Formal Models of Verification
KeywordsNash Equilibrium False Alarm Extensive Form Equilibrium Strategy Illegal Activity
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- 2.R. Myerson (1997): Game Theory-Analysis of Conflict, Harvard University Press, Cambridge MA.Google Scholar
- 3.F. F. Zagare and D. M. Kilgour (2000): Perfect Deterrence, Cambridge University Press.Google Scholar
- 4.J. Sanborn (2001): Considerations regarding the scheduling of unannounced random inspections, Proceedings of the IAEA Symposium on International Safeguards, Vienna, IAEA-SM-367/12/07, CD-ROM.Google Scholar
- 5.M. J. Canty, D. Rothenstein, R. Avenhaus (2001): Timely inspection and deterrence, European Journal of Operational Research 131, 108–223.Google Scholar
- 7.R. Avenhaus and M. J. Canty (1996): Compliance Quantified: An Introduction to Data Verification, Cambridge University Press.Google Scholar
- 8.IAEA (1997): Model Protocol Additional to the Agreement(s) between the State(s) and the International Atomic Energy Agency for the Application of Safeguards, INFCIRC/540 (Corrected).Google Scholar
- 9.A. Krass (1985): Verification: How much is enough?, Taylor and Francis, London and Philadelphia.Google Scholar
- 10.H. Raiffa (1991): Contributions of system analysis to international negotiation, in International Negotiations-Analysis, Approaches, Issues, V. Kremenyuk (Ed.), Jossey Bass Publishers, San Francisco.Google Scholar
© Springer Berlin · Heidelberg 2006