201 resultados para Hiding-proofness
Resumo:
In this paper, we design the optimal contract when two agents can collude under asymmetric information. They have correlated types, produce complementary inputs and are protected by limited liability. Therefore, a joint manipulation of reports allows them to internalize informational and productive externalities. We show that by taking advantage of the transaction costs created by asymmetric information, even though they collude, the principal can achieve the outcome without collusion regardless of the sign and the degree of correlation. In particular, the principal can implement a non-monotonic quantity schedule in a collusion-proof way while this is impossible if collusion occurs under complete information.
Resumo:
[eng] A multi-sided Böhm-Bawerk assignment game (Tejada, to appear) is a model for a multilateral market with a finite number of perfectly complementary indivisible commodities owned by different sellers, and inflexible demand and support functions. We show that for each such market game there is a unique vector of competitive prices for the commodities that is vertical syndication-proof, in the sense that, at those prices, syndication of sellers each owning a different commodity is neither beneficial nor detrimental for the buyers. Since, moreover, the benefits obtained by the agents at those prices correspond to the nucleolus of the market game, we provide a syndication-based foundation for the nucleolus as an appropriate solution concept for market games. For different solution concepts a syndicate can be disadvantageous and there is no escape to Aumman’s paradox (Aumann, 1973). We further show that vertical syndicationproofness and horizontal syndication-proofness – in which sellers of the same commodity collude – are incompatible requirements under some mild assumptions. Our results build on a self-interesting link between multi-sided Böhm-Bawerk assignment games and bankruptcy games (O’Neill, 1982). We identify a particular subset of Böhm-Bawerk assignment games and we show that it is isomorphic to the whole class of bankruptcy games. This isomorphism enables us to show the uniqueness of the vector of vertical syndication-proof prices for the whole class of Böhm-Bawerk assignment market using well-known results of bankruptcy problems.
Resumo:
Objectives This paper reports on a longitudinal qualitative study exploring concerns of 60 patients before and after transplantation. Methods Semi-structured interviews were conducted without time constraints in a protected space out of the hospital. Qualitative analysis was performed. Results Prior to transplantation, all patients talked freely about negative feelings, stigmatisation, being misunderstood by others, loneliness and culpability caused by increasing physical dependency or abandoned roles. They mentioned alternative ways to cope (magic, spirituality), and even expressed their right to let go. In a subset of 13 patients, significant ones allowed themselves in the interview, or were integrated on the request of the patients. In this modified setting, two illness-worlds were confronted. If common themes were mentioned (e.g., modified life plans, restricted space, physical and psychological barriers), they were experienced differently. Fear of transplantation or guilt towards the donors was overtly expressed, often for the first time. Mutual hiding of anxiety in order to protect loved ones or to prevent loss of control was disclosed. The significant ones talked about accumulated stress and exhaustion related to the physical degradation of the patient, fear of the unpredictable evolution of illness and financial problems, and stressed their difficulty to adapt adequately to the fluctuating state of the patient. After transplantation, other themes emerged, where difficulty in disclosure was observed: intensive care and near death experiences, being a transplanted person, debt to the donor and his/her family, fear of rejection. Conclusions With the self-imposed strategy of hiding concerns to protect one another, a discrepancy between two illness-worlds was created. When concerns were confronted during the interviews, a new mutual understanding emerged. Patients and their families stated the need for sharing concerns in the course of illness.
Resumo:
[eng] A multi-sided Böhm-Bawerk assignment game (Tejada, to appear) is a model for a multilateral market with a finite number of perfectly complementary indivisible commodities owned by different sellers, and inflexible demand and support functions. We show that for each such market game there is a unique vector of competitive prices for the commodities that is vertical syndication-proof, in the sense that, at those prices, syndication of sellers each owning a different commodity is neither beneficial nor detrimental for the buyers. Since, moreover, the benefits obtained by the agents at those prices correspond to the nucleolus of the market game, we provide a syndication-based foundation for the nucleolus as an appropriate solution concept for market games. For different solution concepts a syndicate can be disadvantageous and there is no escape to Aumman’s paradox (Aumann, 1973). We further show that vertical syndicationproofness and horizontal syndication-proofness – in which sellers of the same commodity collude – are incompatible requirements under some mild assumptions. Our results build on a self-interesting link between multi-sided Böhm-Bawerk assignment games and bankruptcy games (O’Neill, 1982). We identify a particular subset of Böhm-Bawerk assignment games and we show that it is isomorphic to the whole class of bankruptcy games. This isomorphism enables us to show the uniqueness of the vector of vertical syndication-proof prices for the whole class of Böhm-Bawerk assignment market using well-known results of bankruptcy problems.
