排序方式: 共有5条查询结果,搜索用时 343 毫秒
1
1.
We study a setting with a single type of resource and with several players, each associated with a single resource (of this type). Unavailability of these resources comes unexpectedly and with player‐specific costs. Players can cooperate by reallocating the available resources to the ones that need the resources most and let those who suffer the least absorb all the costs. We address the cost savings allocation problem with concepts of cooperative game theory. In particular, we formulate a probabilistic resource pooling game and study them on various properties. We show that these games are not necessarily convex, do have non‐empty cores, and are totally balanced. The latter two are shown via an interesting relationship with Böhm‐Bawerk horse market games. Next, we present an intuitive class of allocation rules for which the resulting allocations are core members and study an allocation rule within this class of allocation rules with an appealing fairness property. Finally, we show that our results can be applied to a spare parts pooling situation. 相似文献
2.
3.
《Arms and Armour》2013,10(2):103-123
The Royal Armouries of Leeds preserves a rare example of an early fifteenth-century German tournament high saddle that is also one of the earliest complete western medieval saddles preserved. It bears witness to an extreme form of tournament which stood very far from the real practice of war: the Hohenzeuggestech. Impact marks of lances and swords, visible on the saddle, reveal the violence of the blows exchanged during these meetings, a violence often hard to observe in the contemporary but conventional representations of jousters and tourneyers. Thus, by the means of its excellent state of preservation, the Leeds high saddle sheds some light on the jousts and tourneys on high saddles, once so popular and plentiful in what remains of the civilian iconography of the late fourteenth- and the fifteenth-century Germanic world. 相似文献
4.
结合量子计算算子提出一种基于极化单光子的量子秘密共享协议.该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击.通过对置换算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性. 相似文献
5.
多功能组合木马架构的研究 总被引:2,自引:0,他引:2
对当前主流木马的实现架构进行了分析,根据分析结果,提出了多功能组合木马架构.该架构不仅综合利用现有的木马技术来适应各种复杂的环境,而且实现了木马功能的多样化.最后,给出了该木马架构的一些关键实现技术. 相似文献
1