4,642 research outputs found
Recommended from our members
Veto players and equilibrium uniqueness in the Baron-Ferejohn model
In political economy, the seminal contribution of the Baron–Ferejohn bargaining model constitutes an important milestone for the study of legislative policy making. In this paper, we analyze a particular equilibrium characteristic of this model, equilibrium uniqueness. The Baron–Ferejohn model yields a class of payoff-unique stationary subgame perfect equilibria (SSPE) in which players’ equilibrium strategies are not uniquely determined. We first provide a formal proof of the multiplicity of equilibrium strategies. This also enables us to establish some important properties of SSPE. We then introduce veto players into the original Baron–Ferejohn model. We state the conditions under which the new model has a unique SSPE not only in terms of payoffs but also in terms of players’ equilibrium strategies
Multicanonical Spin Glass Simulations
We report a Monte Carlo simulation of the Edwards-Anderson spin glass
model within the recently introduced multicanonical ensemble. Replica on
lattices of size up to are investigated. Once a true groundstate
is found, we are able to give a lower bound on the number of statistically
independent groundstates sampled. Temperature dependence of the energy, entropy
and other quantities of interest are easily calculable. In particular we report
the groundstate results. Computations involving the spin glass order parameter
are more tedious. Our data indicate that the large increase of the
ergodicity time is reduced to an approximately power law. Altogether the
results suggest that the multicanonical ensemble improves the situation of
simulations for spin glasses and other systems which have to cope with similar
problems of conflicting constraints.Comment: 24 page
Recommended from our members
When Is It Optimal to Delegate: The Theory of Fast-Track Authority
With fast-track authority (FTA), the US Congress delegates trade-policy authority to the President by committing not to amend a trade agreement. Why would it cede such power? We suggest an interpretation in which Congress uses FTA to forestall destructive competition between its members for protectionist rents. In our model: (i) FTA is never granted if an industry operates in the majority of districts; (ii) The more symmetric the industrial pattern, the more likely is FTA, since competition for protectionist rents is most punishing when bargaining power is symmetrically distributed; (iii) Widely disparate initial tari§s prevent free trade even with FTA
Dynamic Server Allocation over Time Varying Channels with Switchover Delay
We consider a dynamic server allocation problem over parallel queues with
randomly varying connectivity and server switchover delay between the queues.
At each time slot the server decides either to stay with the current queue or
switch to another queue based on the current connectivity and the queue length
information. Switchover delay occurs in many telecommunications applications
and is a new modeling component of this problem that has not been previously
addressed. We show that the simultaneous presence of randomly varying
connectivity and switchover delay changes the system stability region and the
structure of optimal policies. In the first part of the paper, we consider a
system of two parallel queues, and develop a novel approach to explicitly
characterize the stability region of the system using state-action frequencies
which are stationary solutions to a Markov Decision Process (MDP) formulation.
We then develop a frame-based dynamic control (FBDC) policy, based on the
state-action frequencies, and show that it is throughput-optimal asymptotically
in the frame length. The FBDC policy is applicable to a broad class of network
control systems and provides a new framework for developing throughput-optimal
network control policies using state-action frequencies. Furthermore, we
develop simple Myopic policies that provably achieve more than 90% of the
stability region. In the second part of the paper, we extend our results to
systems with an arbitrary but finite number of queues.Comment: 38 Pages, 18 figures. arXiv admin note: substantial text overlap with
arXiv:1008.234
Recommended from our members
Fast-Track Authority: A Hold-Up Interpretation.
A central institution of US trade policy is Fast-Track Authority (FT), by whichCongress commits not to amend a trade agreement that is presented to it for ratifica-tion, but to subject the agreement to an up-or-down vote.We offer a new interpretation of FT based on a hold-up problem. If the US gov-ernment negotiates a trade agreement with the government of a smaller economy, asthe negotiations proceed, businesses in the partner economy, anticipating the openingof the US market to their goods, may make sunk investments to take advantage ofthe US market, such as quality upgrades to meet the expectations of the demandingUS consumer. As a result, when the time comes for ratification of the agreement, thepartner economy will be locked in to the US market in a way it was not previously.At this point, if Congress is able to amend the agreement, the partner country hasless bargaining power than it didex ante, and so Congress can make changes that areadverse to the partner. As a result, if the US wants to convince such a partner countryto negotiate a trade deal, it mustfirst commit not to amend the agreementex post.Inthis situation, FT is Pareto-improving
Tardos fingerprinting is better than we thought
We review the fingerprinting scheme by Tardos and show that it has a much
better performance than suggested by the proofs in Tardos' original paper. In
particular, the length of the codewords can be significantly reduced.
