A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Solution Models based on Symmetric and Asymmetric Information
2019
Symmetry
We invited authors to submit their theoretical or experimental research presenting engineering and economic problem solution models dealing with the symmetry or asymmetry of different types of information ...
The authors proposed different solution models as integrated tools to find a balance between the components of sustainable global development, i.e., to find a symmetry axis concerning goals, risks, and ...
Acknowledgments: The authors express their gratitude to the journal Symmetry for offering an academic platform for researchers to contribute and exchange their recent findings in civil engineering and ...
doi:10.3390/sym11040500
fatcat:di4ztqi7s5chdkyjrczsq4zhry
Numerical Studies on Reformulation Techniques for Continuous Network Design with Asymmetric User Equilibria
2010
International Journal of Operations Research and Information Systems
For formal definitions of symmetric and asymmetric UEs, one can refer to Patriksson (1994, equation 2.44). ...
Nevertheless, the model was based on the symmetry assumption on the lower-level UE problem. ...
doi:10.4018/joris.2010101304
fatcat:lzafktkzxffsnjinwj3gqt2tby
Asymmetric Information Supply Chain Models with Credit Option
2013
Industrial Engineering & Management Systems
Usually, a credit option policy is proposed by the seller, and often under a symmetric information environment where members have complete information on each others' operations. ...
The proposed model in both scenarios will be investigated under an asymmetric information structure where some information are private and are only known to the individual who has knowledge of this information ...
Esmaeili et al. (2009) introduced several game-theoretic supply chain models based on symmetric information game, and these were later extended to an asymmetric information scenario in Esmaeili and Zeephongsekul ...
doi:10.7232/iems.2013.12.3.264
fatcat:mwmnkgnsq5cvblwt5q2te64epy
Symmetric and Asymmetric Data in Solution Models
2021
Symmetry
This Special Issue covers symmetric and asymmetric data that occur in real-life problems. ...
We invited authors to submit their theoretical or experimental research to present engineering and economic problem solution models that deal with symmetry or asymmetry of different data types. ...
Simple symmetrical geometry shapes are safer, more efficient, and more predictable than asymmetrical ones [27] . ...
doi:10.3390/sym13061045
fatcat:azojrmaseffp5o75gtzxfehr3a
Prevalence of asymmetrical rupture in small earthquakes and its effect on the estimation of stress drop: a systematic investigation in inland Japan
2019
Geoscience Letters
The stress drops of the earthquakes estimated by considering asymmetrical rupture propagation were 16.8 MPa, which are almost twice the estimates based on the commonly used symmetrical rupture model. ...
The prevailing rupture directivity can provide useful information on source parameters including the fault size, fault geometry, and rupture velocity of small earthquakes. ...
I thank the following individuals for providing comments on the first draft of the manuscript: Tatsuhiko Saito, Taka'aki Taira, Ryota Takagi, and Yoshiaki Matsumoto. ...
doi:10.1186/s40562-019-0145-z
fatcat:c4d62xg3n5fphnbvk5hcam7uhy
Dimension Transform Based Efficient Event Filtering for Symmetric Publish/Subscribe System
[chapter]
2005
Lecture Notes in Computer Science
By extending the existing data model and algorithm, we propose an event matching method for symmetric publish/subscribe system based on dimension transform regarding the query in multidimensional space ...
The results show that, our proposal outperforms the other possible solutions in one or two orders of magnitude. ...
The performance difference between MLGF-based solution and UBTree-based solution becomes larger with increasement of Ac's size. ...
doi:10.1007/11546924_77
fatcat:5i4cs6qdcjfrlpb5mpp46ghbwe
SCM Implementation Decisions of Principal-Agent under Asymmetric Information
2019
Open Journal of Applied Sciences
The optimization investment policy decision of SCM-Supply Chain Management-implementation has been analysed under symmetric and asymmetric information conditions. ...
Based upon the principal-agent theory, the models show to what extent a principal (a client) needs to pay more to an agent (a vendor) in a context of asymmetric information. ...
system's construction based on middle-micro scale. ...
doi:10.4236/ojapps.2019.94014
fatcat:ncp2oveqt5hwldmxjsshtl2kw4
A New NSIS Application for LSP Setup with Security Features
2010
2010 IEEE International Conference on Communications
Connection-oriented path setup is becoming one of the key features of the next-generation Internet with the Multi-Protocol Label Switched (MPLS) framework and its generalized version GMPLS addressing the ...
We design an NSIS application called NSIS-LSP which takes advantage of the NSIS transport security features and has own features for application layer authentication. ...
