Results 21 to 30 of about 5,279 (162)

Algorithmic pricing and market coordination – toward a notion of “collusive risk”

open access: yesThēmis, 2020
Over the past couple of years, many competition and antitrust scholars have feared the dawn of ‘algorithmic collusion’. Some have thus suggested expanding the notions of ‘collusion’ and ‘agreement’ in order to capture such coordination.
Juliane K. Mendelsohn
doaj  

Sustainable and Unchallenged Algorithmic Tacit Collusion

open access: yesSSRN Electronic Journal, 2018
Algorithmic collusion is a hot topic within antitrust circles in Europe, US and beyond. But some economists downplay algorithmic collusion as unlikely, if not impossible. This paper responds to these criticisms by pointing to new emerging evidence and the gap between law and this particular economic theory.
Ezrachi, Ariel, Stucke, Maurice E.
openaire   +3 more sources

Collusion in Peer-to-Peer Systems [PDF]

open access: yes, 2009
Peer-to-peer systems have reached a widespread use, ranging from academic and industrial applications to home entertainment. The key advantage of this paradigm lies in its scalability and flexibility, consequences of the participants sharing their ...
Ciccarelli, Gianluca, Lo Cigno, Renato
core  

Accelerating m‐Invariance for Continuous Big Data Publishing

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
To prevent personal information leakage from the collection and publication of big data, anonymization techniques that protect privacy while preserving data utility are essential. In particular, m‐invariance provides privacy protection for dynamic datasets that are continuously published as records are updated.
Kentaro Morise, Hiroaki Nishi
wiley   +1 more source

Artificial Intelligence and Antitrust Regulation: Lessons from the European Union, United States and China

open access: yesIndonesian Comparative Law Review
This article explores the implications of artificial intelligence (AI) for antitrust regulation through a comparative analysis of the European Union, the United States, and China.
Reni Budi Setianingrum
doaj   +1 more source

The Quality of Equilibria for Set Packing Games [PDF]

open access: yes, 2017
We introduce set packing games as an abstraction of situations in which $n$ selfish players select subsets of a finite set of indivisible items, and analyze the quality of several equilibria for this class of games.
de Jong, Jasper, Uetz, Marc
core   +2 more sources

Algorithmic Price Recommendations and Collusion: Experimental Evidence

open access: yesSSRN Electronic Journal, 2023
AbstractThis paper investigates the collusive and competitive effects of algorithmic price recommendations on market outcomes. These recommendations are often non-binding and common in many markets. We develop a theoretical framework and derive two algorithms that recommend collusive pricing strategies.
Matthias Hunold, Tobias Werner
openaire   +2 more sources

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Horizontal Restraint Regulations in the EU and the US in the Era of Algorithmic Tacit Collusion [PDF]

open access: yes, 2018
The fast development and improvement of e-commerce through various tools such as data mining, artificial intelligence and complex pricing algorithms has not gone unnoticed. Concerns about how new technologies can impact competition law have started to be
Verdugo, Catalina González
core  

Interception in Distance-Vector Routing Networks

open access: yes, 2016
Despite the large effort devoted to cybersecurity research over the last decades, cyber intrusions and attacks are still increasing. With respect to routing networks, route hijacking has highlighted the need to reexamine the existing protocols that ...
Burstein, David   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy