Search

Your search keyword '"COLLUSION"' showing total 917 results

Search Constraints

Start Over You searched for: Descriptor "COLLUSION" Remove constraint Descriptor: "COLLUSION"
917 results on '"COLLUSION"'

Search Results

1. Exploring the evolutionary game of rumor control based on prospect theory.

2. Collusion in the presence of antitrust prosecution: Experimental evidence.

3. An evolutionary game analysis of algorithmic indirect copyright infringement from the perspective of collusion between UGC platforms and direct infringers.

4. Standard (k, n)-threshold hierarchical quantum secret sharing.

5. When patients and physicians get mixed up: An investigation and differential description of collusion by means of a case series of supervisions.

6. Assessment of an online open‐book examination in postgraduate dentistry.

7. Collaboration, collusion, and barter-cheating: an analysis of academic help-seeking behaviors.

8. Minimizing Computation and Communication Costs of Two-Sided Secure Distributed Matrix Multiplication under Arbitrary Collusion Pattern.

9. The cost coordination theory of harm and the EU trucks case.

10. Taming the Pricing Beast.

11. Potential AI-Driven Algorithmic Collusion and Influential Factors in Construction Bidding.

12. Down By The Riverside: A Collusion of Mothers for Moses.

13. Government‐enterprise collusion and public oversight in the green transformation of resource‐based enterprises: A principal‐agent perspective.

14. Reinforcement learning in a prisoner's dilemma.

15. Cournot meets Bayes-Nash: A discontinuity in behavior in finitely repeated duopoly games.

16. Collusion, inattentive consumers and shrouded prices.

17. Collusive behaviour in the automobile sector in Spain. Quantifying consumer damages.

18. Improving the Effectiveness of Eigentrust in Computing the Reputation of Social Agents in Presence of Collusion.

19. An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing.

20. Collusive Infrapolitics: The Hidden Gay Worlds of HIV Community Based Organizations in Kunming, China.

21. Pre‐play promises, threats and commitments under partial credibility.

22. Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation.

23. A model of collusion formation and measurement in the open ascending bid auctions in the agricultural markets.

24. Vertical Relationships with Hidden Interactions.

25. Grey Interest Chain Identification and Control Model for Government Investment Engineering Projects Based on Node Identification.

26. E-DPNCT: an enhanced attack resilient differential privacy model for smart grids using split noise cancellation.

27. Efficient Mediated Quantum Secret Sharing Protocol in a Restricted Quantum Environment.

28. Causation network analysis of collusion behavior between tenderers and bidders in construction project.

29. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.

30. Hierarchical Agglomerative Clustering to Detect Test Collusion on Computer‐Based Tests.

31. Addressing data access problems in the emerging digital agriculture sector: potential of the refusal to deal case law to complement ex-ante regulation.

32. Containing Large-Scale Criminal Violence Through Internationalized Prosecution: How the Collaboration Between the CICIG and Guatemala's Law Enforcement Contributed to a Sustained Reduction in the Murder Rate.

33. When the State Becomes Complicit: Mayors, Criminal Actors, and the Deliberate Weakening of the Local State in Colombia.

34. Pigouvian algorithmic platform design.

35. Reputation based novel trust management framework with enhanced availability for cloud.

36. Auto cartels and the challenges they pose in private enforcement: scania cartel case.

37. Preventing Collusion Between Related Tenderers: the Specific Scope and Application of the Optional Ground for Exclusion · Case C-416/21 Landkreis Aichach-Friedberg.

38. Bidding Consortia: Critical Assessment of the Revised Horizontal Guidelines.

39. The Dark Room Problem: Scapegoating and Audience Complicity in Twelfth Night.

40. ReIPS: A Secure Cloud-Based Reputation Evaluation System for IoT-Enabled Pumped Storage Power Stations.

41. Collusion with capacity constraints under a sales maximization rationing rule.

42. Cheating Detection of Test Collusion: A Study on Machine Learning Techniques and Feature Representation.

43. CONFRONTING COLLUSION WITH QUI TAM: WHY THE DEPARTMENT OF JUSTICE ANTITRUST DIVISION SHOULD BOLSTER ITS LENIENCY PROGRAM WITH A WHISTLEBLOWER PROVISION.

44. Cartelization under present bias and imperfect public signals.

45. Confidence Screening Detector: A New Method for Detecting Test Collusion.

46. A Kind of (t , n) Threshold Quantum Secret Sharing with Identity Authentication.

47. Proliferation mechanism of collusive alienation in tendering for government investment projects.

48. Network Externalities and Downstream Collusion under Asymmetric Costs: A Note.

49. Sociological Analysis of the Story Khishkhaneh Herat from Tarikh Beyhaqi Based on the Theory of Symbolic Interaction.

50. Elite Capture and Corruption: The Influence of Elite Collusion on Village Elections and Rural Land Development in China.

Catalog

Books, media, physical & digital resources