Suggested Topics within your search.
Suggested Topics within your search.
Collusion
5
History
3
Economics
2
Forecasting
2
Imperfect competition
2
Machine learning
2
QA75 Electronic computers. Computer science
2
Western philosophy, from c 1900 -
2
Algorithms
1
Algorithms optimizations
1
Alliance paradox
1
Analytical and numerical solutions
1
Annealing
1
Annealing algorithm
1
Anti-Corruption
1
Anti-collusion
1
BP neural networks
1
Bailouts
1
Bidding process
1
Buying-out
1
Cache placement
1
Cartel
1
Cartel game theory
1
Collusive interest flooding attack
1
Collusive interest flooding attack (CIFA)
1
Colonialism and imperialism
1
Commerce
1
Committees
1
Competition
1
Computer architecture
1
-
941by Souza, Anderson Cardoso Pinto de“..., although we cannot reject collusion or behaviors generated by online auctions....”
Published 2016
Get full text
Others -
942by Whitney, Justin D“.... In colluding with malicious nodes, well behaved nodes risk losing privileges gained over time; collusion...”
Published 2005
Get full text
Get full text
Others -
943by Wright, Rebecca“... neglecting socio-political contexts. The emerging themes include: collusion, power, influence...”
Published 2017
Get full text
-
944by Kabemba, Claude Kambuya“... resources that are fuelled by regional and international actors in collusion with local actors. The thesis...”
Published 2011
Get full text
Others -
945“... IPPs for collusion after the breakdown of several price renegotiations between Taipower and the nine...”
Get full text
Others -
946by Caihua Zhou“... of the central government, the local government, and the third-party enterprise is designed around the collusion...”
Published 2021-04-01
Get full text
Article -
947“... one cloud server and can thus avoid collusion attack. Further, we achieve an efficient and secure...”
Get full text
Article -
948“... that the proposed scheme is unforgeable, collusion resistant and privacy-preserving. Finally, we evaluate...”
Get full text
Article -
949“... under existential unforgeable in the random oracle model as well as the security against collusion...”
Get full text
Article -
950“... multiauthority ABE systems that do not rely on a central authority, collusion resistance can be achieved using a...”
Get full text
Article -
951“...-based signature scheme with multiple authorities which can resist collusion attack out of N from N-1...”
Get full text
Article -
952by Guler, Kemal“... to collude under first and second price auctions and find that equilibrium patterns of collusion differ...”
Published 1990
Get full text
Get full text
Others -
953by Lee, Daesik“...We consider the applicability of the Revelation Principle under the possibility of collusive...”
Published 2015
Get full text
Others -
954by Halilul Khairi“... for collusion to happen between NGOs and corruptors. However, in practice, the role of NGOs can become elitist...”
Published 2018-11-01
Get full text
Article -
955“... technology cannot protect the system privacy when facing a possible collusion attack. In this paper, we...”
Get full text
Article -
956
-
957by Buckham, Carmel J.“... agreements in fact amounted to collusion by dividing and controlling markets. The value in this research...”
Published 2015
Get full text
Get full text
-
958“... of collusion between management and accountants. Finally, at the end of this paper I bring forth some...”
Get full text
Others -
959
Get full text
Others -
960“... and that there is no collusion between any of the three parties in the protocol. Compared with current election protocols...”
Get full text
Article