981 resultados para Topological graph theory.
Resumo:
The identification of aggregate human capital externalities is still not fully understood. The existing (Mincerian) approach confounds positive externalities with wage changes due to a downward sloping demand curve for human capital. As a result, it yields positive externalities even when wages equal marginal social products. We propose an approach that identifies human capital externalities whether or not aggregate demand for human capital slopes downward. Another advantage of our approach is that it does not require estimates of the individual return to human capital. Applications to US cities and states between 1970 and 1990 yield no evidence of significant average -schooling externalities.
Resumo:
Two-dimensional agarose gel electrophoresis, psoralen cross-linking, and electron microscopy were used to study the effects of positive supercoiling on fork reversal in isolated replication intermediates of bacterial DNA plasmids. The results obtained demonstrate that the formation of Holliday-like junctions at both forks of a replication bubble creates a topological constraint that prevents further regression of the forks. We propose that this topological locking of replication intermediates provides a biological safety mechanism that protects DNA molecules against extensive fork reversals.
Resumo:
This paper presents a tractable dynamic general equilibrium model thatcan explain cross-country empirical regularities in geographical mobility,unemployment and labor market institutions. Rational agents vote overunemployment insurance (UI), taking the dynamic distortionary effects ofinsurance on the performance of the labor market into consideration.Agents with higher cost of moving, i.e., more attached to their currentlocation, prefer more generous UI. The key assumption is that an agent'sattachment to a location increases the longer she has resided there. UIreduces the incentive for labor mobility and increases, therefore, thefraction of attached agents and the political support for UI. The mainresult is that this self-reinforcing mechanism can give rise to multiplesteady-states-one 'European' steady-state featuring high unemployment,low geographical mobility and high unemployment insurance, and one'American' steady-state featuring low unemployment, high mobility andlow unemployment insurance.
Endogeneous matching in university-industry collaboration: Theory and empirical evidence from the UK
Resumo:
We develop a two-sided matching model to analyze collaboration between heterogeneousacademics and firms. We predict a positive assortative matching in terms of both scientificability and affinity for type of research, but negative assortative in terms of ability on one sideand affinity in the other. In addition, the most able and most applied academics and the mostable and most basic firms shall collaborate rather than stay independent. Our predictionsreceive strong support from the analysis of the teams of academics and firms that proposeresearch projects to the UK's Engineering and Physical Sciences Research Council.
Resumo:
This article builds on the recent policy diffusion literature and attempts to overcome one of its major problems, namely the lack of a coherent theoretical framework. The literature defines policy diffusion as a process where policy choices are interdependent, and identifies several diffusion mechanisms that specify the link between the policy choices of the various actors. As these mechanisms are grounded in different theories, theoretical accounts of diffusion currently have little internal coherence. In this article we put forward an expected-utility model of policy change that is able to subsume all the diffusion mechanisms. We argue that the expected utility of a policy depends on both its effectiveness and the payoffs it yields, and we show that the various diffusion mechanisms operate by altering these two parameters. Each mechanism affects one of the two parameters, and does so in distinct ways. To account for aggregate patterns of diffusion, we embed our model in a simple threshold model of diffusion. Given the high complexity of the process that results, strong analytical conclusions on aggregate patterns cannot be drawn without more extensive analysis which is beyond the scope of this article. However, preliminary considerations indicate that a wide range of diffusion processes may exist and that convergence is only one possible outcome.
Resumo:
The principal objective of the knot theory is to provide a simple way of classifying and ordering all the knot types. Here, we propose a natural classification of knots based on their intrinsic position in the knot space that is defined by the set of knots to which a given knot can be converted by individual intersegmental passages. In addition, we characterize various knots using a set of simple quantum numbers that can be determined upon inspection of minimal crossing diagram of a knot. These numbers include: crossing number; average three-dimensional writhe; number of topological domains; and the average relaxation value
Resumo:
Estudi centrat en el paper de la comunicació no verbal com a eina docent per a la gestió de l’aula, prenent com a referència el model de comunicació de Michael Grinder (Pentimento), basat en la Programació Neuro-lingüística (PNL). Aquest model s’analitza i es compara amb altres models i estudis sobre la comunicació no verbal, per establir-ne similituds i diferències. Per tal d’avaluar l’eficàcia de les tècniques de gestió de l’aula a través de la comunicació no verbal proposades per Grinder en un context educatiu real, s’inclouen i s’analitzen enregistraments de la implementació de diferents tècniques en un institut de secundària de Catalunya. Tota la informació recollida i analitzada permet valorar i ressaltar com és de significatiu tot allò que s’expressa més enllà del llenguatge, i per tant, com són d’importants i d’útils les habilitats comunicatives d’un professor en la seva tasca d’ensenyar.
Resumo:
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random-ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in orderto obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.
Resumo:
In recent years there has been an explosive growth in the development of adaptive and data driven methods. One of the efficient and data-driven approaches is based on statistical learning theory (Vapnik 1998). The theory is based on Structural Risk Minimisation (SRM) principle and has a solid statistical background. When applying SRM we are trying not only to reduce training error ? to fit the available data with a model, but also to reduce the complexity of the model and to reduce generalisation error. Many nonlinear learning procedures recently developed in neural networks and statistics can be understood and interpreted in terms of the structural risk minimisation inductive principle. A recent methodology based on SRM is called Support Vector Machines (SVM). At present SLT is still under intensive development and SVM find new areas of application (www.kernel-machines.org). SVM develop robust and non linear data models with excellent generalisation abilities that is very important both for monitoring and forecasting. SVM are extremely good when input space is high dimensional and training data set i not big enough to develop corresponding nonlinear model. Moreover, SVM use only support vectors to derive decision boundaries. It opens a way to sampling optimization, estimation of noise in data, quantification of data redundancy etc. Presentation of SVM for spatially distributed data is given in (Kanevski and Maignan 2004).
Resumo:
This paper provides an explicit cofibrant resolution of the operad encoding Batalin-Vilkovisky algebras. Thus it defines the notion of homotopy Batalin-Vilkovisky algebras with the required homotopy properties. To define this resolution we extend the theory of Koszul duality to operads and properads that are defind by quadratic and linear relations. The operad encoding Batalin-Vilkovisky algebras is shown to be Koszul in this sense. This allows us to prove a Poincare-Birkhoff-Witt Theorem for such an operad and to give an explicit small quasi-free resolution for it. This particular resolution enables us to describe the deformation theory and homotopy theory of BV-algebras and of homotopy BV-algebras. We show that any topological conformal field theory carries a homotopy BV-algebra structure which lifts the BV-algebra structure on homology. The same result is proved for the singular chain complex of the double loop space of a topological space endowed with an action of the circle. We also prove the cyclic Deligne conjecture with this cofibrant resolution of the operad BV. We develop the general obstruction theory for algebras over the Koszul resolution of a properad and apply it to extend a conjecture of Lian-Zuckerman, showing that certain vertex algebras have an explicit homotopy BV-algebra structure.
Resumo:
Arising from M. A. Nowak, C. E. Tarnita & E. O. Wilson 466, 1057-1062 (2010); Nowak et al. reply. Nowak et al. argue that inclusive fitness theory has been of little value in explaining the natural world, and that it has led to negligible progress in explaining the evolution of eusociality. However, we believe that their arguments are based upon a misunderstanding of evolutionary theory and a misrepresentation of the empirical literature. We will focus our comments on three general issues.