16,210 research outputs found

    Market Equilibrium with Transaction Costs

    Full text link
    Identical products being sold at different prices in different locations is a common phenomenon. Price differences might occur due to various reasons such as shipping costs, trade restrictions and price discrimination. To model such scenarios, we supplement the classical Fisher model of a market by introducing {\em transaction costs}. For every buyer ii and every good jj, there is a transaction cost of \cij; if the price of good jj is pjp_j, then the cost to the buyer ii {\em per unit} of jj is p_j + \cij. This allows the same good to be sold at different (effective) prices to different buyers. We provide a combinatorial algorithm that computes ϵ\epsilon-approximate equilibrium prices and allocations in O(1ϵ(n+logm)mnlog(B/ϵ))O\left(\frac{1}{\epsilon}(n+\log{m})mn\log(B/\epsilon)\right) operations - where mm is the number goods, nn is the number of buyers and BB is the sum of the budgets of all the buyers

    Oscillatory Tunnel Splittings in Spin Systems: A Discrete Wentzel-Kramers-Brillouin Approach

    Full text link
    Certain spin Hamiltonians that give rise to tunnel splittings that are viewed in terms of interfering instanton trajectories, are restudied using a discrete WKB method, that is more elementary, and also yields wavefunctions and preexponential factors for the splittings. A novel turning point inside the classically forbidden region is analysed, and a general formula is obtained for the splittings. The result is appled to the \Fe8 system. A previous result for the oscillation of the ground state splitting with external magnetic field is extended to higher levels.Comment: RevTex, one ps figur

    Private Outsourcing of Polynomial Evaluation and Matrix Multiplication using Multilinear Maps

    Full text link
    {\em Verifiable computation} (VC) allows a computationally weak client to outsource the evaluation of a function on many inputs to a powerful but untrusted server. The client invests a large amount of off-line computation and gives an encoding of its function to the server. The server returns both an evaluation of the function on the client's input and a proof such that the client can verify the evaluation using substantially less effort than doing the evaluation on its own. We consider how to privately outsource computations using {\em privacy preserving} VC schemes whose executions reveal no information on the client's input or function to the server. We construct VC schemes with {\em input privacy} for univariate polynomial evaluation and matrix multiplication and then extend them such that the {\em function privacy} is also achieved. Our tool is the recently developed {mutilinear maps}. The proposed VC schemes can be used in outsourcing {private information retrieval (PIR)}.Comment: 23 pages, A preliminary version appears in the 12th International Conference on Cryptology and Network Security (CANS 2013

    Electronic structure of Pr0.67_{0.67}Ca0.33_{0.33}MnO3_3 near the Fermi level studied by ultraviolet photoelectron and x-ray absorption spectroscopy

    Full text link
    We have investigated the temperature-dependent changes in the near-EEF_F occupied and unoccupied states of Pr0.67_{0.67}Ca0.33_{0.33}MnO3_3 which shows the presence of ferromagnetic and antiferromagnetic phases. The temperature-dependent changes in the charge and orbital degrees of freedom and associated changes in the Mn 3dd - O 2pp hybridization result in varied O 2pp contributions to the valence band. A quantitative estimate of the charge transfer energy (EECT_{CT}) shows a larger value compared to the earlier reported estimates. The charge localization causing the large EECT_{CT} is discussed in terms of different models including the electronic phase separation.Comment: 19 pages, 7 figures, To be published in Phy. Rev.

    Nash equilibria in fisher market

    Get PDF
    Much work has been done on the computation of market equilibria. However due to strategic play by buyers, it is not clear whether these are actually observed in the market. Motivated by the observation that a buyer may derive a better payoff by feigning a different utility function and thereby manipulating the Fisher market equilibrium, we formulate the Fisher market game in which buyers strategize by posing different utility functions. We show that existence of a conflict-free allocation is a necessary condition for the Nash equilibria (NE) and also sufficient for the symmetric NE in this game. There are many NE with very different payoffs, and the Fisher equilibrium payoff is captured at a symmetric NE. We provide a complete polyhedral characterization of all the NE for the two-buyer market game. Surprisingly, all the NE of this game turn out to be symmetric and the corresponding payoffs constitute a piecewise linear concave curve. We also study the correlated equilibria of this game and show that third-party mediation does not help to achieve a better payoff than NE payoffs

    Spatial Interpolants

    Full text link
    We propose Splinter, a new technique for proving properties of heap-manipulating programs that marries (1) a new separation logic-based analysis for heap reasoning with (2) an interpolation-based technique for refining heap-shape invariants with data invariants. Splinter is property directed, precise, and produces counterexample traces when a property does not hold. Using the novel notion of spatial interpolants modulo theories, Splinter can infer complex invariants over general recursive predicates, e.g., of the form all elements in a linked list are even or a binary tree is sorted. Furthermore, we treat interpolation as a black box, which gives us the freedom to encode data manipulation in any suitable theory for a given program (e.g., bit vectors, arrays, or linear arithmetic), so that our technique immediately benefits from any future advances in SMT solving and interpolation.Comment: Short version published in ESOP 201

    Quantum Lightning Never Strikes the Same State Twice

    Get PDF
    Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary. In this work, investigate quantum lightning, a formalization of "collision-free quantum money" defined by Lutomirski et al. [ICS'10], where no-cloning holds even when the adversary herself generates the quantum state to be cloned. We then study quantum money and quantum lightning, showing the following results: - We demonstrate the usefulness of quantum lightning by showing several potential applications, such as generating random strings with a proof of entropy, to completely decentralized cryptocurrency without a block-chain, where transactions is instant and local. - We give win-win results for quantum money/lightning, showing that either signatures/hash functions/commitment schemes meet very strong recently proposed notions of security, or they yield quantum money or lightning. - We construct quantum lightning under the assumed multi-collision resistance of random degree-2 systems of polynomials. - We show that instantiating the quantum money scheme of Aaronson and Christiano [STOC'12] with indistinguishability obfuscation that is secure against quantum computers yields a secure quantum money schem

    Magnetic Field Dependence of Macroscopic Quantum Tunneling and Coherence of Ferromagnetic Particle

    Full text link
    We calculate the quantum tunneling rate of a ferromagnetic particle of 100A˚\sim 100 \AA diameter in a magnetic field of arbitrary angle. We consider the magnetocrystalline anisotropy with the biaxial symmetry and that with the tetragonal symmetry. Using the spin-coherent-state path integral, we obtain approximate analytic formulas of the tunneling rates in the small ϵ(=1H/Hc)\epsilon (=1- H/H_c)-limit for the magnetic field normal to the easy axis (θH=π/2\theta_H = \pi/2), for the field opposite to the initial easy axis (θH=π\theta_H = \pi), and for the field at an angle between these two orientations (π/2<<θH<<π\pi/2 << \theta_H << \pi). In addition, we obtain numerically the tunneling rates for the biaxial symmetry in the full range of the angle θH\theta_H of the magnetic field (π/2<θHπ\pi/2 < \theta_H \leq \pi), for the values of \epsilon =0.01 and 0.001.Comment: 25 pages of text (RevTex) and 4 figures (PostScript files), to be published in Phys. Rev.
    corecore