4,266 research outputs found

    The Chemical Evolution of the Milky Way: the Three Infall Model

    Full text link
    We present a new chemical evolution model for the Galaxy that assumes three main infall episodes of primordial gas for the formation of halo, thick and thin disk, respectively. We compare our results with selected data taking into account NLTE effects. The most important parameters of the model are (i) the timescale for gas accretion, (ii) the efficiency of star formation and (iii) a threshold in the gas density for the star formation process, for each Galactic component. We find that, in order to best fit the features of the solar neighbourhood, the halo and thick disk must form on short timescales (~0.2 and ~1.25 Gyr, respectively), while a longer timescale is required for the thin-disk formation. The efficiency of star formation must be maximum (10 Gyr-1) during the thick-disk phase and minimum (1 Gyr-1) during the thin-disk formation. Also the threshold gas density for star formation is suggested to be different in the three Galactic components. Our main conclusion is that in the framework of our model an independent episode of accretion of extragalactic gas, which gives rise to a burst of star formation, is fundamental to explain the formation of the thick disk. We discuss our results in comparison to previous studies and in the framework of modern galaxy formation theories.Comment: 12 pages, 7 figures, accepted for publication in MNRA

    Knightian Auctions

    Full text link
    We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor \delta{} in (0,1), and the mechanism designer knows \delta. The classical notions of implementation in dominant strategies and implementation in undominated strategies are naturally extended to this setting, but their power is vastly different. On the negative side, we prove that no dominant-strategy mechanism can guarantee social welfare that is significantly better than that achievable by assigning the good to a random player. On the positive side, we provide tight upper and lower bounds for the fraction of the maximum social welfare achievable in undominated strategies, whether deterministically or probabilistically

    Knightian Analysis of the Vickrey Mechanism

    Full text link
    We analyze the Vickrey mechanism for auctions of multiple identical goods when the players have both Knightian uncertainty over their own valuations and incomplete preferences. In this model, the Vickrey mechanism is no longer dominant-strategy, and we prove that all dominant-strategy mechanisms are inadequate. However, we also prove that, in undominated strategies, the social welfare produced by the Vickrey mechanism in the worst case is not only very good, but also essentially optimal.Comment: To appear in Econometric

    Perfect Implementation

    Get PDF
    Privacy and trust aect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism - by disregarding the players' privacy, or assuming trust in a mediator - may fail to reach the mechanism's objectives. We thus investigate implementations of a new type. We put forward the notion of a perfect implementation of a normal-form mechanism M: in essence, a concrete extensive-form mechanism exactly preserving all strategic properties of M, without relying on a trusted mediator or violating the privacy of the players. We prove that any normal-form mechanism can be perfectly implemented by a verifiable mediator using envelopes and an envelope-randomizing device (i.e., the same tools used for running fair lotteries or tallying secret votes). Differently from a trusted mediator, a veriable one only performs prescribed public actions, so that everyone can verify that he is acting properly, and that he never learns any information that should remain private

    Networked media actions as hacktions: rethinking resistance(s) in media ecologies

    Get PDF
    This article attempts to rethink a notion of resistance for contemporary forms of dissent and opposition that are increasingly organised through digital media and networks. Applying a post-human compass on hacking, a processual reading of the hack is implied to propose a movement towards the idea of hacktions. Hacktions are networked media actions that involve an aesthetic register of de-subjective creativity, aiming towards systematic disruptions: the active resistances of a media ecological dysfunctionality

    Collusion-Resilient Revenue In Combinatorial Auctions

    Get PDF
    In auctions of a single good, the second-price mechanism achieves, in dominantstrategies, a revenue benchmark that is naturally high and resilient to anypossible collusion.We show how to achieve, to the maximum extent possible, the same propertiesin combinatorial auctions

    Very Simple and Efficient Byzantine Agreement

    Get PDF
    We present a very simple, cryptographic, binary Byzantine-agreement protocol that, with n >= 3t+1 >= 3 players, at most t of which are malicious, halts in expected 9 rounds
    • …
    corecore