7,337 research outputs found
Delivered versus Mill Nonlinear Pricing in Free Entry Markets
This paper discusses a model where consumers simultaneously differ according to one unobservable (preference for quality) and one observable characteristic (location). In these circumstances nonlinear prices arise in equilibrium. The main question addressed in this work is whether firms should be allowed to practise different nonlinear prices at each location (delivered nonlinear pricing) or should be forced to set an unique nonlinear contract (mill nonlinear pricing). Assuming that firms can costless relocate, we show that the free entry long-run number of firms may be either smaller, equal, or higher under delivered nonlinear pricing. In addition, we show that delivered nonlinear pricing yields in the long-run higher welfare and, consequently, our results support the view that discriminatory nonlinear pricing should not be prohibited.Delivered nonlinear pricing, Mill nonlinear pricing, Asymmetric information, Pricing regulation
On the anonymity risk of time-varying user profiles.
Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.Peer ReviewedPostprint (published version
On web user tracking of browsing patterns for personalised advertising
This is an Accepted Manuscript of an article published by Taylor & Francis in International Journal of Parallel, Emergent and Distributed Systems on 19/02/2017, available online: http://www.tandfonline.com/doi/abs/10.1080/17445760.2017.1282480On today’s Web, users trade access to their private data for content and services. App and service providers want to know everything they can about their users, in order to improve their product experience. Also, advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users’ actions and tastes to suggest a range of products to buy. Both service providers and advertisers try to track users’ behaviour across their product network. For application providers this means tracking users’ actions within their platform. For third-party services following users, means being able to track them across different websites and applications. It is well known how, while surfing the Web, users leave traces regarding their identity in the form of activity patterns and unstructured data. These data constitute what is called the user’s online footprint. We analyse how advertising networks build and collect users footprints and how the suggested advertising reacts to changes in the user behaviour.Peer ReviewedPostprint (author's final draft
Coherence-length effects in fast atom diffraction at grazing incidence
Coherence properties of projectiles, found relevant in ion-atom collisions, are investigated by analyzing the influence of the degree of coherence of the atomic beam on interference patterns produced by grazing-incidence fast-atom diffraction (GIFAD or FAD). The transverse coherence length of the projectiles, which depends on the incidence conditions and the collimating setup, determines the overall characteristics of GIFAD distributions. We show that for atoms scattered from a LiF(001) surface after a given collimation, we can modify the interference signatures of the angular spectra by varying the total impact energy, while keeping the normal energy as a constant. Also, the role played by the geometry of the collimating aperture is analyzed, comparing results for square and circular openings. Furthermore, we study the spot-beam effect, which is due to different focus points of the impinging particles. We show that when a region narrower than a single crystallographic channel is coherently illuminated by the atomic beam, the spot-beam contribution strongly affects the visibility of the interference structures, contributing to the gradual quantum-classical transition of the projectile distributions.Fil: Gravielle, Maria Silvia. Consejo Nacional de InvestigaciĂłnes CientĂficas y TĂ©cnicas. Oficina de CoordinaciĂłn Administrativa Ciudad Universitaria. Instituto de AstronomĂa y FĂsica del Espacio. - Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de AstronomĂa y FĂsica del Espacio; ArgentinaFil: Miraglia, Jorge Esteban. Consejo Nacional de InvestigaciĂłnes CientĂficas y TĂ©cnicas. Oficina de CoordinaciĂłn Administrativa Ciudad Universitaria. Instituto de AstronomĂa y FĂsica del Espacio. - Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de AstronomĂa y FĂsica del Espacio; ArgentinaFil: Frisco, Leandro. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales; Argentin
Virtualisation of the test environment for signalling
ERTMS is a well-known, well-performing technology applied all over the world but it still lacks flexibility when
it comes to authorisation and certification procedures. The key of its success in the future lies as much in cost
reduction as in simplification of placing in service procedures. This holds true for the implementation of a new
subsystem and even more so for new software releases related to subsystems already in service.
Currently the placing in service process of ETCS components and subsystems requires a large amount of tests due
to the complexity of the signalling systems and the different engineering rules applied. The S2R Multi-Annual
Action Plan states that the effort and time consumption of these onsite tests are at least 30% for any particular
project. VITE research project (VIrtualisation of the Test Environment) aims at reducing these onsite tests to a
minimum while ensuring that laboratory tests can serve as evidence for valid system behaviour and are accepted
by all stakeholders involved in the placing in service process. This paper presents the first VITE results
On content-based recommendation and user privacy in social-tagging systems
Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively has been named social tagging, and it is one of the most popular in which users engage online, and although it has opened new possibilities for application interoperability on the semantic web, it is also posing new privacy threats. It, in fact, consists of describing online or offline resources by using free-text labels (i.e. tags), therefore exposing the user profile and activity to privacy attacks. Users, as a result, may wish to adopt a privacy-enhancing strategy in order not to reveal their interests completely. Tag forgery is a privacy enhancing technology consisting of generating tags for categories or resources that do not reflect the user's actual preferences. By modifying their profile, tag forgery may have a negative impact on the quality of the recommendation system, thus protecting user privacy to a certain extent but at the expenses of utility loss. The impact of tag forgery on content-based recommendation is, therefore, investigated in a real-world application scenario where different forgery strategies are evaluated, and the consequent loss in utility is measured and compared.Peer ReviewedPostprint (author’s final draft
Dynamic and multi-pharmacophore modeling for designing polo-box domain inhibitors.
