Results 51 to 60 of about 5,279 (162)

The Determinants of Negotiated Pharmaceutical Prices

open access: yesThe Journal of Industrial Economics, EarlyView.
ABSTRACT We focus on the determinants of pharmaceutical drug prices. Using data from the Brazilian pharmaceutical market, we find large variations in drug prices across buyers, drug classes, and time periods. Our estimation results provide evidence that transaction‐specific determinants between buyers and sellers (e.g., transaction volume, buyer's ...
Ralph B. Siebert   +2 more
wiley   +1 more source

FIDE Congress 2020 - EU Competition Law and the Digital Economy: United Kingdom Report [PDF]

open access: yes, 2019
This report was prepared for the 29th biennial Congress of the International Federation of European Law (FIDE) to be held in The Hague in May 2020. It is the national report for the United Kingdom in response to Topic 3 of the 2020 FIDE Congress, titled ‘
Kalintiri, A., Stones, R.
core  

Multi-round Master-Worker Computing: a Repeated Game Approach

open access: yes, 2015
We consider a computing system where a master processor assigns tasks for execution to worker processors through the Internet. We model the workers decision of whether to comply (compute the task) or not (return a bogus result to save the computation ...
Anta, Antonio Fernández   +3 more
core   +1 more source

Organized Crime, Corruption, and Economic Growth

open access: yesJournal of Regional Science, Volume 65, Issue 2, Page 535-560, March 2025.
ABSTRACT In this paper, we study the relationship between organized crime, corruption, and economic growth on a data set from Italian regions for the period 1996–2013. Our working hypothesis is that organized crime can embezzle part of the public expenditure aimed at productive uses by threatening and bribing public officers. To assess the consequences
Tamara Fioroni   +2 more
wiley   +1 more source

On Reductions from Multi-Domain Noninterference to the Two-Level Case

open access: yes, 2016
The literature on information flow security with respect to transitive policies has been concentrated largely on the case of policies with two security domains, High and Low, because of a presumption that more general policies can be reduced to this two ...
van der Meyden, Ron, Woizekowski, Oliver
core   +1 more source

Algorithmic Collusion is Algorithm Orchestration

open access: yes
We propose a fresh `meta-game' perspective on the problem of algorithmic collusion in pricing games a la Bertrand. Economists have interpreted the fact that algorithms can learn to price collusively as tacit collusion. We argue instead that the co-parametrization of algorithms, in ways as are necessary to obtain algorithmic collusion, typically ...
Carissimo, Cesare   +3 more
openaire   +2 more sources

THE FATHERS, COMPUTERS AND US

open access: yesModern Theology, EarlyView.
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley   +1 more source

The Apple E-Book Agreement and Ruinous Competition: Are E-Goods Different for Antitrust Purposes? [PDF]

open access: yes, 2014
Publishers have spent the last decade and a half struggling against falling prices for digital goods. The recent antitrust case against Apple and the major publishers highlights collusive price fixing as a potential method for resisting depreciation ...
Wolfe, Michael
core   +1 more source

Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values

open access: yes, 2014
Motivated by a recently introduced HIMMO key distribution scheme, we consider a modification of the noisy polynomial interpolation problem of recovering an unknown polynomial $f(X) \in Z[X]$ from approximate values of the residues of $f(t)$ modulo a ...
Garcia-Morchon, Oscar   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy