4,389 research outputs found

    Collaboration in Social Networks

    Full text link
    The very notion of social network implies that linked individuals interact repeatedly with each other. This allows them not only to learn successful strategies and adapt to them, but also to condition their own behavior on the behavior of others, in a strategic forward looking manner. Game theory of repeated games shows that these circumstances are conducive to the emergence of collaboration in simple games of two players. We investigate the extension of this concept to the case where players are engaged in a local contribution game and show that rationality and credibility of threats identify a class of Nash equilibria -- that we call "collaborative equilibria" -- that have a precise interpretation in terms of sub-graphs of the social network. For large network games, the number of such equilibria is exponentially large in the number of players. When incentives to defect are small, equilibria are supported by local structures whereas when incentives exceed a threshold they acquire a non-local nature, which requires a "critical mass" of more than a given fraction of the players to collaborate. Therefore, when incentives are high, an individual deviation typically causes the collapse of collaboration across the whole system. At the same time, higher incentives to defect typically support equilibria with a higher density of collaborators. The resulting picture conforms with several results in sociology and in the experimental literature on game theory, such as the prevalence of collaboration in denser groups and in the structural hubs of sparse networks

    Energy in Agriculture: Energy for Swine Facilities Part II: Alternative Sources of Energy

    Get PDF
    Recently, there has been some concern about energy utilization in agricultural production. Shortages of natural and LP gas have affected many livestock producers, especially swine producers utilizing LP gas as a supplemental heat source in farrowing facilities. These shortages, coupled with an ever-increasing price for fuel and electricity, have encouraged many producers to begin looking for alternative energy sources

    Energy in Agriculture: Energy for Swine Facilities Part I: Energy Conservation

    Get PDF
    Recently, there has been some concern about energy utilization in agricultural production. Shortages of natural and LP gas have affected many livestock producers, especially swine producers utilizing LP gas as a supplemental heat source in farrowing facilities. These shortages, coupled with an ever*increasing price for fuel and electricity, have encouraged many producers to begin looking for ways to reduce energy consumption

    Sertraline Hydrochloride

    Get PDF
    This poster, presented at the Natural Sciences Poster Session at Parkland College, provides the chemical makeup, dosage, and effects of Sertraline Hydrochloride, trade name Zoloft, used to treat the symptoms of depression, obsessive compulsive disorder, panic disorder, social anxiety disorder, premenstual dysphoric disorder, generalized anxiety, and post-traumatic stress disorder

    The Nordic Market: Signs of Stress?

    Get PDF
    The supply shock that hit the Nordic electricity market in 2002-2003 put the market to a severe test. A sharp reduction in inflow to hydro reservoirs during the normally wet months of late autumn pushed electricity prices to unprecedented levels. We take this event as the starting point for analysing some potential weaknesses of the Nordic market. We conclude that fears regarding supply security and adequacy are likely to be unfounded. Nevertheless, as inherited over-capacity is eroded, and new market-based environmental regulation takes effect, tighter market conditions are to be expected. It is then crucial that retail markets are fully developed so as to allow consumers to adequately protect themselves from occurrences of price spikes.

    A Dairy Cow Housing System Featuring Motel Free Stalls

    Get PDF
    The term motel free stalls describes a milking cow housing system that utilizes roof area which protects only the free stalls. Alleys are only partially protected by the roof overhang. This system provides little protection from extreme temperatures but can provide some summer protection if properly constructed. Motel free stall systems reduce the initial cost of constructing lactating cow housing. Motel free stall system described in this paper should be used with caution in climatic regions colder than Kentucky because of limited protection from extreme cold temperatures. This paper describes the application of motel free stall housing systems and a dairy operation that utilizes them

    Quantum authentication and encryption with key recycling

    Get PDF
    We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping attacks, and re-usability of the key in case no eavesdropping took place: the entire key can be securely re-used for encrypting new messages as long as no attack is detected. This is known to be impossible for fully classical schemes, where there is no way to detect plain eavesdropping attacks. This particular application of quantum techniques to cryptography was originally proposed by Bennett, Brassard and Breidbart in 1982, even before proposing quantum-key-distribution, and a simple candidate scheme was suggested but no rigorous security analysis was given. The idea was picked up again in 2005, when Damgård, Pedersen and Salvail suggested a new scheme for the same task, but now with a rigorous security analysis. However, their scheme is much more demanding in terms of quantum capabilities: it requires the users to have a quantum computer. In contrast, and like the original scheme by Bennett et al., our new scheme requires from the honest users merely to prepare and measure single BB84 qubits. As such, we not only show the first provably-secure scheme that is within reach of current technology, but we also confirm Bennett et al.’s original intuition that a scheme in the spirit of their original construction is indeed secure

    Complete Insecurity of Quantum Protocols for Classical Two-Party Computation

    Get PDF
    A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other's input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both parties (two-sided computation) and that is secure against a cheating Bob can be completely broken by a cheating Alice. Whereas it is known that quantum protocols for this task cannot be completely secure, our result implies that security for one party implies complete insecurity for the other. Our findings stand in stark contrast to recent protocols for weak coin tossing, and highlight the limits of cryptography within quantum mechanics. We remark that our conclusions remain valid, even if security is only required to be approximate and if the function that is computed for Bob is different from that of Alice.Comment: v2: 6 pages, 1 figure, text identical to PRL-version (but reasonably formatted

    Monitoring and Pay: An Experiment on Employee Performance under Endogenous Supervision

    Get PDF
    We present an experimental test of a shirking model where monitoring intensity is endogenous and effort a continuous variable. Wage level, monitoring intensity and consequently the desired enforceable effort level are jointly determined by the maximization problem of the firm. As a result, monitoring and pay should be complements. In our experiment, between and within treatment variation is qualitatively in line with the normative predictions of the model under standard assumptions. Yet, we also find evidence for reciprocal behavior. Our data analysis shows, however, that it does not pay for the employer to solely rely on the reciprocity of employees
    corecore