951 resultados para One-shot information theory
Resumo:
Extensive field and experimental evidence in a variety of environments show that behavior depends on a reference point. This paper provides an axiomatic characterization of this dependence. We proceed by imposing gradually more structure on both choice correspondences and preference relations, requiring increasingly higher levels of rationality, and freeing the decision-maker from certain types of inconsistencies. The appropriate degree of behavioral structure will depend on the phenomenon that is to be modeled. Lastly, we provide two applications of our work: one to model the status-quo bias, and another to model addictive behavior.
Resumo:
Technological developments in the information society bring new challenges, both to the applicability and to the enforceability of the law. One major challenge is posed by new entities such as pseudonyms, avatars, and software agents that operate at an increasing distance from the physical persons "behind" them (the "principal"). In case of accidents or misbehavior, current laws require that the physical or legal principal behind the entity be found so that she can be held to account. This may be problematic if the linkability of the principal and the operating entity is questionable. In light of the ongoing developments in electronic agents, there is sufficient reason to conduct a review of the literature in order to more closely examine arguments for and against legal personhood for some nonhuman acting entities. This article also includes a discussion of alternative approaches to solving the "accountability gap."
Resumo:
In some markets, such as the market for drugs or for financial services, sellers have better information than buyersregarding the matching between the buyer's needs and the good's actual characteristics. Depending on the market structure,this may lead to conflicts of interest and/or the underprovision of information by the seller. This paper studies this issuein the market for financial services. The analysis presents a new model of competition between banks, as banks' pricecompetition influences the ensuing incentives for truthful information revelation. We compare two different firm structures,specialized banking, where financial institutions provide a unique financial product, and one-stop banking, where a financialinstitution is able to provide several financial products which are horizontally differentiated. We show first that, althoughconflicts of interest may prevent information disclosure under monopoly, competition forces full information provision forsufficiently high reputation costs. Second, in the presence of market power, one-stop banks will use information strategicallyto increase product differentiation and therefore will always provide reliable information and charge higher rices thanspecialized banks, thus providing a new justification for the creation of one-stop banks. Finally, we show that, ifindependent financial advisers are able to provide reliable information, this increases product differentiation and thereforemarket power, so that it is in the interest of financial intermediaries to promote external independent financial advice.
Resumo:
We analyze the implications of a market imperfection related to the inability to establish intellectual property rights, that we label {\it unverifiable communication}. Employees are able to collude with external parties selling ``knowledge capital'' of the firm. The firm organizer engages in strategic interaction simultaneously with employees and competitors, as she introduces endogenous transaction costs in the market for information between those agents. Incentive schemes and communication costs are the key strategic variables used by the firm to induce frictions in collusive markets. Unverifiable communication introduces severe allocative distortions, both at internal product development and at intended sale of information (technology transfer). We derive implications of the model for observable decisions like characteristics of the employment relationship (full employment, incompatibility with other jobs), firms' preferences over cluster characteristics for location decisions, optimal size at entry, in--house development vs sale strategies for innovations and industry evolution.
Resumo:
Portfolio and stochastic discount factor (SDF) frontiers are usually regarded as dual objects, and researchers sometimes use one to answer questions about the other. However, the introduction of conditioning information and active portfolio strategies alters this relationship. For instance, the unconditional portfolio frontier in Hansen and Richard (1987) is not dual to the unconditional SDF frontier in Gallant, Hansen and Tauchen (1990). We characterise the dual objects to those frontiers, and relate them to the frontiers generated with managed portfolios, which are commonly used in empirical work. We also study the implications of a safe asset and other special cases.
Resumo:
This paper presents a tractable dynamic general equilibrium model thatcan explain cross-country empirical regularities in geographical mobility,unemployment and labor market institutions. Rational agents vote overunemployment insurance (UI), taking the dynamic distortionary effects ofinsurance on the performance of the labor market into consideration.Agents with higher cost of moving, i.e., more attached to their currentlocation, prefer more generous UI. The key assumption is that an agent'sattachment to a location increases the longer she has resided there. UIreduces the incentive for labor mobility and increases, therefore, thefraction of attached agents and the political support for UI. The mainresult is that this self-reinforcing mechanism can give rise to multiplesteady-states-one 'European' steady-state featuring high unemployment,low geographical mobility and high unemployment insurance, and one'American' steady-state featuring low unemployment, high mobility andlow unemployment insurance.
Endogeneous matching in university-industry collaboration: Theory and empirical evidence from the UK
Resumo:
We develop a two-sided matching model to analyze collaboration between heterogeneousacademics and firms. We predict a positive assortative matching in terms of both scientificability and affinity for type of research, but negative assortative in terms of ability on one sideand affinity in the other. In addition, the most able and most applied academics and the mostable and most basic firms shall collaborate rather than stay independent. Our predictionsreceive strong support from the analysis of the teams of academics and firms that proposeresearch projects to the UK's Engineering and Physical Sciences Research Council.
Resumo:
This article builds on the recent policy diffusion literature and attempts to overcome one of its major problems, namely the lack of a coherent theoretical framework. The literature defines policy diffusion as a process where policy choices are interdependent, and identifies several diffusion mechanisms that specify the link between the policy choices of the various actors. As these mechanisms are grounded in different theories, theoretical accounts of diffusion currently have little internal coherence. In this article we put forward an expected-utility model of policy change that is able to subsume all the diffusion mechanisms. We argue that the expected utility of a policy depends on both its effectiveness and the payoffs it yields, and we show that the various diffusion mechanisms operate by altering these two parameters. Each mechanism affects one of the two parameters, and does so in distinct ways. To account for aggregate patterns of diffusion, we embed our model in a simple threshold model of diffusion. Given the high complexity of the process that results, strong analytical conclusions on aggregate patterns cannot be drawn without more extensive analysis which is beyond the scope of this article. However, preliminary considerations indicate that a wide range of diffusion processes may exist and that convergence is only one possible outcome.
Resumo:
In recent years there has been an explosive growth in the development of adaptive and data driven methods. One of the efficient and data-driven approaches is based on statistical learning theory (Vapnik 1998). The theory is based on Structural Risk Minimisation (SRM) principle and has a solid statistical background. When applying SRM we are trying not only to reduce training error ? to fit the available data with a model, but also to reduce the complexity of the model and to reduce generalisation error. Many nonlinear learning procedures recently developed in neural networks and statistics can be understood and interpreted in terms of the structural risk minimisation inductive principle. A recent methodology based on SRM is called Support Vector Machines (SVM). At present SLT is still under intensive development and SVM find new areas of application (www.kernel-machines.org). SVM develop robust and non linear data models with excellent generalisation abilities that is very important both for monitoring and forecasting. SVM are extremely good when input space is high dimensional and training data set i not big enough to develop corresponding nonlinear model. Moreover, SVM use only support vectors to derive decision boundaries. It opens a way to sampling optimization, estimation of noise in data, quantification of data redundancy etc. Presentation of SVM for spatially distributed data is given in (Kanevski and Maignan 2004).
Resumo:
Some models of sexual selection predict that individuals vary in their genetic quality and reveal some of this variation in their secondary sexual characteristics. Alpine whitefish (Coregonus sp.) develop breeding tubercles shortly before their spawning season. These tubercles are epidermal structures that are distributed regularly along the body sides of both males and females. There is still much unexplained variation in the size of breeding tubercles within both sexes and with much overlap between the sexes. It has been suggested that breeding tubercles function to maintain body contact between the mating partners during spawning, act as weapons for defence of spawning territories, or are sexual signals that reveal aspects of genetic quality. We took two samples of whitefish from their spawning place, one at the beginning and one around the peak of spawning season. We found that females have on average smaller breeding tubercles than males, and that tubercle size partly reveals the stage of gonad maturation. Two independent full-factorial breeding experiments revealed that embryo mortality was significantly influenced by male and female effects. This finding demonstrates that the males differed in their genetic quality (because offspring get nothing but genes from their fathers). Tubercle size was negatively linked to some aspects of embryo mortality in the first breeding experiment but not significantly so in the second. This lack of consistency adds to inconsistent results that were reported before and suggests that (i) some aspects of genetic quality are not revealed in breeding tubercles while others are, or (ii) individuals vary in their signaling strategies and the information content of breeding tubercles is not always reliable. Moreover, the fact that female whitefish have breeding tubercles of significant size while males seem to have few reasons to be choosy suggests that the tubercles might also serve some functions that are not linked to sexual signaling.
