Results 61 to 70 of about 1,013,923 (195)

An Improved Bound for First-Fit on Posets Without Two Long Incomparable Chains

open access: yes, 2012
It is known that the First-Fit algorithm for partitioning a poset P into chains uses relatively few chains when P does not have two incomparable chains each of size k. In particular, if P has width w then Bosek, Krawczyk, and Szczypka (SIAM J.
Bosek B.   +8 more
core   +1 more source

Farmers' pro‐social motivations and willingness‐to‐accept in markets with public goods

open access: yesAmerican Journal of Agricultural Economics, EarlyView.
Abstract To explain how some farmers' decisions may diverge from profit‐maximization, we incorporate proactive social preferences for public goods in an expected utility framework, in addition to reactive risk preferences to uncertainty. We offer empirical evidence that proactive preferences influence farmers' decisions alongside reactive preferences ...
Jill Fitzsimmons   +2 more
wiley   +1 more source

On the Multidimensional Stable Marriage Problem [PDF]

open access: yes, 2015
We provide a problem definition of the stable marriage problem for a general number of parties $p$ under a natural preference scheme in which each person has simple lists for the other parties.
Lichtman, Jared D.
core   +2 more sources

Argumentation strategies in party competition

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Political parties' rhetorical strategies play a crucial role in shaping public opinion and electoral outcomes. To gain insight into what kind of arguments parties present to the public, and under what conditions, we develop a model of argumentation where parties compete to persuade voters before engaging in platform competition.
Catherine Hafer   +2 more
wiley   +1 more source

Competitive diplomacy in bargaining and war

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract War is often viewed as a bargaining problem. However, prior to bargaining, countries can vie for leverage by expending effort on diplomacy. This article presents a dynamic model of conflict where agenda‐setting power is endogenous to pre‐bargaining diplomatic competition.
Joseph J. Ruggiero
wiley   +1 more source

Decision aid problems criteria for infrastructure networks vulnerability analysis (regular paper) [PDF]

open access: yes, 2013
Natural disasters through infrastructure networks might aggravate or mitigate consequences to stakes. The objective of this paper is to characterize this kind of situation in order to provide a solid foundation for the decision aid. This characterization
Kamissoko, Daouda   +2 more
core   +1 more source

Reviewing fast or slow: A theory of summary reversal in the judicial hierarchy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Appellate courts with discretionary dockets have multiple ways to review lower courts. We develop a formal model that evaluates the trade‐offs between “full review”—which features full briefing, oral arguments, and signed opinions—versus “quick review,” where a higher court can summarily reverse a lower court. We show that having the option of
Alexander V. Hirsch   +2 more
wiley   +1 more source

An extension of the basic local independence model to multiple observed classifications

open access: yesBritish Journal of Mathematical and Statistical Psychology, EarlyView.
Abstract The basic local independence model (BLIM) is appropriate in situations where populations do not differ in the probabilities of the knowledge states and the probabilities of careless errors and lucky guesses of the items. In some situations, this is not the case. This work introduces the multiple observed classification local independence model
Pasquale Anselmi   +8 more
wiley   +1 more source

Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Leman Go Indifferent

open access: yesProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
Prior attacks on graph neural networks have mostly focused on graph poisoning and evasion, neglecting the network's weights and biases. Traditional weight-based fault injection attacks, such as bit flip attacks used for convolutional neural networks, do not consider the unique properties of graph neural networks.
Kummer, Lorenz   +4 more
openaire   +4 more sources

Skiba points for small discount rates [PDF]

open access: yes
The present article uses perturbation techniques to approximate the value function of an economic minimisation problem for small values of the discount rate. This can be used to obtain the approximate location of Skiba states (or indifference thresholds)
Wagener, F.O.O.
core  

Home - About - Disclaimer - Privacy