Dissertations / Theses on the topic 'Sharing rule'

To see the other types of publications on this topic, follow the link: Sharing rule.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 dissertations / theses for your research on the topic 'Sharing rule.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Youzhong. "Rule warehouse system for knowledge sharing and business collaboration." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/anp4027/Youzhong%5FLiu%5FDissertation.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Florida, 2001.
Title from first page of PDF file. Document formatted into pages; contains xi, 121 p.; also contains graphics. Vita. Includes bibliographical references (p. 113-120).
APA, Harvard, Vancouver, ISO, and other styles
2

Hällstrand, Dorcas. "Master’s Thesis in Political Science Democratization in southern Africa: Process and Challenges : A case study of Zimbabwe’s divergent path in its democratic transition." Thesis, Högskolan Dalarna, Statsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:du-35030.

Full text
Abstract:
Despite promising prospects to transition towards a democracy after attaining its independence in 1980, Zimbabwe somehow fell into authoritarian rule and became increasingly undemocratic compared to other countries in southern Africa. Therefore, this thesis seeks to understand why a “most likely” case of democratization in the region failed and instead slipped into authoritarianism between 1980 and 2000. The single case study investigates a set of elite level dynamics, using components of process tracing and case study techniques. The analysis is built upon a theoretical framework focusing on dimensions of power dynamics in terms of Bratton’s power capture, power division and power sharing along with Svolik’s politics of authoritarian rule and the dominant party system. The research indicates that the political party Zanu-Pf, under the leadership of Mugabe, has dominated the political arena since the first democratic elections of 1980. With the help of the party’s majority, the ruling elites captured, divided, shared and controlled power; to serve authoritarian ends that ensured regime survival at the expense of democracy.
APA, Harvard, Vancouver, ISO, and other styles
3

Julie, Elmerie. "A mathematical model for managing equity-linked pensions." Thesis, University of the Western Cape, 2007. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_1071_1181655014.

Full text
Abstract:

Pension fund companies manage and invest large amounts of money on behalf of their members. In return for their contributions, members expect a benefit at termination of their contract. Due to the volatile nature of returns that pension funds attain, pension companies started attaching a minimum guaranteed amount to member&rsquo
s benefits. In this mini-thesis we look at the pioneering work of Brennan and Schwartz [10] for pricing these minimum guarantees. The model they developed prices these minimum guarantees using option pricing theory. We also look at the model proposed by Deelstra et al. which prices minimum guarantees in a stochastic financial setting. We conclude this mini-thesis with new contributions where we look at simple alternative ways of pricing minimum guarantees. We conclude this mini-thesis with an approach, related to the work of Brennan and Schwartz [10], whereby the member&rsquo
s benefit is maximised for a given minimum guaranteed amount, which comprises of multi-period guarantees. We formulate a method to find the optimal stream of these multi-period guarantees.

APA, Harvard, Vancouver, ISO, and other styles
4

Chevallier, Julien. "The European carbon market (2005-2007): banking, pricing and risk hedging strategies." Diss., University of Paris 10, 2008. http://hdl.handle.net/10919/71614.

Full text
Abstract:
This thesis investigates the market rules of the European carbon market (EU ETS) during 2005-2007. We provide theoretical and empirical analyses of banking and borrowing provisions, price drivers and risk hedging strategies attached to tradable quotas, which were introduced to cover the CO2 emissions of around 10,600 installations in Europe.In Chapter 1, we outline the economic and environmental effects of banking and borrowing on tradable permits markets. More specifically, we examine the banking and borrowing provisions adopted in the EU ETS, and the effects of banning banking between Phases I and II on CO2 price changes. We show statistically that the low levels of CO2 prices recorded until the end of Phase I may be explained by the restriction on the inter-period tranfer of allowances, besides the main explanations that were identified by market observers.In Chapter 2, we identify the carbon price drivers since the launch of the EU ETS on January 1, 2005. We emphasize the central role played by the 2005 yearly compliance event imposed by the European Commission in revealing the net short/long position at the installation level in terms of allowances allocated with respect to verified emissions. The main result of this study features that price drivers of CO2 allowances linked to energy market prices and unanticipated weather events vary around institutional events. Moreover, we show the influence of the variation of industrial production in three sectors covered by the EU ETS on CO2 price changes by applying a disentangling analysis, that has also been extended at the country-level.In Chapter 3, we focus on the risk hedging strategies linked to holding CO2 allowances. By using a methodology applied on stock markets, we recover the changes in investors' average risk aversion. This study shows that, during the time period considered, risk aversion has been higher on the carbon market than on the stock market, and that the risk is linked to an increasing price structure after the 2006 compliance event. With reference to Chapter 1, we finally evaluate how banking may be used as a risk management tool in order to cope with political uncertainty on a tradable permits market. We detail an optimal risk-sharing rule, and discuss the possibility of pooling the risk linked to allowance trading between agents.Overall, this thesis highlights the inefficiencies following the creation of the European carbon market that prevented the emergence of a price signal leading to effective emissions reductions by industrials. However, in a changing institutional environment, these inefficiencies do not seem to have been transfered to the period 2008-2012.
APA, Harvard, Vancouver, ISO, and other styles
5

RICUPERO, GIUSEPPE. "Exploring Data Hierarchies to Discover Knowledge in Different Domains." Doctoral thesis, Politecnico di Torino, 2019. http://hdl.handle.net/11583/2744938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hampson, Philip Robert Osler. "Optimal profit sharing rules for petroleum exploration and development in Jordan." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/37700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Andrade, Rodrigo Bomfim de. "Sequential cost-reimbursement rules." reponame:Repositório Institucional do FGV, 2014. http://hdl.handle.net/10438/11736.

Full text
Abstract:
Submitted by Rodrigo Andrade (rodrigo.bomfim@fgvmail.br) on 2014-04-24T15:32:00Z No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5)
Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2014-04-30T19:55:08Z (GMT) No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-05-08T13:35:03Z (GMT) No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5)
Made available in DSpace on 2014-05-08T13:40:17Z (GMT). No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5) Previous issue date: 2014-03-17
This paper studies cost-sharing rules under dynamic adverse selection. We present a typical principal-agent model with two periods, set up in Laffont and Tirole's (1986) canonical regulation environment. At first, when the contract is signed, the firm has prior uncertainty about its efficiency parameter. In the second period, the firm learns its efficiency and chooses the level of cost-reducing effort. The optimal mechanism sequentially screens the firm's types and achieves a higher level of welfare than its static counterpart. The contract is indirectly implemented by a sequence of transfers, consisting of a fixed advance payment based on the reported cost estimate, and an ex-post compensation linear in cost performance.
Este trabalho estuda regras de compartilhamento de custos sob seleção adversa dinâmica. Apresentamos um modelo típico de agente-principal com dois períodos, fundamentado no ambiente canônico de regulação de Laffont e Tirole (1986). De início, quando da assinatura do contrato, a firma possui incerteza prévia sobre seu parâmetro de eficiência. No segundo período, a firma aprende a sua eficiência e escolhe o nível de esforço para reduzir custos. O mecanismo ótimo efetua screening sequencial entre os tipos da firma e atinge um nível de bem-estar superior ao alcançado pelo mecanismo estático. O contrato é implementado indiretamente por uma sequência de transferências, que consiste em um pagamento fixo antecipado, baseado na estimativa de custos reportada pela firma, e uma compensação posterior linear no custo realizado.
APA, Harvard, Vancouver, ISO, and other styles
8

Ben, Cheikh Henda. "Evaluation et optimisation de la performance des flots dans les réseaux stochastiques à partage de bande passante." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0013/document.