Resumo:
There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.
Resumo:
The purpose of this paper is to study the diffusion and transformation of scientific information in everyday discussions. Based on rumour models and social representations theory, the impact of interpersonal communication and pre-existing beliefs on transmission of the content of a scientific discovery was analysed. In three experiments, a communication chain was simulated to investigate how laypeople make sense of a genetic discovery first published in a scientific outlet, then reported in a mainstream newspaper and finally discussed in groups. Study 1 (N=40) demonstrated a transformation of information when the scientific discovery moved along the communication chain. During successive narratives, scientific expert terminology disappeared while scientific information associated with lay terminology persisted. Moreover, the idea of a discovery of a faithfulness gene emerged. Study 2 (N=70) revealed that transmission of the scientific message varied as a function of attitudes towards genetic explanations of behaviour (pro-genetics vs. anti-genetics). Pro-genetics employed more scientific terminology than anti-genetics. Study 3 (N=75) showed that endorsement of genetic explanations was related to descriptive accounts of the scientific information, whereas rejection of genetic explanations was related to evaluative accounts of the information.
Resumo:
The control and prediction of wastewater treatment plants poses an important goal: to avoid breaking the environmental balance by always keeping the system in stable operating conditions. It is known that qualitative information — coming from microscopic examinations and subjective remarks — has a deep influence on the activated sludge process. In particular, on the total amount of effluent suspended solids, one of the measures of overall plant performance. The search for an input–output model of this variable and the prediction of sudden increases (bulking episodes) is thus a central concern to ensure the fulfillment of current discharge limitations. Unfortunately, the strong interrelationbetween variables, their heterogeneity and the very high amount of missing information makes the use of traditional techniques difficult, or even impossible. Through the combined use of several methods — rough set theory and artificial neural networks, mainly — reasonable prediction models are found, which also serve to show the different importance of variables and provide insight into the process dynamics
Resumo:
En ciencias de la educación, las últimas décadas han estado marcadas por un interés en las ideas de Lev S. Vygotski. De hecho, a partir de esas ideas se han propuesto varias aplicaciones educativas. Una de ellas es el “Key to learning”. El artículo propone una visión general de este programa educativo desarrollado a partir de algunos trabajos e ideas de autores rusos contemporáneos. Primero, desarrollamos algunas ideas en torno a la noción de zona de desarrollo próximo (ZpD). Después, sugerimos la teoría de las habilidades de aprendizaje. En este sentido, el objetivo principal de “Key to learning” es mejorar las habilidades de aprendizaje cognitivas, comunicativas y directivas de niños de entre 3 a 7 años de edad. Para este propósito son creadas 12 unidades curriculares que componen el programa. Para concluir se enfatiza la creación de zonas de desarrollo próximo estructuradas como parte de un sistema de enseñanza y aprendizaje que vincula la actividad, la asistencia y la agencia
Resumo:
Let I be an ideal in a local Cohen-Macaulay ring (A, m). Assume I to be generically a complete intersection of positive height. We compute the depth of the Rees algebra and the form ring of I when the analytic deviation of I equals one and its reduction number is also at most one. The formu- las we obtain coincide with the already known formulas for almost complete intersection ideals.