Suggested Topics within your search.
Suggested Topics within your search.
Collusion
5
History
3
Economics
2
Forecasting
2
Imperfect competition
2
Machine learning
2
QA75 Electronic computers. Computer science
2
Western philosophy, from c 1900 -
2
Algorithms
1
Algorithms optimizations
1
Alliance paradox
1
Analytical and numerical solutions
1
Annealing
1
Annealing algorithm
1
Anti-Corruption
1
Anti-collusion
1
BP neural networks
1
Bailouts
1
Bidding process
1
Buying-out
1
Cache placement
1
Cartel
1
Cartel game theory
1
Collusive interest flooding attack
1
Collusive interest flooding attack (CIFA)
1
Colonialism and imperialism
1
Commerce
1
Committees
1
Competition
1
Computer architecture
1
-
381“... authentication. However this scheme has high risk of suffer collusion attack. Authorized users can share personal...”
Get full text
Others -
382by Cano Tacza, Karenn Norely“... o perjuicio patrimonial para imputar a los procesados el delito de colusión agravada. === Collusion...”
Published 2021
Get full text
Others -
383by Wang, Jun“... monitoring and collusion effect's. Measuring the MLSS by the size of shareholding of the NCLS .relative...”
Published 2011
Get full text
-
384“... to the collusion attack. We will analysis the possible collusion attack on the scheme proposed by Sherman...”
Get full text
Others -
385“... of vertical integration and strategic collusion from the perspective of green supply chain practice...”
Get full text
Article -
386by Eriksson, Rickard“... in demand affect the possibility of maintaining implicit collusion. Cyclical changes in the intensity...”
Published 2001
Get full text
Get full text
Doctoral Thesis -
387“... privacy enhanced scheme, fast forwarded malicious message and collusion attacks are all the outstanding...”
Get full text
Others -
388by Kalozymis, Ioannis“... analysis, its link with tacit collusion and the judgments that have formulated the conditions that must...”
Published 2014
Get full text
-
389by Salgado Banda, HeÌctor“... to other studies, it is shown that collusion may accelerate competition. The thesis consists of five...”
Published 2004
Get full text
-
390by Syarif Syahrial“... and collusion between central and local government. The result conform the significance of political pressure...”
Published 2006-09-01
Get full text
Article -
391“... eavesdropping attacks, forged attacks, dropping attacks, and collusion attacks. To utilize these attacks...”
Get full text
Others -
392“... should be imperceptible and can resist collusion attacks. The colluder may combine several copies...”
Get full text
Others -
393by Zhang, Ping“... of IPO auctions and show that when demand is discrete the tacit collusion equilibrium is obtained under a...”
Published 2006
Get full text
-
394by Singh, Gaurav (Gaurav J.)“... at bounded-collusion functional encryption, where the number of keys for which security is guaranteed...”
Published 2017
Get full text
Others -
395by Simbanegavi, Witness“... collusion on advertising even though advertising is only informative. If so, will this enhance or lower...”
Published 2005
Get full text
Get full text
Doctoral Thesis -
396“... advertisement. At last, we discuss (4) the collusion of platform and advertiser. It leads the collusion profit...”
Get full text
Others -
397“... Authority (CADE) documents help to characterize the ethanol and gasoline retailers involved in the collusion...”
Get full text
Article -
398“... then give the corresponding conditions under which full collusion and partial collusion are established...”
Get full text
Article -
399“... Layer Collusion Tracker that is named as MLC Tracker. MLC Tracker checks Intent privilege to identify...”
Get full text
Others -
400“... of the collusion attacks. With being aware of topology information, the proposed TAKA (Topology Aware Key...”
Get full text
Others