Suggested Topics within your search.
Suggested Topics within your search.
Collusion
5
History
3
Economics
2
Forecasting
2
Imperfect competition
2
Machine learning
2
QA75 Electronic computers. Computer science
2
Western philosophy, from c 1900 -
2
Algorithms
1
Algorithms optimizations
1
Alliance paradox
1
Analytical and numerical solutions
1
Annealing
1
Annealing algorithm
1
Anti-Corruption
1
Anti-collusion
1
BP neural networks
1
Bailouts
1
Bidding process
1
Buying-out
1
Cache placement
1
Cartel
1
Cartel game theory
1
Collusive interest flooding attack
1
Collusive interest flooding attack (CIFA)
1
Colonialism and imperialism
1
Commerce
1
Committees
1
Competition
1
Computer architecture
1
-
1001by Xie, Xin“... implies joint pricing of their products (explicit price collusion). To explicitly collude on price...”
Published 2014
Get full text
-
1002“... station and political and commercial interests of the rigid collusion . ...”
Get full text
Others -
1003by Langsdale, Samantha“... in terms either of collusion or subversion. Instead, I argue that in contexts where Christian...”
Published 2014
Get full text
-
1004by Krajewski, Pascal“... d'être tranchée : l'art survit-il à sa collusion avec la technologie ? === During the second half...”
Published 2012
Get full text
-
1005by Anderson Cardoso Pinto de Souza“... well our data, although we cannot reject collusion or behaviors generated by online auctions. ...”
Published 2016
Get full text
-
1006by Wilson, David A., Ph. D. Massachusetts Institute of Technology“... assumptions. First, we define bounded-collusion identity-based encryption (BC-IBE), a variant of IBE in which...”
Published 2014
Get full text
Others -
1007by Tzanaki, Anna“... ventures, oligopoly theory and tacit collusion, dominance and monopolisation. The thesis examines the legal...”
Published 2017
Get full text
-
1008by Cheng, Sijin“... worried about its reputation when it feared a collusion of foreign and domestic enemies and sought...”
Published 2016
Get full text
-
1009by Deckelbaum, Alan“... of welfare maximization in the presence of unrestricted rational collusion. We generalize the notion...”
Published 2014
Get full text
Others -
1010by Shelat, Abhi“... of "fair" versions of interactive zero-knowledge and collusion-free multi-party computation protocols...”
Published 2007
Get full text
Others -
1011“... and the collusion between the government and corporations are conveyed in the film. It is hoped that while...”
Get full text
Others -
1012“... to prevent collusion of malicious miners. The performance evaluation shows that the proposed TBSD scheme...”
Get full text
Article -
1013by Bandar Alluhaybi, Mohamad Shady Alrahhal, Ahmed Alzahrani, Vijey Thayananthan“... achieved better performance and higher resistance to advanced active attacks such as alternation, collusion...”
Published 2020-01-01
Get full text
Article -
1014“... from user collusion and desynchronization attacks. In this paper, we introduce a system architecture...”
Get full text
Article -
1015“... verification results rather than engage in collusion with malicious nodes. The analysis and simulation results...”
Get full text
Article -
1016“... analysis shows that our scheme can achieve data confidentiality, fine-grained access control, collusion...”
Get full text
Article -
1017“... but also can resist collusion attacks-even when all but one party are corrupt. At the same time...”
Get full text
Article -
1018by Kelley, Jane Elizabeth“... that characters exercise on a continuum: domination, collusion, resistance, and agency. First, this study examines...”
Published 2004
Get full text
-
1019by Barris, Jeremy Leslie“... the collusion of unconscious strivings with the ideologically emphasised idea of what is natural. The resolution...”
Published 2016
Get full text
Dissertation -
1020by Marquis, David J.“... bitter struggle against the BTW utilizing violence, Jim Crow, and collusion with the state. This struggle...”
Published 2016
Get full text
Get full text
Others