<--- Back to Details
First PageDocument Content
Game theory / Economy / Economics / Academia / Contract theory / Risk aversion / Expected utility hypothesis / Inequity aversion / Utility / Behavioral economics / Mechanism design / Mathematical optimization
Date: 2015-01-15 07:00:37
Game theory
Economy
Economics
Academia
Contract theory
Risk aversion
Expected utility hypothesis
Inequity aversion
Utility
Behavioral economics
Mechanism design
Mathematical optimization

Behavioral Contract Theory

Add to Reading List

Source URL: www.personal.ceu.hu

Download Document from Source Website

File Size: 1,03 MB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Blockchains / Concurrent computing / Numismatics / Distributed computing / Kin / Decentralized application / Token coin / Token

ESS Token Utility and Functions There are a number of key functions that ESS will enable, with additional functionality added in as the Essentia project is developed further. This will occur on an incremental basis, with

DocID: 1xVIa - View Document

Cryptocurrencies / Numismatics / Communication / Forward-looking statement / Kin / Token coin / Economy / Distributed computing

VARcrypt.io Utility Token Sale Event www.VARcoin.io

DocID: 1xUDs - View Document

Computing / Emerging technologies / Information and communications technology / Information / Cryptography / Ambient intelligence / Internet of things / Cryptocurrencies / Blockchain / MQTT / Computer security / Enhanced privacy ID

< Project Highlights > Staking Utility

DocID: 1xUa7 - View Document

Theoretical computer science / Logic in computer science / Logic programming / Mathematics / Mathematical logic / Fluent / Situation calculus / Event calculus / Utility / Artificial neural network / Robotics / Robot

Learning Human Utility from Video Demonstrations for Deductive Planning in Robotics Nishant Shukla, Yunzhong He, Frank Chen, and Song-Chun Zhu Center for Vision, Cognition, Learning, and Autonomy University of California

DocID: 1xU6D - View Document

Cybercrime / Cyberwarfare / Computer security / Security / National security / Cyberattacks / Cyberterrorism / Internet privacy / Social networking service / Stuxnet / Risk / Strategic management

Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

DocID: 1xU62 - View Document