14,624 research outputs found
Bidder Collusion
Within the heterogeneous independent private values model, we analyze bidder collusion at first and second price single-object auctions, allowing for within-cartel transfers. Our primary focus is on (i) coalitions that contain a strict subset of all bidders and (ii) collusive mechanisms that do not rely on information from the auctioneer, such as the identity of the winner or the amount paid. To analyze collusion, a richer environment is required than that required to analyze non-cooperative behavior. We must account for the possibility of shill bidders as well as mechanism payment rules that may depend on the reports of cartel members or their bids at the auction. We show there are cases in which a coalition at a first price auction can produce no gain for the coalition members beyond what is attainable from non-cooperative play. In contrast, a coalition at a second price auction captures the entire collusive gain. For collusion to be effective at a first price auction we show that the coalition must submit two bids that are different but close to one another, a finding that has important empirical implicationsauctions, collusion, bidding rings, shill
Time-reversible Born-Oppenheimer molecular dynamics
We present a time-reversible Born-Oppenheimer molecular dynamics scheme,
based on self-consistent Hartree-Fock or density functional theory, where both
the nuclear and the electronic degrees of freedom are propagated in time. We
show how a time-reversible adiabatic propagation of the electronic degrees of
freedom is possible despite the non-linearity and incompleteness of the
self-consistent field procedure. Time-reversal symmetry excludes a systematic
long-term energy drift for a microcanonical ensemble and the number of
self-consistency cycles can be kept low (often only 2-4 cycles per nuclear time
step) thanks to a good initial guess given by the adiabatic propagation of the
electronic degrees of freedom. The time-reversible Born-Oppenheimer molecular
dynamics scheme therefore combines a low computational cost with a physically
correct time-reversible representation of the dynamics, which preserves a
detailed balance between propagation forwards and backwards in time.Comment: 4 pages, 4 figure
Addressing student models of energy loss in quantum tunnelling
We report on a multi-year, multi-institution study to investigate student
reasoning about energy in the context of quantum tunnelling. We use ungraded
surveys, graded examination questions, individual clinical interviews, and
multiple-choice exams to build a picture of the types of responses that
students typically give. We find that two descriptions of tunnelling through a
square barrier are particularly common. Students often state that tunnelling
particles lose energy while tunnelling. When sketching wave functions, students
also show a shift in the axis of oscillation, as if the height of the axis of
oscillation indicated the energy of the particle. We find inconsistencies
between students' conceptual, mathematical, and graphical models of quantum
tunnelling. As part of a curriculum in quantum physics, we have developed
instructional materials to help students develop a more robust and less
inconsistent picture of tunnelling, and present data suggesting that we have
succeeded in doing so.Comment: Originally submitted to the European Journal of Physics on 2005 Feb
10. Pages: 14. References: 11. Figures: 9. Tables: 1. Resubmitted May 18 with
revisions that include an appendix with the curriculum materials discussed in
the paper (4 page small group UW-style tutorial
Parameterized Inapproximability of Target Set Selection and Generalizations
In this paper, we consider the Target Set Selection problem: given a graph
and a threshold value for any vertex of the graph, find a minimum
size vertex-subset to "activate" s.t. all the vertices of the graph are
activated at the end of the propagation process. A vertex is activated
during the propagation process if at least of its neighbors are
activated. This problem models several practical issues like faults in
distributed networks or word-to-mouth recommendations in social networks. We
show that for any functions and this problem cannot be approximated
within a factor of in time, unless FPT = W[P],
even for restricted thresholds (namely constant and majority thresholds). We
also study the cardinality constraint maximization and minimization versions of
the problem for which we prove similar hardness results
Antitrust leniency with multiproduct colluders
We use a global games approach to model alternative implementations of an antitrust leniency program as applied to multiproduct colluders. We derive several policy design lessons; e.g., we show that it is possible that linking leniency across products increases the likelihood of conviction in the first product investigated but reduces it in subsequent products. Thus, firms may have an incentive to form sacrificial cartels and apply for leniency in less valuable products to reduce convictions in more valuable products. Cartel profiling can mitigate this undesirable effect, but also reduces the probability of conviction in the first product investigated
Nigerian scam e-mails and the charms of capital
So-called '419' or 'advance-fee' e-mail frauds have proved remarkably successful. Global losses to these scams are believed to run to billions of dollars. Although it can be assumed that the promise of personal gain which these e-mails hold out is part of what motivates victims, there is more than greed at issue here. How is it that the seemingly incredible offers given in these unsolicited messages can find an audience willing to treat them as credible? The essay offers a speculative thesis in answer to this question. Firstly, it is argued, these scams are adept at exploiting common presuppositions in British and American culture regarding Africa and the relationships that are assumed to exist between their nations and those in the global south. Secondly, part of the appeal of these e-mails lies in the fact that they appear to reveal the processes by which wealth is created and distributed in the global economy. They thus speak to their readers’ attempts to map or conceptualise the otherwise inscrutable processes of that economy. In the conclusion the essay looks at the contradictions in the official state response to this phenomena
- …