The polo-like kinase 1 (Plk1) is a critical regulator of cell division that is overexpressed in many types of tumors. Thus, a strategy in the treatment of cancer has been to target the kinase activity (ATPase domain) or substrate-binding domain (Polo-box Domain, PBD) of Plk1. However, only few synthetic small molecules have been identified that target the Plk1-PBD. Here, we have applied an integrative approach that combines pharmacophore modeling, molecular docking, virtual screening, and in vitro testing to discover novel Plk1-PBD inhibitors. Nine Plk1-PBD crystal structures were used to generate structure-based hypotheses. A common pharmacophore model (Hypo1) composed of five chemical features was selected from the 9 structure-based hypotheses and used for virtual screening of a drug-like database consisting of 159,757 compounds to identify novel Plk1-PBD inhibitors. The virtual screening technique revealed 9,327 compounds with a maximum fit value of 3 or greater, which were selected and subjected to molecular docking analyses. This approach yielded 93 compounds that made good interactions with critical residues within the Plk1-PBD active site. The testing of these 93 compounds in vitro for their ability to inhibit the Plk1-PBD, showed that many of these compounds had Plk1-PBD inhibitory activity and that compound Chemistry_28272 was the most potent Plk1-PBD inhibitor. Thus Chemistry_28272 and the other top compounds are novel Plk1-PBD inhibitors and could be used for the development of cancer therapeutics
A Typed Model for Dynamic Authorizations
Security requirements in distributed software systems are inherently dynamic.
In the case of authorization policies, resources are meant to be accessed only
by authorized parties, but the authorization to access a resource may be
dynamically granted/yielded. We describe ongoing work on a model for specifying
communication and dynamic authorization handling. We build upon the pi-calculus
so as to enrich communication-based systems with authorization specification
and delegation; here authorizations regard channel usage and delegation refers
to the act of yielding an authorization to another party. Our model includes:
(i) a novel scoping construct for authorization, which allows to specify
authorization boundaries, and (ii) communication primitives for authorizations,
which allow to pass around authorizations to act on a given channel. An
authorization error may consist in, e.g., performing an action along a name
which is not under an appropriate authorization scope. We introduce a typing
discipline that ensures that processes never reduce to authorization errors,
even when authorizations are dynamically delegated.Comment: In Proceedings PLACES 2015, arXiv:1602.0325
Dynamic Role Authorization in Multiparty Conversations
Protocol specifications often identify the roles involved in communications.
In multiparty protocols that involve task delegation it is often useful to
consider settings in which different sites may act on behalf of a single role.
It is then crucial to control the roles that the different parties are
authorized to represent, including the case in which role authorizations are
determined only at runtime. Building on previous work on conversation types
with flexible role assignment, here we report initial results on a typed
framework for the analysis of multiparty communications with dynamic role
authorization and delegation. In the underlying process model, communication
prefixes are annotated with role authorizations and authorizations can be
passed around. We extend the conversation type system so as to statically
distinguish processes that never incur in authorization errors. The proposed
static discipline guarantees that processes are always authorized to
communicate on behalf of an intended role, also covering the case in which
authorizations are dynamically passed around in messages.Comment: In Proceedings BEAT 2014, arXiv:1408.556
Quantum bounds on the generalized Lyapunov exponents
We discuss the generalized quantum Lyapunov exponents , defined from the
growth rate of the powers of the square commutator. They may be related to an
appropriately defined thermodynamic limit of the spectrum of the commutator,
which plays the role of a large deviation function, obtained from the exponents
via a Legendre transform. We show that such exponents obey a generalized
bound to chaos due to the fluctuation-dissipation theorem, as already discussed
in the literature. The bounds for larger are actually stronger, placing a
limit on the large deviations of chaotic properties. Our findings at infinite
temperature are exemplified by a numerical study of the kicked top, a
paradigmatic model of quantum chaos.Comment: The paper is dedicated to Professor Giulio Casati on the Occasion of
his 80th Birthday, submitted to the Special Issue of Entropy: "Quantum chaos
- dedicated to Professor Giulio Casati on the Occasion of His 80th Birthday
- …