Full text
Abstract:
Nous étudions des modèles mathématiques issus de la théorie des files d’attente pour évaluer et optimiser les performances des mécanismes de partage de ressources entre flots dans les réseaux. Dans une première partie, nous proposons des approximations simples et explicites des principales métriques de performance des flots élastiques dans les réseaux à partage de bande passante opérant sous le mode ”équité équilibré”. Nous étudions ensuite le partage de bande passante entre flux élastiques et flux de streaming en supposant que le nombre de ces derniers est limité par un mécanisme de contrôle d’admission et proposons des approximations de performance basées sur une hypothèse de quasi stationnarité. Les résultats de simulation montrent le bon niveau de précision des approximations proposées.Dans une deuxième partie, nous étudions le compromis entre délai et énergie dans les réseaux à partage de bande passante dont les noeuds peuvent réguler leur vitesse en fonction de la charge du système. En supposant que le réseau est initialement dans un état de congestion, on s’intéresse à la politique optimale d’allocation de débit permettant de le vider à coût minimal. L’analyse de la politique stochastique optimale via la théorie des processus de décision markoviens étant extrêmement difficile, nous proposons de l’approximer en utilisant un modèle fluide déterministe qui peut être résolu grâce à des techniques de contrôle optimal. Pour le cas d’un seul lien partagé par plusieurs classes de trafic, on montre que la politique optimale correspond à la règle cμ et on propose une expression explicite de la vitesse optimale. Enfin, dans une troisième partie, on s’intéresse aux plateformes de Cloud Computing dans le cadre du modèle SaaS. En supposant un partage équitable des ressources physiques entre machines virtuelles s’exécutant de manière concurrente, nous proposons des modèles de file d’attente simples pour prédire les temps de réponse des applications. Les modèles proposés prennent explicitement en compte le comportement des différentes classes d’application (tâches interactives, de calcul ou permanentes). Les expérimentations menées sur une plateforme réelle montrent que les modèles mathématiques obtenus permettent de prédire les temps de réponse avec une bonne précision
We study queueing-theoretic models for the performance evaluation and optimization of bandwidth-sharing networks. We first propose simple and explicit approximations for the main performance metrics of elastic flows in bandwidth-sharing networks operating under balanced fairness. Assuming that an admission control mechanism is used to limit the number of simultaneous streaming flows, we then study the competition for bandwidth between elastic and streaming flows and propose performance approximations based on a quasi-stationary assumption. Simulation results show the good accuracy of the proposed approximations. We then investigate the energy-delay tradeoff in bandwidth-sharing networks in which nodes can regulate their speed according to the load of the system. Assuming that the network is initially congested, we investigate the rate allocation to the classes that drains out the network with minimum total energy and delay cost. We formulate this optimal resource allocation problem as a Markov decision process which proves tobe both analytically and computationally challenging. We thus propose to solve this stochastic problem using a deterministic fluid approximation. For a single link sharedby an arbitrary number of classes, we show that the optimal-fluid solution follows thewell-known cμ rule and give an explicit expression for the optimal speed. Finally, we consider cloud computing platforms under the SaaS model. Assuming a fair share of the capacity of physical resources between virtual machines executed concurrently, we propose simple queueing models for predicting response times of applications.The proposed models explicitly take into account the different behaviors of the different classes of applications (interactive, CPU-intensive or permanent applications). Experiments on a real virtualized platform show that the mathematical models allow to predict response times accurately
APA, Harvard, Vancouver, ISO, and other styles
9

Muchna, Jan. "The Bankruptcy Rules in Linear Ordered Structures." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-81888.

Full text
Abstract:
The bankruptcy problem involves the distribution of perfectly divisible goods. Particular attention is paid to the situations, where the amount of goods available is not enough to cover the demand. An example of real life situations that can be solved using various bankruptcy rules may be a division of a heritage or when a company goes bankrupt and its estates are sold to satisfy interested parties' claims. This paper introduces to the problem a linear structure of the participants, meaning that participants are now satisfied one after another in a preset order. It applies the equal awards (CEA) and the equal losses (CEL) solutions on the revised problem. Since their axiomatization is no longer valid, both solutions are extended and new characterizations are given in the thesis. The thesis contains a series of original proofs for both extended solutions and whole problem is examined in the setting of the well-known river sharing problem.
APA, Harvard, Vancouver, ISO, and other styles
10

Neumeister, Christian C. "The Emiratization of Shari'a: Islam, Modernization and the Legal System of the United Arab Emirates." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1142.

Full text
Abstract:
The United Arab Emirates' legal system has developed though the continued negotiation between the Shari’a and the Civil Courts over the spheres of criminal law and commercial law. The framework that has emerged, as a result of regime politics and Supreme Court rulings, provides the regime the flexibility to continue their commercial development and integration into the modern global economy, while retaining the domestic authority structures that legitimate their power.
APA, Harvard, Vancouver, ISO, and other styles
11

Colacce, Maira. "Three essays on intra-household distribution of resources and poverty." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0121.

Full text
Abstract:
Cette thèse analyse les modèles d'inégalités intra-ménage dans les pays non développés et la manière dont ils sont affectés par la culture et les politiques. À l'aide d'enquêtes sur les dépenses des ménages, j'utilise un modèle collectif pour analyser la répartition de la consommation des ménages et ses moteurs, et pour évaluer ses implications pour la pauvreté individuelle.Dans le premier chapitre, je présente des résultats inédits sur la répartition des ressources au sein des ménages dans 45 pays à revenu faible ou intermédiaire. Les résultats révèlent que les femmes sont presque deux fois plus pauvres que les hommes à l'échelle mondiale, et que les enfants sont encore plus démunis. En outre, les disparités au sein des ménages sont plus prononcées dans les pays pauvres et, au sein des pays, parmi les ménages pauvres.Dans le deuxième chapitre, je cherche à savoir si les coutumes de résidence post-matrimoniale fondées sur la parenté - en particulier la patrilocalité (résidence avec les parents du marié) et la matrilocalité (résidence avec les parents de la mariée) - continuent d'influencer le partage de la consommation des ménages et les niveaux de pauvreté individuels au Ghana et au Malawi. L'analyse indique que la patrilocalité ancestrale, comparée à la matrilocalité, correspond à une allocation réduite des ressources aux femmes et à une incidence notablement plus élevée de la pauvreté chez les femmes pour les différents niveaux de consommation des ménages.Dans le troisième chapitre, j'examine l'impact du plus grand programme d'aide sociale de l'Uruguay, qui cible les familles pauvres avec enfants et qui est versé aux femmes. En utilisant un modèle de discontinuité de la régression dans un cadre d'estimation structurelle, je constate une augmentation significative de l'allocation des ressources aux femmes éligibles dans les zones rurales, sans effets sur les enfants. Je traduis ces résultats en termes de pauvreté individuelle : tous les membres de la famille bénéficient de l'effet de revenu, mais l'effet de négociation réduit encore plus la pauvreté des femmes
This dissertation analyzes the patterns of intra-household inequalities in non-developed countries and how they are affected by culture and policies. Using household expenditure surveys, I employ a collective model to analyze household consumption allocation and its drivers, and to assess its implications for individual poverty.In the first chapter, I present novel findings on intra-household resource distribution for 45 low- and middle-income countries. The results reveal that women are nearly twice as poor as men on a global scale, with children experiencing even greater deprivation. Furthermore, intra-household disparities are more pronounced in poor countries and, within countries, among poor households.In the second chapter, I investigate whether kinship-based post-marital residence customs—specifically, patrilocality (residing with the groom's parents) and matrilocality (residing with the bride's parents)—continue to influence household consumption sharing and individual poverty levels in Ghana and Malawi. Analysis indicates that ancestral patrilocality, compared to matrilocality, corresponds with reduced resource allocation to women and a notably higher incidence of poverty among women across various household consumption levels.In the third chapter, I examine the impact of Uruguay's largest social assistance program, which targets poor families with children and paid to women. Employing a regression discontinuity design within a structural estimation framework, I find a significant increase in resource allocation to eligible women in rural areas, with no effects on children. I translate these results into terms of individual poverty: all family members benefit from the income effect, but the bargaining effect reduces women's poverty even more
APA, Harvard, Vancouver, ISO, and other styles
12

Islam, M. D. Nazrul. "Equitable sharing of the water of the Ganges : applicable procedural principles and rules under international law and their adequacy." Thesis, SOAS, University of London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Carlisle, Jessica. "Rules, negociation, claims and counter claims : Judicial discretion in a damascus Shari's Court." Thesis, SOAS, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.498278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lefebvre, Marianne. "Mécanismes d'allocation de l'eau d'irrigation et gestion du risque sécheresse en agriculture." Thesis, Montpellier 1, 2011. http://www.theses.fr/2011MON10026/document.

Full text
Abstract:
Avec le changement climatique, l'agriculture va devoir s'adapter à des sécheresses de plus en plus fréquentes et sévères. C'est le secteur le plus consommateur d'eau et celui à qui le plus d'efforts dans la réduction des prélèvements va être demandé. Les mécanismes d'allocation de l'eau existants (prix, marché, dispositifs de rationnement...) négligent souvent la forte variabilité de la disponibilité de la ressource. Or, la façon dont est partagée l'eau en cas de rareté influence le risque subi par les agriculteurs. Afin de réduire le coûts pour les agriculteurs et la société du risque sécheresse, il convient d'améliorer les outils de partage de l'eau et d'y intégrer des mécanismes de gestion du risque. C'est la question qui est étudiée dans cette thèse. Cette réflexion a été menée dans deux contextes très différents: la France, où le partage de l'eau est administré par les représentants de l'État en cas de sécheresse; l'Australie où des systèmes de marchés de l'eau ont été mis en place pour permettre les échanges d'eau entre agriculteurs. La thèse est composée de 3 articles (chapitres 2,3 et 5 en anglais) et d'éléments de cadrage (chapitres 1 et 4 en français). Le chapitre 1 présente la gestion de l'eau agricole en France. Les chapitres 2 et 3 étudient les interactions entre les règles utilisées pour le rationnement de l'eau d'irrigation en cas de sécheresse en France et les stratégies d'auto-assurance des agriculteurs. Nous étudions notamment le cas du stockage d'eau au niveau de l'exploitation, outil de gestion du risque de plus en plus mobilisé par les agriculteurs français. Le chapitre 2 modélise une situation où des agents ont la possibilité de substituer l'usage d'une ressource coûteuse mais sécurisée à l'usage de la ressource commune risquée. Nous déterminons la règle de partage optimale sous deux hypothèses distinctes: i) le planificateur définit simultanément la règle de partage et les choix de diversifications de façon à maximiser le bien être social; ii) le décideur utilise la règle de partage comme un instrument incitant les usagers à faire des choix de diversification optimaux d'un point de vue social. Le chapitre 3 est une expérience de laboratoire visant à comparer différentes règles de partage d'une ressource commune de taille incertaine quand les sujets peuvent choisir entre l'utilisation de cette ressource commune ou l'investissement dans une ressource sécurisée. Les règles sont évaluées sur leur aptitude à faciliter la coordination des agents autour du niveau optimal d'investissement dans la ressource sécurisée. La discussion des résultats de ces deux articles permet de proposer des recommandations aux administrations en charge de la mise en place des règles de partage de la ressource en cas de sécheresse, notamment dans le cadre de la réforme en cours en France (création des Organismes Uniques). Le chapitre 4 présente le fonctionnement des marchés de l'eau et le système de gestion des sécheresses en Australie. Le chapitre 5 étudie les gains de la mise en place de droits d'eau avec différents niveaux de sécurité, à l'aide d'une expérience de laboratoire capturant l'essence des marchés de l'eau australiens. Nous trouvons qu'un système avec deux niveaux de sécurité améliore l'efficacité allocative et le partage du risque mais seulement quand les coûts de transaction sont plus élevés sur le marché des allocations que sur le marché des droits d'eau. La mise en place de droits différenciés peut conduire à une diminution de la coût-efficacité du mécanisme en raison de l'augmentation des échanges sur le marché des droits d'eau et donc des coûts de transaction payés par les agriculteurs quand ceux-ci sont élevés sur le marché des droits
With climate change, agriculture will have to adapt to face increasingly frequent and more severe droughts. Agriculture is the largest consumer of water and will face most of the water restrictions in the coming years. Existing water allocation mechanisms (pricing, water markets, rationing scheme) often fail to take into account the high variability of the resource, whereas those mechanisms have strong impacts on the risk born by agricultural water users. Water allocation schemes can contribute to reduce the cost of drought risk for farmers and society by integrating risk management mechanisms. We address this question in two different contexts: France, where water is managed by public authorities that are responsible for the rationing scheme and define the allocation of water between farmers in case of scarcity; Australia, where water markets have been implemented in order to allow water transfers between farmers. This Ph.D. dissertation is composed of 3 articles (chapter 2, 3 and 5 in English) and background information (chapter 1 and 4 in French). Chapter 1 describes the organization of irrigation water allocation in France. Chapters 2 and 3 analyze the interactions between the restrictions rules used in France to share the resource in crisis times and the self-insurance strategies of farmers. We investigate the particular example of on-farm storage, an increasingly widespread risk management tool used by French farmers. Chapter 2 models the decisions of agents heterogeneous in their risk tolerance that can substitute the use of a a secure private alternative to the use of a common pool resource of uncertain size. We find the optimal sharing rule under two assumptions concerning the regulator: i) the social planner defines simultaneously the sharing rule and the diversification choices in order to maximize social welfare; ii) the policy maker uses the sharing rule as an instrument to induce each agent to make the optimal diversification decision. Chapter 3 uses laboratory experiment to analyze how the sharing rule impacts the individual trade-off between relying on a free but uncertain resource and investing in a secure alternative resource. Rules are compared on the basis of their ability to facilitate coordination on the optimal investment in the secure resource. Chapter 4 presents how irrigation water is allocated between users in Australia in case of drought. Chapter 5 studies with a laboratory experiment, designed such as capturing the main characteristics of Australian water markets, whether offering different levels of security for water rights could potentially allow water users to manage the risks of supply uncertainty better. We find that a two security levels system improves both allocative efficiency and risk management, but only when transactions costs are higher in the market for water allocation than in the market for water rights. A system with different levels of security for water rights can be detrimental to cost-effectiveness by increasing the number of costly trades on the water rights market
APA, Harvard, Vancouver, ISO, and other styles
15

Thani, Ahmed Abdulla Farhan. "The projected Arab Court of Justice : a study to its draft statute and rules, with specific reference to the International Court of Justice and principles of Islamic Shariah." Thesis, University of Glasgow, 1999. http://theses.gla.ac.uk/1571/.

Full text
Abstract:
The present thesis deals with the projected Arab Court of Justice (ACJ) as a regional court, expected to be created within the League of Arab States system. Chapter one deals mainly with the basic structure of the League of Arab States itself, its membership, its organs, the settlement of disputes, and the reasons that are delaying the creation of the ACJ and the role it will be expected to play in settling inter-Arab disputes. In the second chapter comprehensive information on the function of the judicial power in Islamic Shariah is presented, including the status of judges in Islam, their appointment, qualifications, independence and other issues related to them. Chapter three concentrates on the organisation of the projected ACJ, comparing its draft Statute with the Statute of the International Court of Justice (ICJ) and other regional international courts. The chapter will also show how far the Arab draftsmen have been influenced by principles and rules of Islamic Shariah, especially in matters relating to the qualification of judges. Furthermore, the chapter will discuss other points related to the organisation of the bench such as nomination of candidates, system of election, constituting chambers, appointing ad hoc judges etc. The fourth chapter explains in detail at the level of theory as well as of practice the role of Islamic Shariah as a source to be applied by the projected ACJ. The chapter points to the need to discuss the origins and fundamental conceptions of Islamic Shariah as a law capable to be applied by the projected ACJ. Chapter five continues with a discussion of the jurisdiction of the ACJ, and makes detailed reference to the concepts of jurisdiction ratione personae, ratione materiae and the function of the ACJ to give advisory opinions. The thesis considers whether the Arab drafters have developed the above terms or have simply adopted them as they exist in the Statute of the International Court of Justice. The conclusions summarise the findings of the Thesis, and are accompanied by some critical remarks.
APA, Harvard, Vancouver, ISO, and other styles
16

徐嘉宏. "A Rule-Based, Decentralized Approach to Secure Information Sharing." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/94602722288070175936.

Full text
Abstract:
碩士
國立交通大學
資訊科學系所
93
As the Internet becomes a ubiquitous environment where people with different background and purposes can share their information, information security and privacy have become an increasingly critical issue. With poor protection, informa-tion systems may leak sensitive information to the open public. To reduce such risks, there have been many security mechanisms and technologies proposed and developed. Most of these approaches rely on a mixture of label-based access con-trol and information flow mechanisms. Specifically, they enforce various security policies by attaching suitable labels to information as well as users and grant data access based on these labels. However, many labeling approaches often require complicated managerial efforts in order to set up and enforce security policies cor-rectly. In addition, they focus primarily on labeling data without paying too much attention to sharing tools that process these data. As a result, whether a given tool can access a piece of data depends on who is invoking the tool, making correct security management more challenging. In this thesis, we propose an information sharing model that permits controlling information flow in a flexible, decentralized manner, where each user can specify his/her own access hierarchy instead of rely-ing on centralized security management. Based on the access hierarchy, each user can label both data and tools in a consistent manner, and can realize data declassifi-cation by restricting or relaxing the access level of individual tools. Finally, to re-duce the overhead associated with individual data labeling, we introduce a rule-based labeling mechanism to associate data with their access levels correspondingly. In summary, we believe our model is a unification of and improvement over exist-ing access control mechanisms, and can contribute to secure information sharing over the Internet.
APA, Harvard, Vancouver, ISO, and other styles
17

"Intra-household allocation, sharing rule and spousal leisure: evidence from China." 2003. http://library.cuhk.edu.hk/record=b5891613.

