73,485 research outputs found

    Sharing the cost of risky projects

    Get PDF
    Users share the cost of unreliable non-rival projects (items). For instance, industry partners pay today for R&D that may or may not deliver a cure to some viruses, agents pay for the edges of a network that will cover their connectivity needs, but the edges may fail, etc. Each user has a binary inelastic need that is served if and only if certain subsets of items are actually functioning. We ask how should the cost be divided when individual needs are heterogenous. We impose three powerful separability properties: Independence of Timing ensures that the cost shares computed ex ante are the expectation, over the random realization of the projects, of shares computed ex post. Cost Additivity together with Separability Across Projects ensure that the cost shares of an item depend only upon the service provided by that item for a given realization of all other items. Combining these with fair bounds on the liability of agents with more or less flexible needs, and of agents for whom an item is either indispensable or useless, we characterize two rules: the Ex Post Service rule is the expectation of the equal division of costs between the agents who end up served; the Needs Priority rule splits the cost first between those agents for whom an item is critical ex post, or if there are no such agents between those who end up being served

    On the design of custom packs: grouping of medical disposable items for surgeries

    Get PDF
    A custom pack combines medical disposable items into a single sterile package that is used for surgical procedures. Although custom packs are gaining importance in hospitals due to their potential benefits in reducing surgery setup times, little is known on methodologies to configure them, especially if the number of medical items, procedure types and surgeons is large. In this paper, we propose a mathematical programming approach to guide hospitals in developing or reconfiguring their custom packs. In particular, we are interested in minimising points of touch, which we define as a measure for physical contact between staff and medical materials. Starting from an integer non-linear programming model, we develop both an exact linear programming (LP) solution approach and an LP-based heuristic. Next, we also describe a simulated annealing approach to benchmark the mathematical programming methods. A computational experiment, based on real data of a medium-sized Belgian hospital, compares the optimised results with the performance of the hospital’s current configuration settings and indicates how to improve future usage. Next to this base case, we introduce scenarios in which we examine to what extent the results are sensitive for waste, i.e. adding more items to the custom pack than is technically required for some of the custom pack’s procedures, since this can increase its applicability towards other procedures. We point at some interesting insights that can be taken up by the hospital management to guide the configuration and accompanying negotiation processes

    Radio Frequency Identification Technology: Applications, Technical Challenges and Strategies

    Get PDF
    Purpose - The purpose of this paper is to discuss the technology behind RFID systems, identify the applications of RFID in various industries, and discuss the technical challenges of RFID implementation and the corresponding strategies to overcome those challenges. Design/methodology/approach - Comprehensive literature review and integration of the findings from literature. Findings - Technical challenges of RFID implementation include tag cost, standards, tag and reader selection, data management, systems integration and security. The corresponding solution is suggested for each challenge. Research limitations/implications - A survey type research is needed to validate the results. Practical implications - This research offers useful technical guidance for companies which plan to implement RFID and we expect it to provide the motivation for much future research in this area. Originality/value - As the infancy of RFID applications, few researches have existed to address the technical issues of RFID implementation. Our research filled this gap

    Division of labour and sharing of knowledge for synchronous collaborative information retrieval

    Get PDF
    Synchronous collaborative information retrieval (SCIR) is concerned with supporting two or more users who search together at the same time in order to satisfy a shared information need. SCIR systems represent a paradigmatic shift in the way we view information retrieval, moving from an individual to a group process and as such the development of novel IR techniques is needed to support this. In this article we present what we believe are two key concepts for the development of effective SCIR namely division of labour (DoL) and sharing of knowledge (SoK). Together these concepts enable coordinated SCIR such that redundancy across group members is reduced whilst enabling each group member to benefit from the discoveries of their collaborators. In this article we outline techniques from state-of-the-art SCIR systems which support these two concepts, primarily through the provision of awareness widgets. We then outline some of our own work into system-mediated techniques for division of labour and sharing of knowledge in SCIR. Finally we conclude with a discussion on some possible future trends for these two coordination techniques

    Distributed Signaling Games

    Get PDF
    A recurring theme in recent computer science literature is that proper design of signaling schemes is a crucial aspect of effective mechanisms aiming to optimize social welfare or revenue. One of the research endeavors of this line of work is understanding the algorithmic and computational complexity of designing efficient signaling schemes. In reality, however, information is typically not held by a central authority, but is distributed among multiple sources (third-party "mediators"), a fact that dramatically changes the strategic and combinatorial nature of the signaling problem, making it a game between information providers, as opposed to a traditional mechanism design problem. In this paper we introduce {\em distributed signaling games}, while using display advertising as a canonical example for introducing this foundational framework. A distributed signaling game may be a pure coordination game (i.e., a distributed optimization task), or a non-cooperative game. In the context of pure coordination games, we show a wide gap between the computational complexity of the centralized and distributed signaling problems. On the other hand, we show that if the information structure of each mediator is assumed to be "local", then there is an efficient algorithm that finds a near-optimal (55-approximation) distributed signaling scheme. In the context of non-cooperative games, the outcome generated by the mediators' signals may have different value to each (due to the auctioneer's desire to align the incentives of the mediators with his own by relative compensations). We design a mechanism for this problem via a novel application of Shapley's value, and show that it possesses some interesting properties, in particular, it always admits a pure Nash equilibrium, and it never decreases the revenue of the auctioneer

    Some Ideas and Examples to Evaluate Ontologies

    Get PDF
    The lack of methods for evaluating ontologies in laboratories can be an obstacle to their use in companies. This paper presents a set of emerging ideas in evaluation of ontologies useful for: (1) ontologies developers in the lab, as a foundation from which to perform technical evaluations; (2) end users of ontologies in companies, as a point of departure in the search for the best ontology for their systems; and (3) future research, as a basis upon which to perform progressive and disciplined investigations in this area. After briefly exploring some general questions such as: why, what, when, how and where to evaluate; who evaluates; and, what to evaluate against, we focus on the definition of a set of criteria useful in the evaluation process. Finally, we use some of these criteria in the evaluation of the Bibliographic-Data [5] ontology
    corecore