Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors (Q1686491): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(3 intermediate revisions by 3 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10479-015-2043-x / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10479-015-2043-x / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2239942471 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public and private optimization at a service facility with approximate information on congestion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3998718 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Depreciation games / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal resource allocation for security in reliability systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the power of randomization in on-line algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Repetitive Testing Strategies When the Testing Process Is Imperfect / rank
 
Normal rank
Property / cites work
 
Property / cites work: The strategic interaction between a company and the government surrounding disasters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probability models for access security system architectures / rank
 
Normal rank
Property / cites work
 
Property / cites work: A multilevel passenger screening problem for aviation security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Passenger grouping with risk levels in an airport security system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation-based selectee Lane queueing design for passenger checkpoint screening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling secrecy and deception in a multiple-period attacker-defender signaling game / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Logic of Animal Conflict / rank
 
Normal rank
Property / cites work
 
Property / cites work: Balancing congestion and security in the presence of strategic applicants with private information / rank
 
Normal rank
Property / cites work
 
Property / cites work: A medical resource allocation model for serving emergency victims with deteriorating health conditions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling costly learning and counter-learning in a defender-attacker game with private defender information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling and mitigating the effects of supply chain disruption in a defender-attacker game / rank
 
Normal rank
Property / cites work
 
Property / cites work: Performance Analysis of a Queue with Congestion-Based Staffing Policy / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10479-015-2043-X / rank
 
Normal rank

Latest revision as of 03:38, 11 December 2024

scientific article
Language Label Description Also known as
English
Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
scientific article

    Statements

    Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors (English)
    0 references
    0 references
    0 references
    15 December 2017
    0 references
    security screening policy
    0 references
    two-stage queueing network
    0 references
    waiting time
    0 references
    game theory
    0 references
    imperfect screening
    0 references
    0 references
    0 references

    Identifiers