329 research outputs found

    Endogenous Information Acquisition on Opponents' Valuations in Multidimensional First Price Auctions

    Get PDF
    This paper investigates bidder's covert behavior of endogenous information acquisition on her opponents' valuations in first price auction model with independent private values. Such an information acquisition setting leads to bidimensional type space and bidimensional strategy space. We consider two different specifications of the environments: the ex ante information acquisition setting and the interim information acquisition setting. In equilibria the expected payoffs of the bidder under these specifications could exceed the counterpart payoffs of the corresponding standard sealed-bid auctions without information acquisition as long as the cost is small, but the auctioneer has lower payoffs in these models than those of the standard ones. Moreover, the incurred information cost becomes the deadweight loss, resulting in ine±cient outcomes

    Vickrey Auctions with Sequential and Costly Participation

    Get PDF
    This paper investigates the cutoff strategies and the effects of sequential and costly participation in Vickrey auctions with independent private value settings. It demonstrates a Stackelberg version of participation decision in auctions, while simultaneous participation can be regarded as a Cournot version in auctions. Buyers adopt cut-off participation strategies. In two-buyer case, the cutoff strategy equilibrium is unique. The follower's critical values are always monotonic in participation cost in both symmetric and asymmetric settings. This is also true for the leader with mild conditions on c.d.fs. We also characterize equilibria in three-buyer and more general n-buyer environments. We then study buyer's preference to be a leader or a follower. Comparison with simultaneous model shows that the driven-out effect is much stronger in our sequential participation model, which implies the simultaneous specification might not be desirable

    Log-Less Metadata Management on Metadata Server for Parallel File Systems

    Get PDF
    This paper presents a novel metadata management mechanism on the metadata server (MDS) for parallel and distributed file systems. In this technique, the client file system backs up the sent metadata requests, which have been handled by the metadata server, so that the MDS does not need to log metadata changes to nonvolatile storage for achieving highly available metadata service, as well as better performance improvement in metadata processing. As the client file system backs up certain sent metadata requests in its memory, the overhead for handling these backup requests is much smaller than that brought by the metadata server, while it adopts logging or journaling to yield highly available metadata service. The experimental results show that this newly proposed mechanism can significantly improve the speed of metadata processing and render a better I/O data throughput, in contrast to conventional metadata management schemes, that is, logging or journaling on MDS. Besides, a complete metadata recovery can be achieved by replaying the backup logs cached by all involved clients, when the metadata server has crashed or gone into nonoperational state exceptionally

    Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies

    Get PDF
    In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two networks. For the IPv4 network, the phase change occurred in 2001. Before then the network's size grew exponentially, and thereafter it followed a linear growth. Changes are also observed around the same time for the maximum node degree, the average node degree and the average shortest path length. For the IPv6 network, the phase change occurred in late 2006. It is notable that the observed phase transitions in the two networks are different, for example the size of IPv6 network initially grew linearly and then shifted to an exponential growth. Our results show that following decades of rapid expansion up to the beginning of this century, the IPv4 network has now evolved into a mature, steady stage characterised by a relatively slow growth with a stable network structure; whereas the IPv6 network, after a slow startup process, has just taken off to a full speed growth. We also provide insight into the possible impact of IPv6-over-IPv4 tunneling deployment scheme on the evolution of the IPv6 network. The Internet topology generators so far are based on an inexplicit assumption that the evolution of Internet follows non-changing dynamic mechanisms. This assumption, however, is invalidated by our results.Our work reveals insights into the Internet evolution and provides inputs to future AS-Level Internet models.Comment: 12 pages, 21 figures; G. Zhang et al.,Phase changes in the evolution of the IPv4 and IPv6 AS-Level Internet topologies, Comput. Commun. (2010

    Elliptical ring distribution probability-based damage imaging method for complex aircraft structures

    Get PDF
    In engineering applications, the robustness and effectiveness of damage diagnostic imaging for guided wave-based structural health monitoring could be affected by the complexity of structures. In this study, an elliptical ring distribution probability-based diagnostic imaging algorithm is proposed to mitigate this effect using the estimated wave velocity and damage index. This algorithm improves the ability of damage localization by modifying the defect distribution probability of probability-based diagnostic imaging. The elliptical ring distribution probability of the presence of defect is used for each sensing path in the algorithm. The width of the elliptical ring distribution probability is determined by the range of estimated wave velocity. The amplitude of the elliptical ring distribution probability is determined by the damage index. The damage location is determined by the cross region of different elliptical rings for different sensing paths. The capability of the algorithm is validated by identifying damages at different locations on a complex composite fuselage panel. The results show that the proposed algorithm can identify a single damage accurately and it can identify multiple damages effectively as well
    corecore