Resumo:
This letter presents a lossless data hiding scheme for digital images which uses an edge detector to locate plain areas for embedding. The proposed method takes advantage of the well-known gradient adjacent prediction utilized in image coding. In the suggested scheme, prediction errors and edge values are first computed and then, excluding the edge pixels, prediction error values are slightly modified through shifting the prediction errors to embed data. The aim of proposed scheme is to decrease the amount of modified pixels to improve transparency by keeping edge pixel values of the image. The experimental results have demonstrated that the proposed method is capable of hiding more secret data than the known techniques at the same PSNR, thus proving that using edge detector to locate plain areas for lossless data embedding can enhance the performance in terms of data embedding rate versus the PSNR of marked images with respect to original image.
Resumo:
Nykyaikaiset Java-teknologiaa sisältävät matkapuhelimet kehittyvät vauhdikkaasti prosessoritehon, muistin määrän sekä uusien käyttöjärjestelmäversioiden tarjoamien ominaisuuksien myötä. Laitteiden näyttöjen koko tulee pysymään pienenä,mutta silti moninaista multimediasisältöä äänen, videon ja kuvan osilta voidaanhuomattavasti parantaa JSR 234:n eli kehittyneen multimedialaajennuksen avulla.Erityisesti edistyneet ääniominaisuudet ovat tervetullut lisä, sillä viime aikojen kehitys matkapuhelimissa on saanut aikaan niiden muuntumisen myös kannettavaksi musiikkisoittimiksi. Diplomityössä JSR 234 -spesifikaation tietty osa kehitettiin ympäristössä, joka koostui Series 60 -ohjelmistoalustankolmannesta versiosta sekä Symbian OS v9.1 käyttöjärjestelmästä. Tuloksena syntynyt Java-rajapinta tarjoaa sovelluskehittäjille yksinkertaisemman lähestymistavan Symbianin efektirajapintaan piilottaen samalla alla olevan käyttöjärjestelmänmonimutkaisuuden. Toteutuksen täytyy olla läpikotaisin testattu, jotta voidaan varmentua sen noudattavan tarkkaan JSR 234 -spesifikaatiota. Työssä on esitelty useita eri testausmenetelmiä tarkoituksena saavuttaa projektissa paras mahdollinen laatu.
Resumo:
Abstract: This book studies several mythical motifs, found in the Veda (especially in the Ùgveda) on the one hand and in one or both Sanskrit epics on the other: Agni's hiding, the theft of the Soma, Indra's rape of Ahalyå, Upamanyu's salvation by the Aßvins, and finally the representation of the Great War of the Mahåbhårata as a sacrifice. While it is often said that the subsequent Indian literature only paid "lipservice" to the Vedas without really knowing and even less understanding these texts, the present study not only shows that many Vedic myths are still kept alive in the Epics, but more importantly that their deep underlying meaning was perfectly understood by the epic mythmakers, and reactualized to fit the changed religious conditions of epic times. Résumé: Descriptif du livre Ce livre étudie plusieur motifs mythologiques qui se trouvent à la fois dans les Vedas (et spécialement dans le Ùgveda), et dans l'une ou l'autre des grandes épopées sanskrites, le Mahåbhårata et le Råmåyana. Ces motifs sont: la disparition d'Agni, le rapt du Soma, le viol d'Ahalyå par Indra, le sauvetage d'Upamanyu par les Aßvins, et enfin, la représentation de la grande guerre du Mahåbhårata comme un rite sacrificiel. On maintient souvent que la littérature plus tardive ne fait référence aux Vedas que pour la forme, sans pour autant réellement connaître et encore moins comprendre ces textes. Mais la présente étude montre tout au contraire que non seulement beaucoup de mythes védiques se retrouvent dans les épopées, mais encore ? ce qui est plus important ? que les mythographes de l'épopée avaient parfaitement compris leur sens profond, et l'avaient réactualisé pour répondre aux changements religieux de l'époque épique.
