Showing 1 - 10 of 105
This paper considers one machine job scheduling situations or sequencing problems, where clients can have more than a single job to be processed in order to get a final output.Moreover, a job can be of interest for different players. This means that one of the main assumptions in classic...
Persistent link: https://www.econbiz.de/10011091902
In this paper we introduce multiple longest traveling salesman (MLTS) games. An MLTS game arises from a network in which a salesman has to visit each node (player) precisely once, except its home location, in an order that maximizes the total reward.First it is shown that the value of a...
Persistent link: https://www.econbiz.de/10011090530
This paper introduces a new class of transferable-utility games, called multi-issue allocation games.These games arise from various allocation situations and are based on the concepts underlying the bankruptcy model, as introduced by O'Neill (1982).In this model, a perfectly divisible good...
Persistent link: https://www.econbiz.de/10011092903
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper...
Persistent link: https://www.econbiz.de/10011091539
In order to be able to devise successful strategies for destabilizing terrorist organizations it is vital to recognize and understand their structural properties. This paper deals with the opti- mal communication structure of terrorist organizations when considering the tradeoff between secrecy...
Persistent link: https://www.econbiz.de/10011092758
In this paper we study the relation between convexity of TU games and marginal vectors.We show that if specfic marginal vectors are core elements, then the game is convex.We characterize sets of marginal vectors satisfying this property, and we derive the formula for the minimum number of...
Persistent link: https://www.econbiz.de/10011091198
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert...
Persistent link: https://www.econbiz.de/10011091475
Persistent link: https://www.econbiz.de/10011091682
In this paper we construct sets of marginal vectors of a TU game with the property that if the marginal vectors from these sets are core elements, then the game is convex.This approach leads to new upperbounds on the number of marginal vectors needed to characterize convexity.An other result is...
Persistent link: https://www.econbiz.de/10011091846
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10011091910