Full text
Abstract:
Chau Tak Wai.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 96-100).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Literature Review --- p.5
Chapter 2.1 --- Pioneering Work --- p.5
Chapter 2.2 --- Collective Household Consumption --- p.8
Chapter 2.3 --- Household Production --- p.16
Chapter 2.4 --- Tests between Unitary Model and Collective Model --- p.17
Chapter 2.5 --- Distribution Factors in Collective Labor Supply --- p.19
Chapter 2.6 --- Identification of Spousal Leisure --- p.20
Chapter 2.7 --- Plan of the thesis --- p.21
Chapter 3 --- Data Descriptions --- p.23
Chapter 3.1 --- Data Collection Process --- p.23
Chapter 3.2 --- Data Characteristics --- p.24
Chapter 4 --- Individual Wage and Labor Supply Equations --- p.30
Chapter 4.1 --- Individual Wage Equations --- p.30
Chapter 4.2 --- Individual Labor Supply Equation --- p.36
Chapter 4.3 --- Conclusion --- p.43
Chapter 5 --- Collective Household Labor Supply --- p.46
Chapter 5.1 --- Theoretical Model --- p.47
Chapter 5.2 --- Parametric Specification --- p.53
Chapter 5.3 --- Data and Empirical Results --- p.56
Chapter 5.4 --- Conclusion --- p.64
Chapter 6 --- Identification of Independent and Spousal Leisure --- p.66
Chapter 6.1 --- Theoretical Model --- p.67
Chapter 6.2 --- Parametric Specification --- p.78
Chapter 6.3 --- Data and Empirical Results --- p.82
Chapter 6.4 --- Conclusion --- p.91
Chapter 7 --- Conclusion --- p.93
References --- p.96
Tables and Appendices --- p.101
APA, Harvard, Vancouver, ISO, and other styles
18

Yuan-Chung, Chang, and 張淵琮. "The study on privacy-preserving association rule mining for data sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10395401470955928759.

Full text
Abstract:
碩士
國防大學中正理工學院
資訊科學研究所
96
Data mining is a popular technology for the application of database in recent years. In addition, association rule mining has been applied to discover the interesting relationships hidden in large databases by the administrators of some organizations. The discovered information is valuable for making decisions. Furthermore, international information organizations have dedicated to establish an “Information Sharing and Analysis Center (ISAC)” for sharing the information and providing early warning of critical events. Similarly, through data sharing from different organizations, administrators can collect more useful information to enhance their competition superiority. However, data sharing will potentially involve threats in which privacy or sensitive information is unconsciously divulged. In this study, we present an efficient algorithm for fast hiding sensitive rule sets, DSSI (decrease support of sensitive items), for privacy preservation against association rule mining. Through slightly modifying transactions in the database, the proposed algorithm can completely hide the set of sensitive association rules. This not only obtains the benefits but also reduces the risk from data sharing. This research proves that DSSI 1) can completely hide all sensitive association rule sets and 2) will not produce any new rules. Moreover, compared with the current-best works, experimental results show that DSSI 1) reduces the number of transactions modified; and 2) limits lost rules generated, i.e., all lost rules are related to the given sensitive item.
APA, Harvard, Vancouver, ISO, and other styles
19

Dlamini, Mbuso Gerald, and Mbuso Gerald Dlamini. "Privacy Preserving Data Mining and Association Rule Sharing for Business Intelligence." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7sefy2.

Full text
Abstract:
碩士
國立臺北科技大學
電資學院外國學生專班
103
The growing interest in business intelligence, cloud computing and technological advancements has necessitated the usage of data mining as a service in order to ensure business success and sustainability. As a result data mining techniques are becoming more useful to discover and understand unknown customer patterns and their behaviors through association rules discovered from the transactional databases. The lack of expertise and computational resources have compelled companies to outsource data mining activities as it is a complex and expensive exercise. However, the need to ensure privacy and confidentiality is inevitable. There has only been a few research work that has been done on privacy preservation data mining in market basket analysis. Most current researches have focused on developing privacy preserving algorithms which have only been tested on small databases with ten or less transactions. Other researches have focused on complex and resource intensive privacy preserving which are more complex and expensive for data mining service providers and for businesses. All these researches have depended on the database owner to specify the sensitive items in the database. This thesis, therefore, seeks to provide a low cost solution in privacy preservation data mining for service providers. The study aims to reduce costs and complications by providing a framework that automatically detects sensitive items in the transactional databases which are difficult and time consuming to detect manually by the owner and service provider. This in turn results in the discovery of sensitive association rules which are then hidden using two low cost heuristic algorithms named MDSRRC (Modified Decrease Support of R.H.S item of Rule Cluster) and ADSRRC (Advanced Decrease Support of R.H.S item of Rule Cluster). The performance of the framework was analyzed using both synthetic and real transactional data. The results show that this solution to privacy preserving data mining in market basket analysis is viable and will empower both the service provider and the customer in terms of business intelligence. Our investigation concludes that privacy-preserving data mining is to some extent possible and the use of heuristic algorithms simplified privacy preservation by focusing on pattern lengths rather than transaction lengths thus eliminating the possibility of distorting more valuable data.
APA, Harvard, Vancouver, ISO, and other styles
20

Hlatshwayo, Muzi Wandile, and Muzi Wandile Hlatshwayo. "Privacy Preserving Data Mining and Association Rule Sharing Using The High Lift Algorithm." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6vyhq3.

Full text
Abstract:
碩士
國立臺北科技大學
電機工程研究所
105
The growing need in Companies to make it in business and to stay relevant to customer needs and reactions, has resulted in many companies turning to Business Intelligence. This is done through outsourcing, however the idea of maintaining the company’s secrets throughout the process then becomes an issue of utmost importance thus bringing forth the need for Privacy Preserving Data Mining (PPDM). Little research has been done in this field and especially in areas involving the market basket analysis. Current researches have focused on developing privacy preserving algorithms which have only been tested on small databases with ten or less transactions. This thesis seeks to provide an affordable solution in privacy preservation data mining for service providers. This Framework results in the automatic discovery of sensitive association rules which are then hidden using a low cost heuristic algorithm introduced in this study called the High Lift Algorithm (HLA). The performance of the framework was analyzed using real transactional data from the business environment and was compared against other algorithms already in use. The results show that this solution to privacy preserving data mining in market basket analysis is better than other approaches and will add value both the service provider and the customer in terms of business intelligence. Our investigation concludes that privacy-preserving data mining is possible and the use of the HLA simplified privacy preservation by incorporating aspects that other algorithms have been trying to focus on.
APA, Harvard, Vancouver, ISO, and other styles
21

Chao, Yi-Jia, and 趙怡嘉. "Paradigm Shift of the Administrative Regulation in Sharing Economy: Focusing on the Rule of Law to Uber." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/encc4w.

