We de…ne feasible, posterior individually rational solutions for twoperson Bayesian games with a single informed player. Such a solution can be achieved by direct signalling fro...
In Aumann (1995) and Aumann (1998), time is assumed implicitly in the description of games of perfect information, and it is part of the epistemic distinction between ex-ante and e...
We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over ...
Updating a concept lattice when introducing new objects to input data can be done by any of the so-called incremental algorithms for computing concept lattice of the data. The algo...
The second order formal context is a formal context such that its object and attribute sets are disjoint unions of object and attribute sets of external formal contexts. Every subs...
: With the popularity of the Android platform, more and more hackers take the Android platform as the profitable target. Android provides a risk communication defence mechanism aga...
This paper presents two interactive visualization tools for learning management systems (LMS) in order to improve learning and teaching in online courses. The first tool was devel...