Suggested Topics within your search.
Suggested Topics within your search.
Collusion
5
History
3
Economics
2
Forecasting
2
Imperfect competition
2
Machine learning
2
QA75 Electronic computers. Computer science
2
Western philosophy, from c 1900 -
2
Algorithms
1
Algorithms optimizations
1
Alliance paradox
1
Analytical and numerical solutions
1
Annealing
1
Annealing algorithm
1
Anti-Corruption
1
Anti-collusion
1
BP neural networks
1
Bailouts
1
Bidding process
1
Buying-out
1
Cache placement
1
Cartel
1
Cartel game theory
1
Collusive interest flooding attack
1
Collusive interest flooding attack (CIFA)
1
Colonialism and imperialism
1
Commerce
1
Committees
1
Competition
1
Computer architecture
1
-
361
-
362“..., the ownership and the manager. Especially, the problem regarding to auditor and manager''s collusion...”
Get full text
Others -
363“... on independent attacks for friend search engines while ignoring the more complicated collusion attacks, which can...”
Get full text
Article -
364“... that the resistance of collusion attacks is weak. After analyzing, we proved that we can obtain the session key via...”
Get full text
Article -
365by Huse, Cristian“... product markets. Tacit collusion plays an important role in merger policy: competition agencies sometimes...”
Published 2008
Get full text
-
366by 黃宜婷“... the price of petroleum at the same range and time. This behavior is similar to tacit collusion. Besides...”
Published 2011
Get full text
Others -
367“... the communication content by the collusion with some others. The efficiency is to achieve the lower cost...”
Get full text
Others -
368“.... One collusion method is to take parts from different legal copies and pieced them together to form a...”
Get full text
Others -
369“... different update parameters for different accessors to effectively resist both accessor collusion...”
Get full text
Article -
370“... that other non-authorized parties execute App . We called collusion attack, and these non-authorized parties...”
Get full text
Others -
371by Newton, Derrick“... for these properties. The collusion metric is introduced as a simple indicator as to the resistance of a workflow-based...”
Published 2012
Get full text
-
372“... to collusion attacks. The relationship of the factor fingerprint overlapped which resulted in a large number...”
Get full text
Others -
373by Zou, Kailin“... are switching costs, collusion, and the competitive conditions in the Hong Kong banking sector during the period...”
Published 2014
Get full text
-
374“... relationship often presents negative image in general. Issues like Business-Government Collusion is easily...”
Get full text
Others -
375“... averaging, frame-rate change, frame shuffling or collusion attacks, as well as those of still images. Also...”
Get full text
Article -
376
-
377“... electrical system under different industrial organization: monopoly, Cournot competition and collusion; under...”
Get full text
Article -
378by Saša Šegvić“... been seized by the ever increasing and more intensive collusion of organised crime and terrorism...”
Published 2009-01-01
Get full text
Article -
379“... to make the highest profits when there is no sanction. When the externality of collusion is viewed...”
Get full text
Others -
380“...-serving motives and agents of interest arising from collusion. Due to inside directors is based on legal...”
Get full text
Others