First we generalize the proofs of the false positive and false negative error
probabilities with the following modifications: (1) we replace Tardos'
hard-coded numbers by variables and (2) we allow for independently chosen false
positive and false negative error rates. It turns out that all the
collusion-resistance properties can still be proven when the code length is
reduced by a factor of more than 2.
Second, we study the statistical properties of the fingerprinting scheme, in
particular the average and variance of the accusations. We identify which
colluder strategy forces the content owner to employ the longest code. Using a
gaussian approximation for the probability density functions of the
accusations, we show that the required false negative and false positive error
rate can be achieved with codes that are a factor 2 shorter than required for
rigid proofs.
Combining the results of these two approaches, we show that the Tardos scheme
can be used with a code length approximately 5 times shorter than in the
original construction.Comment: Modified presentation of result
Deriving feasible deployment alternatives for parallel and distributed simulation systems
Cataloged from PDF version of article.Parallel and distributed simulations (PADS) realize the distributed execution of a simulation system over multiple physical resources. To realize the execution of PADS, different simulation infrastructures such as HLA, DIS and TENA have been defined. Recently, the Distributed Simulation Engineering and Execution Process (DSEEP) that supports the mapping of the simulations on the infrastructures has been defined. An important recommended task in DSEEP is the evaluation of the performance of the simulation systems at the design phase. In general, the performance of a simulation is largely influenced by the allocation of member applications to the resources. Usually, the deployment of the applications to the resources can be done in many different ways. DSEEP does not provide a concrete approach for evaluating the deployment alternatives. Moreover, current approaches that can be used for realizing various DSEEP activities do not yet provide adequate support for this purpose. We provide a concrete approach for deriving feasible deployment alternatives based on the simulation system and the available resources. In the approach, first the simulation components and the resources are designed. The design is used to define alternative execution configurations, and based on the design and the execution configuration; a feasible deployment alternative can be algorithmically derived. Tool support is developed for the simulation design, the execution configuration definition and the automatic generation of feasible deployment alternatives. The approach has been applied within a large-scale industrial case study for simulating Electronic Warfare systems. © 2013 ACM
Estimating mine planning software utilization for decision-making strategies in the South African gold mining sector.
The work presented in this paper is part of a PhD research study in the School of Mining Engineering at the University of the Witwatersrand.This paper discusses a new methodology for defining and measuring mine planning software utilization in the South African gold mining sector within an evolving data-set framework. An initial data-set showing the mine planning software providers, their corresponding software solutions, as well as the software capabilities and information on the number of licences was collected and compiled in 2012 in an online database for software utilized in the South African mining industry. Details of the database development and implementation were published in the Journal of the Southern African Institute of Mining and Metallurgy in 2013. In 2014 the data-set was updated with additional and new information. Using the 2012 and 2014 timestamps, a methodology for estimating the software utilization was developed. In this methodology, the three variables of commodity, functionality, and time factor were used to define and measure the software utilization in order to ultimately inform decision-making strategies for optimal software utilization. Using six different functionalities, namely Geological Data Management, Geological Modelling and Resource Estimation, Design and Layout, Scheduling, Financial Valuation, and Optimization, utilization in the gold sector was measured. This paper presents the methodology employed for measuring the mine planning software utilization. The methodology is useful for stakeholders reviewing existing software combinations or intending to purchase new software in the near future and who want to estimate the comparative attractiveness of a certain software package. These stakeholders include mining companies, consulting companies, educational institutions, and software providers. The work presented in this paper is part of a PhD research study in the School of Mining Engineering at the University of the Witwatersrand.MvdH2017http://www.saimm.co.za/publications/journal-paper
Multicanonical Study of the 3D Ising Spin Glass
We simulated the Edwards-Anderson Ising spin glass model in three dimensions
via the recently proposed multicanonical ensemble. Physical quantities such as
energy density, specific heat and entropy are evaluated at all temperatures. We
studied their finite size scaling, as well as the zero temperature limit to
explore the ground state properties.Comment: FSU-SCRI-92-121; 7 pages; sorry, no figures include
- …