We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Sophisticated reasoning, learning, and equilibrium in repeated games with imperfect feedback

    We analyze the infinite repetition with imperfect feedback of a simultaneous or sequential game, assuming that players are strategically...

    Pierpaolo Battigalli, Davide Bordoli in Economic Theory
    Article Open access 09 July 2024
  2. Blame and praise: responsibility attribution patterns in decision chains

    How do people attribute responsibility when an outcome is not caused by an individual but results from a decision chain involving several people? We...

    Deepti Bhatia, Urs Fischbacher, ... Regina Stumpf in Experimental Economics
    Article Open access 09 July 2024
  3. Persistence or decay of strategic asymmetric dominance in repeated dyadic games?

    In a dyadic game, strategic asymmetric dominance occurs when a player’s preference for one strategy A relative to another B is systematically...

    Andrew M. Colman, Briony D. Pulford, Alexander Crombie in Experimental Economics
    Article Open access 09 July 2024
  4. Dynamically consistent menu preferences

    We provide a unified analysis of dynamically consistent menu preferences in which an agent may exhibit a preference for flexibility, a preference for...

    Youichiro Higashi, Kazuya Hyogo, Gil Riella in Economic Theory
    Article 09 July 2024
  5. Decoding the black box: LIME-assisted understanding of Convolutional Neural Network (CNN) in classification of social media tweets

    The rise of social media has brought both opportunities and challenges to the digital age, including the proliferation of online trolls that have...

    Kashif Mazhar, Pragya Dwivedi in Social Network Analysis and Mining
    Article 09 July 2024
  6. Improve the efficiency and accuracy of ophthalmologists’ clinical decision-making based on AI technology

    Background

    As global aging intensifies, the prevalence of ocular fundus diseases continues to rise. In China, the tense doctor-patient ratio poses...

    Yingxuan Guo, Changke Huang, ... Yiqi Chen in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  7. Padding and pruning: gerrymandering under turnout heterogeneity

    Padding is the practice of adding nonvoters (e.g., noncitizens or disenfranchised prisoners) to an electoral district in order to ensure that the...

    Andrei Gomberg, Romans Pancs, Tridib Sharma in Social Choice and Welfare
    Article 09 July 2024
  8. Measuring and mitigating biases in motor insurance pricing

    The non-life insurance sector operates within a highly competitive and tightly regulated framework, confronting a pivotal juncture in the formulation...

    Mulah Moriah, Franck Vermet, Arthur Charpentier in European Actuarial Journal
    Article 09 July 2024
  9. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  10. Generalized welfare lower bounds and strategyproofness in sequencing problems

    In an environment with private information, we study the class of sequencing problems with welfare lower bounds. The “generalized welfare lower...

    Sreoshi Banerjee, Parikshit De, Manipushpak Mitra in Social Choice and Welfare
    Article 09 July 2024
  11. Principal components-based quantification of hierarchical k-core assortativity

    Hierarchical networks typically get rated to be not assortative on the basis of the degrees of the end vertices of the edges. However, degree...

    Natarajan Meghanathan in Social Network Analysis and Mining
    Article 08 July 2024
  12. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  13. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  14. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  15. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
  16. Submarine Cables and the Risks to Digital Sovereignty

    The international network of submarine cables plays a crucial role in facilitating global telecommunications connectivity, carrying over 99% of all...

    Abra Ganz, Martina Camellini, ... Luciano Floridi in Minds and Machines
    Article 08 July 2024
  17. Screening of eating disorders and its related factors among Syrian undergraduates: a cross-sectional study

    Background

    Eating disorders (EDs) are a complex group of disorders that affect mental and physical health and pose a challenge for medical...

    Mhd Obai Alchallah, Homam Alolabi, ... Fatema Mohsen in Discover Psychology
    Article Open access 08 July 2024
  18. Optimization of vision transformer-based detection of lung diseases from chest X-ray images

    Background

    Recent advances in Vision Transformer (ViT)-based deep learning have significantly improved the accuracy of lung disease prediction from...

    **sol Ko, Soyeon Park, Hyun Goo Woo in BMC Medical Informatics and Decision Making
    Article Open access 08 July 2024
  19. A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes

    Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...

    Shabnam FakhrHosseini, Chaiwoo Lee, ... Joseph Coughlin in Information Systems Frontiers
    Article Open access 08 July 2024
  20. Bilateral trade with loss-averse agents

    We introduce expectations-based loss aversion, which can explain the empirically well-documented endowment and attachment effect, into the classical...

    Jean-Michel Benkert in Economic Theory
    Article Open access 08 July 2024
Did you find what you were looking for? Share feedback.