370,833 research outputs found
Empirical analysis of countervailing power in business-to-business bargaining
This paper provides a comprehensive econometric framework for the empirical analysis of countervailing power. It encompasses the two main features of pricing schemes in business-to-business relationships: nonlinear price schedules and bargaining over rents. Disentangling them is critical to the empirical identification of countervailing power. Testable predictions from the theoretical analysis for a pragmatic reduced form empirical pricing model are delineated. This model is readily implementable on the basis of transaction data, routinely collected by antitrust authorities and illustrated using data from the UK brick industry. The paper emphasizes the importance of controlling for endogeneity of volumes and established supply chains and for heterogeneity across buyers and sellers due to intrinsically unobservable outside options
Empirical analysis of buyer power
This paper provides a comprehensive econometric framework for the empirical analysis of buyer power. It encompasses the two main features of pricing schemes in business-to-business relationships: nonlinear price schedules and bargaining over rents. Disentangling them is critical to the empirical identification of buyer power. Testable predictions from the theoretical analysis are delineated, and a pragmatic empirical methodology is presented. It is readily implementable on the basis of transaction data, routinely collected by antitrust authorities. The empirical framework is illustrated using data from the UK brick industry. The paper emphasizes the importance of controlling for endogeneity of volumes and for heterogeneity across buyers and sellers.
Empirical analysis of countervailing power in business-to-business bargaining
This paper provides a comprehensive econometric framework for the empirical analysis of countervailing power. It encompasses the two main features of pricing schemes in business-to-business relationships: nonlinear price
schedules and bargaining over rents. Disentangling them is critical to the empirical identification of countervailing power. Testable predictions from the theoretical analysis are delineated, and a pragmatic empirical methodology
is presented. It is readily implementable on the basis of transaction data, routinely collected by antitrust authorities. The empirical framework is illustrated using data from the UK brick industry. The paper emphasizes the
importance of controlling for endogeneity of volumes and for heterogeneity across buyers and sellers
Privacy Leakages in Approximate Adders
Approximate computing has recently emerged as a promising method to meet the
low power requirements of digital designs. The erroneous outputs produced in
approximate computing can be partially a function of each chip's process
variation. We show that, in such schemes, the erroneous outputs produced on
each chip instance can reveal the identity of the chip that performed the
computation, possibly jeopardizing user privacy. In this work, we perform
simulation experiments on 32-bit Ripple Carry Adders, Carry Lookahead Adders,
and Han-Carlson Adders running at over-scaled operating points. Our results
show that identification is possible, we contrast the identifiability of each
type of adder, and we quantify how success of identification varies with the
extent of over-scaling and noise. Our results are the first to show that
approximate digital computations may compromise privacy. Designers of future
approximate computing systems should be aware of the possible privacy leakages
and decide whether mitigation is warranted in their application.Comment: 2017 IEEE International Symposium on Circuits and Systems (ISCAS
Clocks for airborne systems
The potential performance of compact oscillators, needed for the development of accurate clocks for future airborne systems (such as Identification Friend or Foe schemes), is addressed. In particular, extensive testing of rubidium oscillators manufactured by Efratom is discussed. The results indicate that an accuracy of better than 10 microseconds should be achievable in tactical aircraft provided that appropriate measures are adopted to counter the many environmental factors. In a favorable environment a stability of better than 5 x 10 to the -13th power for one day is achievable with present commercial units, but improvements are required to suit operation in an aircraft. With further development of rubidium controlled clocks the ultimate limitation on time accuracy in aircraft will probably be associated with time dissemination, maintenance difficulties and doctrinal hurdles
Assessing the reliability of adaptive power system protection schemes
Adaptive power system protection can be used to improve the performance of existing protection schemes under certain network conditions. However, their deployment in the field is impeded by their perceived inferior reliability compared to existing protection arrangements. Moreover, their validation can be problematic due to the perceived high likelihood of the occurrence of failure modes or incorrect setting selection with variable network conditions. Reliability (including risk assessment) is one of the decisive measures that can be used in the process of verifying adaptive protection scheme performance. This paper proposes a generic methodology for assessing the reliability of adaptive protection. The method involves the identification of initiating events and scenarios that lead to protection failures and quantification of the probability of the occurrence of each failure. A numerical example of the methodology for an adaptive distance protection scheme is provided
- ā¦