Resumo:
En 2008 y en dos ocasiones, la Sala Primera del Tribunal Supremo ha resuelto la cuestión relativa a si el propietario de una finca, la cual había contaminado como consecuencia del desarrollo de su actividad industrial y había vendido ocultando esta circunstancia, es responsable extracontractualmente frente al tercer adquirente por los daños económicos sufridos. En la primera Sentencia, de 29.10.2008, el Tribunal Supremo condena al contaminador por responsabilidad extracontractual. En la segunda, de 22.12.2008, el Tribunal Supremo absuelve a éste de la responsabilidad extracontracual porqué los daños fueron causados a una finca propia.
Resumo:
The use of data visualization in history leads to contradictory reactions: some are fascinated by its heuristic potential and forget their critical faculties while others reject this practice, suspecting it of hiding explanatory weaknesses. This paper proposes a distinction between demonstration visualization and research visualization, reminding that scholars should not only use data visualization for communication purposes, but also for the research itself. It is particularly in its more complex form that this research visualization category will be approached here: network analysis.
Resumo:
Borrelia burgdorferi infektoitujen hiirten antibioottihoidon jälkeinen oireilu Lymen borrelioosi on puutiaisten välittämä monimuotoinen infektiotauti, jonka tunnetuin oire on ns. vaeltava ihottuma eli erythema migrans. Muita tavallisia ilmentymiä ovat erityisesti nivel- ja hermosto-oireet sekä harvemmin sydän- ja silmäoireet. Suurin osa potilaista paranee täysin terveeksi antibioottihoidon avulla, mutta jopa 10 % borrelioosiin sairastuneista oireilee suositusten mukaisesta hoidosta huolimatta. Pitkittyneen oireilun on ajateltu johtuvan mm. infektion laukaisemasta autoimmuunitaudista tai kroonisesta infektiosta, mutta teorioiden tueksi ei ole kyetty esittämään kiistattomia todisteita. Onkin todennäköistä, että antibioottihoidon jälkeisen oireilun takana on useampia mekanismeja eikä yksi teoria selitä kaikkien potilaiden oireilua. Tässä väitöskirjatyössä on tutkittu hoidonjälkeistä borrelioosia hiirimallin avulla. Varhaisvaiheessa (2 viikkoa infektoinnin jälkeen) annettu antibiootti vähensi hiirten nivelturvotusta ja esti B. burgdorferi – bakteerin kasvun kudoksista otetuista näytteissä. Hoidettu¬jen hiirten B. burgdorferi -spesifiset IgG-luokan vasta-aineet pysyivät kuitenkin koholla ja osasta kudosnäytteistä löytyi B. burgdorferi:n DNA:ta PCR-tutkimuksen avulla. Mikäli hiiret hoidettiin myöhäisessä vaiheessa (yli 18 viikkoa infektoinnista) tulokset olivat muuten samanlaiset, mutta keftriaksoni ei vaikuttanut nivelturvotukseen. Näin hiirissä oli aikaansaatu tilanne, joka on hyvin samankaltainen ihmisen hoitoresistentin borrelia-artriitin kanssa: oireet jatkuvat, mutta taudinaiheuttajaa ei saada esiin. Inflammaatiota vaimentavaa anti-TNF-alphaa on käytetty nivelreuman hoidossa menestyksekkäästi huonosti muuhun hoitoon reagoivilla potilailla ja siitä syystä sen ajateltiin voivan vaikuttaa suotuisasti myös B. burgdorferi -infektoitujen hiirten hoidonjälkeiseen nivelturvotukseen. Sillä ei kuitenkaan ollut vaikutusta nivelturvotukseen, mutta yllättäen hoidon jälkeen osa hiirten kudosnäytteistä osoittautui viljelypositiivisiksi. On siis ilmeistä, että hiirimallissamme osa B. burgdorferi spirokeetoista pystyy välttämään keftriaksonihoidon vaikutuksen joko hakeutumalla elimistössä kudokseen, jossa antibiootin pitoisuus ei nouse riittävän korkeaksi, tai ne kykenevät muuntautumaan metabolisesti inaktiiviin tilaan eikä mikrobilääke yhdessä immuunipuolustuksen kanssa onnistu tappamaan niitä. Jatkotutkimuksissa selvitimme B. burgdorferi - spirokeetan mahdollista piilopaikkaa tutkimalla antibioottihoidon jälkeen useita eri kudoksia PCR-menetelmällä. Tulosten perusteella spirokeetta näyttää suosivan nivelkudosta tai soluja, joita esiintyy nivelessä runsaasti. On kuitenkin edelleen epäselvää, missä muodossa B. burgdorferi –spirokeetat säilyvät kudoksessa antibioottihoidon jälkeen.
