Listing 1 - 10 of 192 | << page >> |
Sort by
|
Choose an application
Choose an application
Essentials of Microeconomics by Bonnie Nguyen and Andrew Wait is a comprehensive textbook that introduces fundamental microeconomic concepts with clarity and precision. The book covers key topics such as game theory, market structures, and imperfect markets, and emphasizes both theoretical and practical applications. It includes expanded resources for educators, such as lecture slides and sample exam questions. The text is designed for undergraduate and postgraduate students, and it balances mathematical rigor with accessible explanations, making it suitable for diverse educational backgrounds. The authors aim to equip students with analytical tools necessary for understanding and applying economic models to real-world problems.
Microeconomics. --- Game theory. --- Microeconomics --- Game theory
Choose an application
The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin’s security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. This volume: Describes attacks and exploits with mathematical justifications, including selfish mining. Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack. Outlines the block reward schedule and economics of ASIC mining. Discusses how adoption by institutions would fundamentally change the security model. Analyzes incentives for double-spend and sabotage attacks via stock-flow models. Overviews coalitional game theory with applications to majority takeover attacks Presents Nash bargaining with application to unregulated environments This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system.
Bitcoin. --- Game theory. --- Game theory, probability, Bitcoin.
Choose an application
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.
Choose an application
Choose an application
Learn how to analyse and manage evolutionary and sequential user behaviours in modern networks, and how to optimize network performance by using indirect reciprocity, evolutionary games, and sequential decision making. Understand the latest theory without the need to go through the details of traditional game theory. With practical management tools to regulate user behaviour, and simulations and experiments with real data sets, this is an ideal tool for graduate students and researchers working in networking, communications, and signal processing.
Choose an application
Contest theory is an important part of game theory used to analyse different types of contests and conflicts. Traditional microeconomic models focus on situations where property rights are well defined, and agents voluntarily trade rights over goods or produce rights for new goods. However, much less focus has been given to other situations where agents do not trade property rights, but rather fight over them. Contests: Theory and Applications presents a state-of-the art discussion of the economics of contests from the perspective of both core theory and applications. It provides a new approach to standard topics in labour, education, welfare and development and introduces areas like voting, industrial organisation, mechanism design, sport, and military conflict. Using elementary mathematics, this book provides a versatile framework for navigating this growing area of study and serves as an essential resource for its wide variety of applications in economics and political science.
Choose an application
This work focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks.
Listing 1 - 10 of 192 | << page >> |
Sort by
|