Skip to main content

Showing 1–5 of 5 results for author: Frick, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.06312  [pdf, ps, other

    econ.TH cs.GT

    Multidimensional Screening with Rich Consumer Data

    Authors: Mira Frick, Ryota Iijima, Yuhta Ishii

    Abstract: A multi-product monopolist faces a buyer who is privately informed about his valuations for the goods. As is well-known, optimal mechanisms are in general complicated, while simple mechanisms -- such as pure bundling or separate sales -- can be far from optimal and do not admit clear-cut comparisons. We show that this changes if the monopolist observes sufficiently rich data about the buyer's valu… ▽ More

    Submitted 9 November, 2024; originally announced November 2024.

  2. arXiv:2312.16789  [pdf, ps, other

    econ.TH cs.GT

    Monitoring with Rich Data

    Authors: Mira Frick, Ryota Iijima, Yuhta Ishii

    Abstract: We consider moral hazard problems where a principal has access to rich monitoring data about an agent's action. Rather than focusing on optimal contracts (which are known to in general be complicated), we characterize the optimal rate at which the principal's payoffs can converge to the first-best payoff as the amount of data grows large. Our main result suggests a novel rationale for the widely o… ▽ More

    Submitted 2 July, 2024; v1 submitted 27 December, 2023; originally announced December 2023.

  3. arXiv:2310.00654  [pdf, other

    cs.CR cs.IR

    Streamlining Attack Tree Generation: A Fragment-Based Approach

    Authors: Irdin Pekaric, Markus Frick, Jubril Gbolahan Adigun, Raffaela Groner, Thomas Witte, Alexander Raschke, Michael Felderer, Matthias Tichy

    Abstract: Attack graphs are a tool for analyzing security vulnerabilities that capture different and prospective attacks on a system. As a threat modeling tool, it shows possible paths that an attacker can exploit to achieve a particular goal. However, due to the large number of vulnerabilities that are published on a daily basis, they have the potential to rapidly expand in size. Consequently, this necessi… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

    Comments: To appear at the 57th Hawaii International Conference on Social Systems (HICSS-57), Honolulu, Hawaii. 2024

  4. Model-Based Generation of Attack-Fault Trees

    Authors: Raffaela Groner, Thomas Witte, Alexander Raschke, Sophie Hirn, Irdin Pekaric, Markus Frick, Matthias Tichy, Michael Felderer

    Abstract: Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security. Manually creating a complete AFT for the whole system is, however, a daunting task.… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  5. arXiv:cs/0004007  [pdf, ps, other

    cs.DS cs.CC cs.DB

    Deciding first-order properties of locally tree-decomposable structures

    Authors: Markus Frick, Martin Grohe

    Abstract: We introduce the concept of a class of graphs, or more generally, relational structures, being locally tree-decomposable. There are numerous examples of locally tree-decomposable classes, among them the class of planar graphs and all classes of bounded valence or of bounded tree-width. We also consider a slightly more general concept of a class of structures having bounded local tree-width. We… ▽ More

    Submitted 17 April, 2000; originally announced April 2000.

    ACM Class: F.2.2; G.2.2; H.2.4; F.1.3