  @prefix epid: <https://pure.iiasa.ac.at/id/> .
  @prefix void: <http://rdfs.org/ns/void#> .
  @prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
  @prefix cc: <http://creativecommons.org/ns#> .
  @prefix ep: <http://eprints.org/ontology/> .
  @prefix eprel: <http://eprints.org/relation/> .
  @prefix doi: <https://doi.org/> .
  @prefix dc: <http://purl.org/dc/elements/1.1/> .
  @prefix bibo: <http://purl.org/ontology/bibo/> .
  @prefix geo: <http://www.w3.org/2003/01/geo/wgs84_pos#> .
  @prefix owl: <http://www.w3.org/2002/07/owl#> .
  @prefix event: <http://purl.org/NET/c4dm/event.owl#> .
  @prefix skos: <http://www.w3.org/2004/02/skos/core#> .
  @prefix foaf: <http://xmlns.com/foaf/0.1/> .
  @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
  @prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
  @prefix dct: <http://purl.org/dc/terms/> .

<>
	foaf:primaryTopic <https://pure.iiasa.ac.at/id/eprint/4754>;
	rdfs:comment "The repository administrator has not yet configured an RDF license."^^xsd:string .

<https://pure.iiasa.ac.at/id/eprint/4754#authors>
	rdf:_1 <https://pure.iiasa.ac.at/id/person/ext-AL0013>;
	rdf:_2 <https://pure.iiasa.ac.at/id/person/ext-1f975f41a5606735e1bc43767c708b36> .

<https://pure.iiasa.ac.at/id/eprint/4754/>
	dc:format "text/html";
	dc:title "HTML Summary of #4754 \n\nCompliance Quantified: An Introduction to Data Verification\n\n";
	foaf:primaryTopic <https://pure.iiasa.ac.at/id/eprint/4754> .

<https://pure.iiasa.ac.at/id/eprint/4754>
	bibo:abstract "International agreements, such as those governing arms control or the environment, virtually always require some degree of verification of information, in order that compliance can be established. To ensure that the verification process can be regarded as efficient, effective and impartial, it is important to have a mathematical model of it. One can be derived by applying methods from statistics and the theory of non-cooperative games, developed in part by John Nash, who received a Nobel prize in 1994 for his work. The methods permit the development of rational verification strategies, as well as such fundamental concepts as guaranteed probability of detection, timeliness of inspections and the deterrence of illegal activity. In this 1996 book, the required theory is introduced gradually in the context of specific real-world examples. The only prerequisites are simple calculus and statistics, so the book should be accessible to a broad range of scientists and non-scientists, in industrial, academic or governmental environments."^^xsd:string;
	bibo:authorList <https://pure.iiasa.ac.at/id/eprint/4754#authors>;
	bibo:isbn "0521553660";
	bibo:status <http://purl.org/ontology/bibo/status/peerReviewed>,
		<http://purl.org/ontology/bibo/status/published>;
	dct:creator <https://pure.iiasa.ac.at/id/person/ext-1f975f41a5606735e1bc43767c708b36>,
		<https://pure.iiasa.ac.at/id/person/ext-AL0013>;
	dct:date "1996";
	dct:isPartOf <https://pure.iiasa.ac.at/id/repository>;
	dct:publisher <https://pure.iiasa.ac.at/id/org/ext-7dc6ac206349427818537421ac9815ec>;
	dct:title "Compliance Quantified: An Introduction to Data Verification"^^xsd:string;
	owl:sameAs <urn:isbn:0521553660>;
	rdf:type bibo:Article,
		bibo:Book,
		ep:BookEPrint,
		ep:EPrint;
	rdfs:seeAlso <https://pure.iiasa.ac.at/id/eprint/4754/> .

<https://pure.iiasa.ac.at/id/org/ext-7dc6ac206349427818537421ac9815ec>
	foaf:name "Cambridge University Press"^^xsd:string;
	rdf:type foaf:Organization .

<https://pure.iiasa.ac.at/id/person/ext-1f975f41a5606735e1bc43767c708b36>
	foaf:familyName "Canty"^^xsd:string;
	foaf:givenName "M."^^xsd:string;
	foaf:name "M. Canty"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/person/ext-AL0013>
	foaf:familyName "Avenhaus"^^xsd:string;
	foaf:givenName "R."^^xsd:string;
	foaf:name "R. Avenhaus"^^xsd:string;
	rdf:type foaf:Person .