Full text
Abstract:
碩士
國立臺灣大學
法律學研究所
107
Sharing Economy is not only a well-known phrase of economics, but it’s also widely practiced in every aspect of our daily life. Law is necessary in keeping our society in order, as a result, the change of lifestyle necessarily leads to the change of legal regulation. Centering on the transaction pattern of car passenger transportation as the business model, the research carried out in this thesis is: to respond to the changed consumption pattern how the government adjusts and changes the administrative regulations. In other words, if the activity appears in the market with a business model that does not comply with the previous legal definition, how will the country deal with the risk and harm it has brought to society by instituting new regulations? This paper first introduces the definition of the Sharing Economy and the Uber system as a sharing transport representative. Then it analyzes the original regulation of traditional car passenger transportation business, bringing up the image of the regulatory relationship between the government, the supply and demand of the state in car transportation services. It leads to the conclusion that in the sharing economy, the regulatory image has changed and been sufficient to serve as basis for the change of regulations, that is, to be specific, the introduction of the fourth role, which did not exist in the past. In addition to the creation of the fourth party in the administrative regulations due to Uber''s participation as a platform operator, which links the supplier and the consumer of transportation services in the existing social activities, with respect to the actual supplier of the car passenger transport service, the law also faces the challenge of the legitimacy as well as the adjustment of the regulatory content. As the issues of Uber bubbling up in countries around the world, this paper observes the regulations of the Transportation Network Company in California and the Diversified Taxis in Taiwan. However, both of the adjustments adopted for the sharing transportation do not deem the platform an important role in the administrative regulations. On the other hand, although the participation of platform operators ought to be a new regulatory target, laws and regulations for service suppliers who have been regulated in traditional regulations of car passenger transport business cannot be eliminated. In order to fulfill the spirit of sharing economy, the proper way is to adjust the intervention of public authority to the actual provider of car passenger transport service.
APA, Harvard, Vancouver, ISO, and other styles
22

"Essays in Organizational Economics: Information Sharing and Organizational Behavior." Doctoral diss., 2014. http://hdl.handle.net/2286/R.I.25180.

Full text
Abstract:
abstract: One theoretical research topic in organizational economics is the information issues raised in different organizations. This has been extensively studied in last three decades. One common feature of these research is focusing on the asymmetric information among different agents within one organization. However, in reality, we usually face the following situation. A group of people within an organization are completely transparent to each other; however, their characters are not known by other organization members who are outside this group. In my dissertation, I try to study how this information sharing would affect the outcome of different organizations. I focus on two organizations: corporate board and political parties. I find that this information sharing may be detrimental for (some of) the members who shared information. This conclusion stands in contrast to the conventional wisdom in both corporate finance and political party literature.
Dissertation/Thesis
Ph.D. Economics 2014
APA, Harvard, Vancouver, ISO, and other styles
23

WU, TING-I., and 吳亭儀. "The Influence of Intra-group Sharing Rule on Rent-seeking Activities under the Two-stage Between-group Rent-seeking Model." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/45726705722067746291.

Full text
Abstract:
碩士
國立臺北大學
財政學系
104
This paper plans to adjust the model of two-stage group rent-seeking contest in Katz and Tokatlidu (1996). We adopt Nitzan’s intra-group sharing rule for the second stage game in our two-stage between-group rent-seeking model. Using our model, we focus our discussion on the influence of intra-group sharing rule on intra-group, inter-group and social rent-seeking activities. Different from Nitzan’s (1991a) finding and the intuition that a more egalitarian sharing rule will reduce the social rent-seeking waste, our finding shows that when a single group takes a more egalitarian sharing rule, the social rent-seeking waste may increase rather than decrease.
APA, Harvard, Vancouver, ISO, and other styles
24

Awan, Irfan U., Demetres D. Kouvatsos, and Khalid Al-Begain. "Analysis of a wireless cell with multiple service classes under an aggregate sharing scheme." 2002. http://hdl.handle.net/10454/467.

Full text
Abstract:
An analytic framework is devised for the performance modelling and evaluation of a wireless Global System for Mobile Telecommunication (GSM) cell with General Packet Radio Service (GPRS) supporting both multiple class voice and data services, respectively, under an aggregate sharing scheme (ASS). The investigation focuses on the study of a proposed GE/GE/c/N/PR/CBS queueing system with c (¿1) servers, finite capacity, N (¿c), generalised exponential (GE) GSM/GPRS interarrival and service times under pre-emptive resume (PR) priority rule and complete buffer sharing (CBS) scheme. The principle of maximum entropy (ME) is used t ocharacterise new closed form expressions for the state and blocking probabilities, subject to appropriate GE-type queueing theoretic constraints per class. Typical numerical examples are included to validate the ME solution against simulation at 95% confidence intervals and study the effect of external GMS/GPRS bursty traffic upon the performance of the cell.
APA, Harvard, Vancouver, ISO, and other styles
25

BELETE, GETACHEW YIRGA. "CHILDREN'S RESOURCES, WELL-BEING AND SOCIAL PROTECTION: EVIDENCE FROM ETHIOPIA." Doctoral thesis, 2019. http://hdl.handle.net/11562/995356.

Full text
Abstract:
The bargaining power of children has long been neglected in the literature since children have been considered as public or private goods for their parents. Given that they do not enter households by choice and generally bring little to household resources, children could be the most vulnerable to intrahousehold inequality although they may benefit from parental altruism. Recent collective household consumption models help recover the sharing rules of children using observation of some exclusive, privately-assigned expenditure and distribution factors. The sharing rules of children can then be used to analyze their monetary poverty. As well-being is multidimensional, it is also imperative to look at deprivations in other dimensions including health, nutrition, education and living standards. From a policy perspective as well, the role of social protection in affecting children's decisions and well-being is worth researching since understanding the responses to a program in terms of those outcomes provides com
APA, Harvard, Vancouver, ISO, and other styles
26

Awan, Irfan U., and Khalid Al-Begain. "Maintaining QoS through preferential treatment to UMTS services." 2003. http://hdl.handle.net/10454/476.

Full text
Abstract:
One of the main features of the third generation (3G) mobile networks is their capability to provide different classes of services; especially multimedia and real-time services in addition to the traditional telephony and data services. These new services, however, will require higher Quality of Service (QoS) constraints on the network mainly regarding delay, delay variation and packet loss. Additionally, the overall traffic profile in both the air interface and inside the network will be rather different than used to be in today's mobile networks. Therefore, providing QoS for the new services will require more than what a call admission control algorithm can achieve at the border of the network, but also continuous buffer control in both the wireless and the fixed part of the network to ensure that higher priority traffic is treated in the proper way. This paper proposes and analytically evaluates a buffer management scheme that is based on multi-level priority and Complete Buffer Sharing (CBS) policy for all buffers at the border and inside the wireless network. The analytical model is based on the G/G/1/N censored queue with single server and R (R¿2) priority classes under the Head of Line (HoL) service rule for the CBS scheme. The traffic is modelled using the Generalised Exponential distribution. The paper presents an analytical solution based on the approximation using the Maximum Entropy (ME) principle. The numerical results show the capability of the buffer management scheme to provide higher QoS for the higher priority service classes.
APA, Harvard, Vancouver, ISO, and other styles
27

Kouvatsos, Demetres D., and Irfan U. Awan. "Entropy Maximisation and Open Queueing Networks with Priority and Blocking." 2003. http://hdl.handle.net/10454/3084.

