-Polling Game Theory-Based IEEE 802.11 Networks

. [13] K. Tan, J. Song, Q. Zhang and M. Sridharan, “A Compound TCP Approach for High-speed and Long Distance Networks,” in Proc. IEEE INFOCOM 2006. 25TH IEEE Int. Conf. on Computer Commun. , Barcelona, Spain, 2006, pp. 1–12. https://doi.org/10.1109/INFOCOM.2006.188 [14] M. Felegyhazi and J. P. Hubaux, “Game Theory in Wireless Networks: A Tutorial,” EPFL Technical report: LCA-REPORT-2006-002, Switzerland, Jan. 2006. [15] A. Medeisis, J. Sydor, L. Cremene, O. Holland, A. Anskaitis, D. Wiecek, Y. Haddad and T. Cuzanauskas, “ISM-Advanced: Improved Access

Open access
Analysis of Ineffectiveness Arising in “Investor-government” Relations

.014 Kent, D., Hirshleiferc, D. and Siew Hong, T. (2002). Investor psychology in capital markets: evidence and policy implications. Journal of Monetary Economics, 49: 139-209, http://dx.doi.org/10.1016/S0304-3932(01)00091-5 Medda, F. (2007). A game theory approach for the allocation of risks in transport public private partnerships. International Journal of Project Management, 25(3): 213-218, http://dx.doi.org/10.1016/j.ijproman.2006.06.003 Meer K. van der and Noordam, M. (2004). The Use of Grants to Address Market Failures. A Review of

Open access