We proposed a new signaling solution based on the NSIS protocol that supports both symmetric and asymmetric key-based mechanisms for mutual authentication between source and all provisioning domains. ...
doi:10.1109/icc.2010.5502672
dblp:conf/icc/PolitoGCJ10
fatcat:7iyqytr3fzdrzgbedjposkcnaq
Cooperative Communication in Cognitive Radio Networks under Asymmetric Information: A Contract-Theory Based Approach
2015
International Journal of Distributed Sensor Networks
The optimal contract design under both symmetric information and asymmetric information is presented based on contract theory. ...
In this paper, the incentive issue between relay nodes' (RNs') service and source's relay selection is investigated in the presence of the asymmetric information scenario. ...
HBSKFMS2014033), and Ph.D. Research Startup Foundation of Hubei University of Technology (no. BSQD13029). ...
doi:10.1155/2015/676195
fatcat:mdiu4qg2h5gfrlljsth4oloigq
Seriation and Multidimensional Scaling: A Data Analysis Approach to Scaling Asymmetric Proximity Matrices
1992
Applied Psychological Measurement
A number of model-based scaling methods have been developed that apply to asymmetric proximity matrices. ...
The MDS solution contains directed distances, which define an "extra" Author's Address Send requests for reprints or further information to ...
Acknowledgments Earlier versions of this work were presented at the meetings of the Psychometric Society in Montreal in 1987 and in Los Angeles in 1988. ...
doi:10.1177/014662169201600201
fatcat:xvzwggyodrdozbfvshy6qke6zy
Assessing the Effects of Symmetry on Motif Discovery and Modeling
2011
PLoS ONE
finding algorithms on both symmetric and asymmetric binding site data. ...
We show that if the true binding site is asymmetric the results are unambiguous and the asymmetric model is clearly superior to the symmetric model. ...
Acknowledgments We thank all members of the Stormo lab for helpful discussions and suggestions regarding this work. We especially thank Mohammed Khan for help with the site sampling program. ...
doi:10.1371/journal.pone.0024908
pmid:21949783
pmcid:PMC3176789
fatcat:gjnadjvhyjh3zh7coons7vjgbq
Crypto Cloud Computing with Symmetric and Asymmetric Cryptography for Information Security and Storage
2020
International journal of recent technology and engineering
Cryptography and crypto cloud computing plays major role in secure transfer and storage of information. ...
The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another. ...
The figure below classifies the cryptographic algorithms based on the key usage and further classifies the type of algorithms as symmetric and asymmetric.
Revised
Fig.2. ...
doi:10.35940/ijrte.d4387.018520
fatcat:meexkeqjvrh7zny2f3xkuwiyky
Effects of imperfect quality items in the asymmetric information structure in supply chain model
2018
Uncertain Supply Chain Management
This paper studies supply chain model of imperfect quality items under asymmetric information in which unit price taken by the buyer and unit marketing expenditure are influencing product's demand. ...
Most of the supply chain models have been developed under symmetric information structure i.e. players have complete knowledge of each other's policies. ...
None of the authors worked on the imperfect quality items in supply chain models with symmetric and asymmetric information structure. ...
doi:10.5267/j.uscm.2017.11.002
fatcat:dlxcgvamx5fs3n7oqh4aztysge
Investment Timing with Incentive-Disincentive Contracts under Asymmetric Information
2012
Technology and Investment
Investment timing is delayed more under asymmetric information than under symmetric information. ...
Consequently, by adopting an enlarged set of incentive-disincentive contracts framework, we showed that there is a relationship between the symmetric and asymmetric information problems. standard real ...
As the penalty becomes sufficiently large, the solution in the disincentive-only region in the asymmetric information model converges to in the symmetric information model developed by MS. ...
doi:10.4236/ti.2012.32011
fatcat:nbw4mjtjmzgkvli6fq3m4wkb6i
Pricing Decisions in Closed-Loop Supply Chains with Peer-Induced Fairness Concerns
2019
Sustainability
with symmetrical and asymmetrical information of fairness concerns, respectively. ...
By considering fairness concerns and selecting Nash bargain solution as the reference point of fairness distribution, this paper studies the equilibrium solution of Stackelberg game models in the CLSC ...
Section 4 establishes a fairness-concerned utility system based on Nash bargain theory and studies the equilibrium solution when there is symmetrical and asymmetrical information. ...
doi:10.3390/su11185071
fatcat:pjjhaynfazbbth33kc3dxw6iuq
« Previous
Showing results 1 — 15 out of 166,985 results