Full text
Abstract:
No
A review is carried out on the characterisation and algorithmic implementation of an extended product-form approximation, based on the principle of maximum entropy (ME), for a wide class of arbitrary finite capacity open queueing network models (QNMs) with service and space priorities. A single server finite capacity GE/GE/1/N queue with R (R>1) distinct priority classes, compound Poisson arrival processes (CPPs) with geometrically distributed batches and generalised exponential (GE) service times is analysed via entropy maximisation, subject to suitable GE-type queueing theoretic constraints, under preemptive resume (PR) and head-of-line (HOL) scheduling rules combined with complete buffer sharing (CBS) and partial buffer sharing (PBS) management schemes stipulating a sequence of buffer thresholds {N=(N1,¿,NR),0
APA, Harvard, Vancouver, ISO, and other styles
28

Gopalakrishnan, Ragavendran. "Characterizing Distribution Rules for Cost Sharing Games." Thesis, 2013. https://thesis.library.caltech.edu/7822/1/gopalakrishnan_ragavendran_2013.pdf.

Full text
Abstract:

In noncooperative cost sharing games, individually strategic agents choose resources based on how the welfare (cost or revenue) generated at each resource (which depends on the set of agents that choose the resource) is distributed. The focus is on finding distribution rules that lead to stable allocations, which is formalized by the concept of Nash equilibrium, e.g., Shapley value (budget-balanced) and marginal contribution (not budget-balanced) rules.

Recent work that seeks to characterize the space of all such rules shows that the only budget-balanced distribution rules that guarantee equilibrium existence in all welfare sharing games are generalized weighted Shapley values (GWSVs), by exhibiting a specific 'worst-case' welfare function which requires that GWSV rules be used. Our work provides an exact characterization of the space of distribution rules (not necessarily budget-balanced) for any specific local welfare functions remains, for a general class of scalable and separable games with well-known applications, e.g., facility location, routing, network formation, and coverage games.

We show that all games conditioned on any fixed local welfare functions possess an equilibrium if and only if the distribution rules are equivalent to GWSV rules on some 'ground' welfare functions. Therefore, it is neither the existence of some worst-case welfare function, nor the restriction of budget-balance, which limits the design to GWSVs. Also, in order to guarantee equilibrium existence, it is necessary to work within the class of potential games, since GWSVs result in (weighted) potential games.

We also provide an alternative characterization—all games conditioned on any fixed local welfare functions possess an equilibrium if and only if the distribution rules are equivalent to generalized weighted marginal contribution (GWMC) rules on some 'ground' welfare functions. This result is due to a deeper fundamental connection between Shapley values and marginal contributions that our proofs expose—they are equivalent given a transformation connecting their ground welfare functions. (This connection leads to novel closed-form expressions for the GWSV potential function.) Since GWMCs are more tractable than GWSVs, a designer can tradeoff budget-balance with computational tractability in deciding which rule to implement.

APA, Harvard, Vancouver, ISO, and other styles
29

CHUANG, CHIA-CHUN, and 莊嘉峻. "The Influence of Sharing Rules on Two-Dimension Rent-Seeking Activity." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/2b3pbn.

Full text
Abstract:
碩士
國立臺北大學
財政學系
106
This paper is based on the two-dimension rent-seeking model of Faria et al. (2014). When the local government wants to provides public goods or public construction. The local government will seek some subsidy which comes from the central government. In order to gain more subsidy. It will input two-dimension effort. The first dimension effort is for expend total subsidy. The second dimension effort is to gain more subsidy. In this paper, the sharing rule of subsidy is based on two ratios. First is population ratio. Second is the effort which inputs to gain more subsidy. We focus our discussion on the effects of changing in sharing rule of subsidy on two-dimension rent-seeking activity. According to the economic intuition. There is more ratio of sharing rule is based on population ratio will reduce the rent-seeking level. However, different from the economic intuition. We found that social rent-seeking outlays may increase rather than decrease when sharing rule is more based on population ratio.
APA, Harvard, Vancouver, ISO, and other styles
30

Carvalho, Arthur. "Sharing Rewards Based on Subjective Opinions." Thesis, 2010. http://hdl.handle.net/10012/5333.

Full text
Abstract:
Fair division is the problem of dividing one or several goods among a set of agents in a way that satisfies a suitable fairness criterion. Traditionally studied in economics, philosophy, and political science, fair division has drawn a lot of attention from the multiagent systems community, since this field is strongly concerned about how a surplus (or a cost) should be divided among a group of agents. Arguably, the Shapley value is the single most important contribution to the problem of fair division. It assigns to each agent a share of the resource equal to the expected marginal contribution of that agent. Thus, it is implicitly assumed that individual marginal contributions can be objectively computed. In this thesis, we propose a game-theoretic model for sharing a joint reward when the quality of individual contributions is subjective. In detail, we consider scenarios where a group has been formed and has accomplished a task for which it is granted a reward, which must be shared among the group members. After observing the contribution of the peers in accomplishing the task, each agent is asked to provide evaluations for the others. Mainly to facilitate the sharing process, agents can also be requested to provide predictions about how their peers are evaluated. These subjective opinions are elicited and aggregated by a central, trusted entity, called the mechanism, which is also responsible for sharing the reward based exclusively on the received opinions. Besides the formal game-theoretic model for sharing rewards based on subjective opinions, we propose three different mechanisms in this thesis. Our first mechanism, the peer-evaluation mechanism, divides the reward proportionally to the evaluations received by the agents. We show that this mechanism is fair, budget-balanced, individually rational, and strategy-proof, but that it can be collusion-prone. Our second mechanism, the peer-prediction mechanism, shares the reward by considering two aspects: the evaluations received by the agents and their truth-telling scores. To compute these scores, this mechanism uses a strictly proper scoring rule. Under the assumption that agents are Bayesian decision-makers, we show that this mechanism is weakly budget-balanced, individually rational, and incentive-compatible. Further, we present approaches that guarantee the mechanism to be collusion-resistant and fair. Our last mechanism, the BTS mechanism, is the only one to elicit both evaluations and predictions from the agents. It considers the evaluations received by the agents and their truth-telling scores when sharing the reward. For computing the scores, it uses the Bayesian truth serum method, a powerful scoring method based on the surprisingly common criterion. Under the assumptions that agents are Bayesian decision-makers, and that the population of agents is sufficiently large so that a single evaluation cannot significantly affect the empirical distribution of evaluations, we show that this mechanism is incentive-compatible, budget-balanced, individually rational, and fair.
APA, Harvard, Vancouver, ISO, and other styles
31

Niño, David. "Communication rules and processes of knowledge sharing in a high technology organization." 2002. http://hdl.handle.net/2152/11645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Niño, David. "Communication rules and processes of knowledge sharing in a high technology organization." 2002. http://wwwlib.umi.com/cr/utexas/fullcit?p3110667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Agbaglah, Messan H. "Agreements with overlapping coalitions." Thèse, 2012. http://hdl.handle.net/1866/9764.

