14,624 research outputs found

    Bidder Collusion

    Get PDF
    Within the heterogeneous independent private values model, we analyze bidder collusion at first and second price single-object auctions, allowing for within-cartel transfers. Our primary focus is on (i) coalitions that contain a strict subset of all bidders and (ii) collusive mechanisms that do not rely on information from the auctioneer, such as the identity of the winner or the amount paid. To analyze collusion, a richer environment is required than that required to analyze non-cooperative behavior. We must account for the possibility of shill bidders as well as mechanism payment rules that may depend on the reports of cartel members or their bids at the auction. We show there are cases in which a coalition at a first price auction can produce no gain for the coalition members beyond what is attainable from non-cooperative play. In contrast, a coalition at a second price auction captures the entire collusive gain. For collusion to be effective at a first price auction we show that the coalition must submit two bids that are different but close to one another, a finding that has important empirical implicationsauctions, collusion, bidding rings, shill

    Time-reversible Born-Oppenheimer molecular dynamics

    Full text link
    We present a time-reversible Born-Oppenheimer molecular dynamics scheme, based on self-consistent Hartree-Fock or density functional theory, where both the nuclear and the electronic degrees of freedom are propagated in time. We show how a time-reversible adiabatic propagation of the electronic degrees of freedom is possible despite the non-linearity and incompleteness of the self-consistent field procedure. Time-reversal symmetry excludes a systematic long-term energy drift for a microcanonical ensemble and the number of self-consistency cycles can be kept low (often only 2-4 cycles per nuclear time step) thanks to a good initial guess given by the adiabatic propagation of the electronic degrees of freedom. The time-reversible Born-Oppenheimer molecular dynamics scheme therefore combines a low computational cost with a physically correct time-reversible representation of the dynamics, which preserves a detailed balance between propagation forwards and backwards in time.Comment: 4 pages, 4 figure

    Addressing student models of energy loss in quantum tunnelling

    Full text link
    We report on a multi-year, multi-institution study to investigate student reasoning about energy in the context of quantum tunnelling. We use ungraded surveys, graded examination questions, individual clinical interviews, and multiple-choice exams to build a picture of the types of responses that students typically give. We find that two descriptions of tunnelling through a square barrier are particularly common. Students often state that tunnelling particles lose energy while tunnelling. When sketching wave functions, students also show a shift in the axis of oscillation, as if the height of the axis of oscillation indicated the energy of the particle. We find inconsistencies between students' conceptual, mathematical, and graphical models of quantum tunnelling. As part of a curriculum in quantum physics, we have developed instructional materials to help students develop a more robust and less inconsistent picture of tunnelling, and present data suggesting that we have succeeded in doing so.Comment: Originally submitted to the European Journal of Physics on 2005 Feb 10. Pages: 14. References: 11. Figures: 9. Tables: 1. Resubmitted May 18 with revisions that include an appendix with the curriculum materials discussed in the paper (4 page small group UW-style tutorial

    Parameterized Inapproximability of Target Set Selection and Generalizations

    Full text link
    In this paper, we consider the Target Set Selection problem: given a graph and a threshold value thr(v)thr(v) for any vertex vv of the graph, find a minimum size vertex-subset to "activate" s.t. all the vertices of the graph are activated at the end of the propagation process. A vertex vv is activated during the propagation process if at least thr(v)thr(v) of its neighbors are activated. This problem models several practical issues like faults in distributed networks or word-to-mouth recommendations in social networks. We show that for any functions ff and ρ\rho this problem cannot be approximated within a factor of ρ(k)\rho(k) in f(k)nO(1)f(k) \cdot n^{O(1)} time, unless FPT = W[P], even for restricted thresholds (namely constant and majority thresholds). We also study the cardinality constraint maximization and minimization versions of the problem for which we prove similar hardness results

    Antitrust leniency with multiproduct colluders

    Get PDF
    We use a global games approach to model alternative implementations of an antitrust leniency program as applied to multiproduct colluders. We derive several policy design lessons; e.g., we show that it is possible that linking leniency across products increases the likelihood of conviction in the first product investigated but reduces it in subsequent products. Thus, firms may have an incentive to form sacrificial cartels and apply for leniency in less valuable products to reduce convictions in more valuable products. Cartel profiling can mitigate this undesirable effect, but also reduces the probability of conviction in the first product investigated

    Theatre-historiographical patterns in the Global South

    Get PDF

    Nigerian scam e-mails and the charms of capital

    Get PDF
    So-called '419' or 'advance-fee' e-mail frauds have proved remarkably successful. Global losses to these scams are believed to run to billions of dollars. Although it can be assumed that the promise of personal gain which these e-mails hold out is part of what motivates victims, there is more than greed at issue here. How is it that the seemingly incredible offers given in these unsolicited messages can find an audience willing to treat them as credible? The essay offers a speculative thesis in answer to this question. Firstly, it is argued, these scams are adept at exploiting common presuppositions in British and American culture regarding Africa and the relationships that are assumed to exist between their nations and those in the global south. Secondly, part of the appeal of these e-mails lies in the fact that they appear to reveal the processes by which wealth is created and distributed in the global economy. They thus speak to their readers’ attempts to map or conceptualise the otherwise inscrutable processes of that economy. In the conclusion the essay looks at the contradictions in the official state response to this phenomena
    corecore