Formal Models of Verification

  • Rudolf Avenhaus
  • Morton Canty
Conference paper


Nash Equilibrium False Alarm Extensive Form Equilibrium Strategy Illegal Activity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    J. Nash (1951): Non-cooperative games, Ann. of Math. 54, 286–295.CrossRefGoogle Scholar
  2. 2.
    R. Myerson (1997): Game Theory-Analysis of Conflict, Harvard University Press, Cambridge MA.Google Scholar
  3. 3.
    F. F. Zagare and D. M. Kilgour (2000): Perfect Deterrence, Cambridge University Press.Google Scholar
  4. 4.
    J. Sanborn (2001): Considerations regarding the scheduling of unannounced random inspections, Proceedings of the IAEA Symposium on International Safeguards, Vienna, IAEA-SM-367/12/07, CD-ROM.Google Scholar
  5. 5.
    M. J. Canty, D. Rothenstein, R. Avenhaus (2001): Timely inspection and deterrence, European Journal of Operational Research 131, 108–223.Google Scholar
  6. 6.
    R. Avenhaus and M. J. Canty, (2005): Playing for time: A sequential inspection game, European Journal of Operational Research 167, 475–492.CrossRefGoogle Scholar
  7. 7.
    R. Avenhaus and M. J. Canty (1996): Compliance Quantified: An Introduction to Data Verification, Cambridge University Press.Google Scholar
  8. 8.
    IAEA (1997): Model Protocol Additional to the Agreement(s) between the State(s) and the International Atomic Energy Agency for the Application of Safeguards, INFCIRC/540 (Corrected).Google Scholar
  9. 9.
    A. Krass (1985): Verification: How much is enough?, Taylor and Francis, London and Philadelphia.Google Scholar
  10. 10.
    H. Raiffa (1991): Contributions of system analysis to international negotiation, in International Negotiations-Analysis, Approaches, Issues, V. Kremenyuk (Ed.), Jossey Bass Publishers, San Francisco.Google Scholar

Copyright information

© Springer Berlin · Heidelberg 2006

Authors and Affiliations

  • Rudolf Avenhaus
    • 1
  • Morton Canty
    • 2
  1. 1.Universität der Bundeswehr MünchenGermany
  2. 2.Research Centre JülichSystems Analysis and Technology Evaluation (STE)JülichGermany

Personalised recommendations