Full text
Abstract:
Dans certaines circonstances, des actions de groupes sont plus performantes que des actions individuelles. Dans ces situations, il est préférable de former des coalitions. Ces coalitions peuvent être disjointes ou imbriquées. La littérature économique met un fort accent sur la modélisation des accords où les coalitions d’agents économiques sont des ensembles disjoints. Cependant on observe dans la vie de tous les jours que les coalitions politiques, environnementales, de libre-échange et d’assurance informelles sont la plupart du temps imbriquées. Aussi, devient-il impératif de comprendre le fonctionnement économique des coalitions imbriquées. Ma thèse développe un cadre d’analyse qui permet de comprendre la formation et la performance des coalitions même si elles sont imbriquées. Dans le premier chapitre je développe un jeu de négociation qui permet la formation de coalitions imbriquées. Je montre que ce jeu admet un équilibre et je développe un algorithme pour calculer les allocations d’équilibre pour les jeux symétriques. Je montre que toute structure de réseau peut se décomposer de manière unique en une structure de coalitions imbriquées. Sous certaines conditions, je montre que cette structure correspond à une structure d’équilibre d’un jeu sous-jacent. Dans le deuxième chapitre j’introduis une nouvelle notion de noyau dans le cas où les coalitions imbriquées sont permises. Je montre que cette notion de noyau est une généralisation naturelle de la notion de noyau de structure de coalitions. Je vais plus loin en introduisant des agents plus raffinés. J’obtiens alors le noyau de structure de coalitions imbriquées que je montre être un affinement de la première notion. Dans la suite de la thèse, j’applique les théories développées dans les deux premiers chapitres à des cas concrets. Le troisième chapitre est une application de la relation biunivoque établie dans le premier chapitre entre la formation des coalitions et la formation de réseaux. Je propose une modélisation réaliste et effective des assurances informelles. J’introduis ainsi dans la littérature économique sur les assurances informelles, quatre innovations majeures : une fusion entre l’approche par les groupes et l’approche par les réseaux sociaux, la possibilité d’avoir des organisations imbriquées d’assurance informelle, un schéma de punition endogène et enfin les externalités. Je caractérise les accords d’assurances informelles stables et j’isole les conditions qui poussent les agents à dévier. Il est admis dans la littérature que seuls les individus ayant un revenu élevé peuvent se permettre de violer les accords d’assurances informelles. Je donne ici les conditions dans lesquelles cette hypothèse tient. Cependant, je montre aussi qu’il est possible de violer cette hypothèse sous d’autres conditions réalistes. Finalement je dérive des résultats de statiques comparées sous deux normes de partage différents. Dans le quatrième et dernier chapitre, je propose un modèle d’assurance informelle où les groupes homogènes sont construits sur la base de relations de confiance préexistantes. Ces groupes sont imbriqués et représentent des ensembles de partage de risque. Cette approche est plus générale que les approches traditionnelles de groupe ou de réseau. Je caractérise les accords stables sans faire d’hypothèses sur le taux d’escompte. J’identifie les caractéristiques des réseaux stables qui correspondent aux taux d’escomptes les plus faibles. Bien que l’objectif des assurances informelles soit de lisser la consommation, je montre que des effets externes liés notamment à la valorisation des liens interpersonnels renforcent la stabilité. Je développe un algorithme à pas finis qui égalise la consommation pour tous les individus liés. Le fait que le nombre de pas soit fini (contrairement aux algorithmes à pas infinis existants) fait que mon algorithme peut inspirer de manière réaliste des politiques économiques. Enfin, je donne des résultats de statique comparée pour certaines valeurs exogènes du modèle.
When groups can perform a task more efficiently than single individuals, a desirable behavior is to form coalitions. Coalitions can be disjoint or overlapping. But, almost all the economics literature on coalition formation is mostly restricted to models where coalitions are disjoint. However, in politics, environmental issues, customs unions, informal insurance, and many other economic, social, and political interactions, we observe overlapping coalitions. How can we understand agreements involving overlapping coalitions ? How can we study their efficiency if there is no theory to model them ? My thesis solves these questions by developing a framework on coalition formation that accommodates overlapping coalitions. In the first chapter, following a non-cooperative approach, I develop a bargaining game to model the formation of overlapping coalitions. I show the existence of a subgame perfect equilibrium and I provide an algorithm that generates equilibrium outcomes for symmetric games. I establish an overlapping coalition’s representation for each network and I show that, under some conditions, they are equilibrium outcomes. The core is the most popular solution concept in cooperative game. In the second chapter, following a cooperative approach, I develop a new concept of core that accommodates overlapping coalitions, and coincides with the recursive core when coalitions do not intersect. First, I extend naively the residual game to only embody overlapping coalitions, and I obtain a range of allocations between the optimistic and the pessimistic core. Secondly, I provide a consistent notion of residual game and I show that the overlapping coalition structure core not only stands as a generalization of the coalition structure core, but also induces a refinement of the extended recursive core. As I build a theoretical framework for overlapping coalition formation, I provide applications in the remainder of the thesis. In the third chapter, I model informal insurance arrangements as a collection of overlapping trust coalitions. The model is based on empirical facts. I enrich the theoretical modeling of informal insurance arrangements by introducing four key features : the merging of the group approach and the network approach, the possibility for informal insurance organizations to overlap, the endogenous punishment scheme, and externalities. I characterize self enforcing stable informal insurance arrangements and I derive conditions under which deviation occurs. While it is always assumed in the literature that only wealthy individuals may deviate. I formally isolate conditions under which this assumption holds. Furthermore, I show that if these conditions does not hold, this assumption is violated. Finally, I provide static comparative results for consumption under two distinct sharing norms. Finally in the fourth chapter, I investigate multilateral informal insurance organizations built on networks of trust relationships. The model is based on empirical findings and nests the traditional approaches which use bilateral links or groups. I characterize self enforcing stable informal insurance organizations without imposing extreme discounting. I show that density and clustering characterize networks that match the lowest discounting for stability. While insurance is formally arranged to smooth consumption, I show that external effects such as social privileges tend to reinforce the stability of such arrangement. I use my stability results to derive comparative statics for exogenous parameters of the model. Finally, I develop a procedure in finite steps that equates consumption for all linked individuals. Contrary to the existing procedures in infinite steps, my procedure is more realistic and useful to policy makers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!