Resumo:
This thesis is done as a complementary part for the active magnet bearing (AMB) control software development project in Lappeenranta University of Technology. The main focus of the thesis is to examine an idea of a real-time operating system (RTOS) framework that operates in a dedicated digital signal processor (DSP) environment. General use real-time operating systems do not necessarily provide sufficient platform for periodic control algorithm utilisation. In addition, application program interfaces found in real-time operating systems are commonly non-existent or provided as chip-support libraries, thus hindering platform independent software development. Hence, two divergent real-time operating systems and additional periodic extension software with the framework design are examined to find solutions for the research problems. The research is discharged by; tracing the selected real-time operating system, formulating requirements for the system, and designing the real-time operating system framework (OSFW). The OSFW is formed by programming the framework and conjoining the outcome with the RTOS and the periodic extension. The system is tested and functionality of the software is evaluated in theoretical context of the Rate Monotonic Scheduling (RMS) theory. The performance of the OSFW and substance of the approach are discussed in contrast to the research theme. The findings of the thesis demonstrates that the forged real-time operating system framework is a viable groundwork solution for periodic control applications.
Resumo:
Steganography is an information hiding application which aims tohide secret data imperceptibly into a cover object. In this paper, we describe anovel coding method based on Z2Z4-additive codes in which data is embeddedby distorting each cover symbol by one unit at most (+-1-steganography). Thismethod is optimal and solves the problem encountered by the most e cientmethods known today, concerning the treatment of boundary values. Theperformance of this new technique is compared with that of the mentionedmethods and with the well-known rate-distortion upper bound to conclude thata higher payload can be obtained for a given distortion by using the proposedmethod.
Resumo:
The poster will introduce creative practices(art, design, film, video, photography, performance…) which infiltrate in the media and cultural institutions, wiping out momentarily its artistic appearance, hiding or camouflaging, to promote the questioning of certain aspects of contemporary communication and artistic praxis. These practices(labeled as fakes, pranks, mockumentaries, artivism) are mostly intended to criticize and alert about the current status of the authoritative image dominated by discourses of objectivity, participation and excellency.
Resumo:
The role of behavior in evolution remains controversial, despite that some ideas are over 100 years old. Changes in behavior are generally believed to enhance evolution by exposing individuals to new selective pressures and by facilitating range expansions. However, this hypothesis lacks firm empirical evidence. Moreover, behavioral changes can also inhibit evolution by hiding heritable variation from natural selection. Taking advantage of the complete phylogeny of extant birds, a new species-level measure of past diversification rate and the best existing measures of brain size (n = 1326 species), I show here that relative brain size is associated (albeit weakly) with diversification rates. Assuming that brain relative size reflects behavioral flexibility, an assumption well-supported by evidence, this finding supports the idea that behavior can enhance evolutionary diversification. This view is further supported by the discovery that the most important factor influencing diversification rates is ecological generalism, which is believed to require behavioral flexibility. Thus, behavioral changes that expose animals to a variety of environments can have played an important role in the evolution of birds.
Resumo:
A former study with scenarios conducted in Hawaii has suggested that humans share with non-human mammals the same basic defensive strategies - risk assessment, freezing, defensive threat, defensive attack, and flight. The selection of the most adaptive strategy is strongly influenced by features of the threat stimulus - magnitude, escapability, distance, ambiguity, and availability of a hiding place. Aiming at verifying if these strategies would be consistent in a different culture, 12 defensive scenarios were translated into Portuguese and adapted to the Brazilian culture. The sample consisted of male and female undergraduate students divided into two groups: 76 students, who evaluated the five dimensions of each scenario and 248 medical students, who chose the most likely response for each scenario. In agreement with the findings from studies of non-human mammal species, the scenarios were able to elicit different defensive behavioral responses, depending on features of the threat. "Flight" was chosen as the most likely response in scenarios evaluated as an unambiguous and intense threat, but with an available route of escape, whereas "attack" was chosen in an unambiguous, intense and close dangerous situation without an escape route. Less urgent behaviors, such as "check out", were chosen in scenarios evaluated as less intense, more distant and more ambiguous. Moreover, the results from the Brazilian sample were similar to the results obtained in the original study with Hawaiian students. These data suggest that a basic repertoire of defensive strategies is conserved along the mammalian evolution because they share similar functional benefits in maintaining fitness.