90,806 research outputs found

    Creating WWW-based Soap Operas for Learning English

    Get PDF

    Walking Among Ruins In Babylon

    Get PDF

    Perspective Distortion

    Full text link

    Volume 24, Issue 2: Full Issue

    Get PDF

    When herding and contrarianism foster market efficiency: a financial trading experiment

    Get PDF
    While herding has long been suspected to play a role in financial market booms and busts, theoretical analyses have struggled to identify conclusive causes for the effect. Recent theoretical work shows that informational herding is possible in a market with efficient asset prices if information is bi-polar, and contrarianism is possible with single-polar information. We present an experimental test for the validity of this theory, contrasting with all existing experiments where rational herding was theoretically impossible and subsequently not observed. Overall we observe that subjects generally behave according to theoretical predictions, yet the fit is lower for types who have the theoretical potential to herd. While herding is often not observed when predicted by theory, herding (sometimes irrational) does occur. Irrational contrarianism in particular leads observed prices to substantially differ from the efficient benchmark. Alternative models of behavior, such as risk aversion, loss aversion or error correction, either perform quite poorly or add little to our understanding

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
    • …
    corecore