Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • committing to inefficiency: Corruption, deforestation and low land productivity in Latin america 2008-01-11 Paper Corruption, trade and resource conversion...
    10 bytes (16 words) - 12:19, 9 December 2023
  • 2023-08-14 Paper Simulation Modeling of the Resource Allocation Under Economic Corruption 2022-12-01 Paper Optimal Incentive Strategy in a Continuous Time Inverse...
    10 bytes (18 words) - 01:04, 11 December 2023
  • Publication Date of Publication Type Games of corruption: how to suppress illegal logging 2019-05-23 Paper The persistence of a local dialect when a national...
    10 bytes (18 words) - 23:56, 10 December 2023
  • in Socio-economic Systems: Corruption, Inspection, Coalition Building, Network Growth, Security 2019-05-20 Paper Corruption and botnet defense: a mean...
    10 bytes (18 words) - 05:08, 12 December 2023
  • CMMSE-09 2010-10-06 Paper On the gains of committing to inefficiency: Corruption, deforestation and low land productivity in Latin america 2008-01-11 Paper...
    10 bytes (18 words) - 02:46, 12 December 2023
  • 2021-08-10 Paper A game for exploring political and bureaucratic corruption 2019-09-25 Paper Corruption, evasion and environmental policy: a game theory approach...
    10 bytes (16 words) - 14:00, 7 October 2023
  • 2005-08-05 Paper Corruption and energy efficiency in OECD countries: theory and evidence. 2004-06-11 Paper Trade liberalization, corruption, and environmental...
    10 bytes (18 words) - 19:29, 12 December 2023
  • with the replicator dynamics 2023-07-03 Paper The power of voting and corruption cycles 2022-04-13 Paper Evolutionary dynamics for the generalized Baliga-Maskin...
    10 bytes (16 words) - 22:47, 9 December 2023
  • future decision-makers 2005-08-05 Paper On the cultural transmission of corruption 2003-04-02 Paper Cycles of aggregate behavior in theory and experiment...
    10 bytes (18 words) - 15:16, 9 December 2023
  • Functional Spaces 2019-06-05 Paper Many Agent Games in Socio-economic Systems: Corruption, Inspection, Coalition Building, Network Growth, Security 2019-05-20 Paper...
    10 bytes (18 words) - 08:11, 9 December 2023
  • Publication Date of Publication Type Corruption and inflation 2002-09-01 Paper A note on the link between income inequality and inflation 1998-07-22 Paper...
    10 bytes (20 words) - 17:12, 13 December 2023
  • Publication Date of Publication Type Can paying politicians well reduce corruption? The effects of wages and uncertainty on electoral competition 2022-09-23...
    10 bytes (18 words) - 20:29, 11 December 2023
  • multiple stable equilibrium levels of corruption 2014-07-27 Paper A dynamic analysis of Schelling's binary corruption model: a competitive equilibrium approach...
    10 bytes (18 words) - 14:19, 8 December 2023
  • High-Dimensional PDEs 2022-03-09 Paper Scalable algorithmic detection of silent data corruption for high-dimensional PDEs 2019-01-29 Paper Fractional Ince equation with...
    10 bytes (18 words) - 01:38, 12 December 2023
  • Publication Date of Publication Type Corruption, growth, and increasing returns to production specialization 2018-09-04 Paper Consumption tax, seigniorage...
    10 bytes (18 words) - 05:05, 13 December 2023
  • Publication Date of Publication Type Corruption, political competition and environmental policy 2005-08-05 Paper Volatility of volatility of financial...
    10 bytes (18 words) - 18:10, 13 December 2023
  • equivalence theorem in the theory of resource extraction 2013-10-24 Paper Corruption, trade and resource conversion 2005-10-27 Paper Nonlinear dynamics in...
    10 bytes (16 words) - 16:53, 11 December 2023
  • Private Information in Auctions 2010-08-03 Paper Organized vs. competitive corruption 2002-09-03 Paper Heterogeneity-promoting optimal procurement. 2000-06-04...
    10 bytes (18 words) - 16:59, 11 December 2023
  • sums of independent binomials with different parameters 2017-11-09 Paper Corruption across countries and regions: some consequences of local osmosis 2009-07-01...
    10 bytes (18 words) - 17:04, 9 December 2023
  • CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system 2018-10-10 Paper Hybrid multiplicative...
    10 bytes (17 words) - 10:28, 9 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)