Дисертації з теми "Sharing rule"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-33 дисертацій для дослідження на тему "Sharing rule".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Liu, Youzhong. "Rule warehouse system for knowledge sharing and business collaboration." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/anp4027/Youzhong%5FLiu%5FDissertation.pdf.
Повний текст джерелаTitle from first page of PDF file. Document formatted into pages; contains xi, 121 p.; also contains graphics. Vita. Includes bibliographical references (p. 113-120).
Hällstrand, Dorcas. "Master’s Thesis in Political Science Democratization in southern Africa: Process and Challenges : A case study of Zimbabwe’s divergent path in its democratic transition." Thesis, Högskolan Dalarna, Statsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:du-35030.
Повний текст джерелаJulie, Elmerie. "A mathematical model for managing equity-linked pensions." Thesis, University of the Western Cape, 2007. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_1071_1181655014.
Повний текст джерелаPension fund companies manage and invest large amounts of money on behalf of their members. In return for their contributions, members expect a benefit at termination of their contract. Due to the volatile nature of returns that pension funds attain, pension companies started attaching a minimum guaranteed amount to member&rsquo
s benefits. In this mini-thesis we look at the pioneering work of Brennan and Schwartz [10] for pricing these minimum guarantees. The model they developed prices these minimum guarantees using option pricing theory. We also look at the model proposed by Deelstra et al. which prices minimum guarantees in a stochastic financial setting. We conclude this mini-thesis with new contributions where we look at simple alternative ways of pricing minimum guarantees. We conclude this mini-thesis with an approach, related to the work of Brennan and Schwartz [10], whereby the member&rsquo
s benefit is maximised for a given minimum guaranteed amount, which comprises of multi-period guarantees. We formulate a method to find the optimal stream of these multi-period guarantees.
Chevallier, Julien. "The European carbon market (2005-2007): banking, pricing and risk hedging strategies." Diss., University of Paris 10, 2008. http://hdl.handle.net/10919/71614.
Повний текст джерелаRICUPERO, GIUSEPPE. "Exploring Data Hierarchies to Discover Knowledge in Different Domains." Doctoral thesis, Politecnico di Torino, 2019. http://hdl.handle.net/11583/2744938.
Повний текст джерелаHampson, Philip Robert Osler. "Optimal profit sharing rules for petroleum exploration and development in Jordan." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/37700.
Повний текст джерелаAndrade, Rodrigo Bomfim de. "Sequential cost-reimbursement rules." reponame:Repositório Institucional do FGV, 2014. http://hdl.handle.net/10438/11736.
Повний текст джерелаApproved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2014-04-30T19:55:08Z (GMT) No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-05-08T13:35:03Z (GMT) No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5)
Made available in DSpace on 2014-05-08T13:40:17Z (GMT). No. of bitstreams: 1 diss_RodrigoAndrade.pdf: 591074 bytes, checksum: 533c9582d0fd79341698968896535e09 (MD5) Previous issue date: 2014-03-17
This paper studies cost-sharing rules under dynamic adverse selection. We present a typical principal-agent model with two periods, set up in Laffont and Tirole's (1986) canonical regulation environment. At first, when the contract is signed, the firm has prior uncertainty about its efficiency parameter. In the second period, the firm learns its efficiency and chooses the level of cost-reducing effort. The optimal mechanism sequentially screens the firm's types and achieves a higher level of welfare than its static counterpart. The contract is indirectly implemented by a sequence of transfers, consisting of a fixed advance payment based on the reported cost estimate, and an ex-post compensation linear in cost performance.
Este trabalho estuda regras de compartilhamento de custos sob seleção adversa dinâmica. Apresentamos um modelo típico de agente-principal com dois períodos, fundamentado no ambiente canônico de regulação de Laffont e Tirole (1986). De início, quando da assinatura do contrato, a firma possui incerteza prévia sobre seu parâmetro de eficiência. No segundo período, a firma aprende a sua eficiência e escolhe o nível de esforço para reduzir custos. O mecanismo ótimo efetua screening sequencial entre os tipos da firma e atinge um nível de bem-estar superior ao alcançado pelo mecanismo estático. O contrato é implementado indiretamente por uma sequência de transferências, que consiste em um pagamento fixo antecipado, baseado na estimativa de custos reportada pela firma, e uma compensação posterior linear no custo realizado.
Ben, Cheikh Henda. "Evaluation et optimisation de la performance des flots dans les réseaux stochastiques à partage de bande passante." Thesis, Toulouse, INSA, 2015. http://www.theses.fr/2015ISAT0013/document.
Повний текст джерелаWe study queueing-theoretic models for the performance evaluation and optimization of bandwidth-sharing networks. We first propose simple and explicit approximations for the main performance metrics of elastic flows in bandwidth-sharing networks operating under balanced fairness. Assuming that an admission control mechanism is used to limit the number of simultaneous streaming flows, we then study the competition for bandwidth between elastic and streaming flows and propose performance approximations based on a quasi-stationary assumption. Simulation results show the good accuracy of the proposed approximations. We then investigate the energy-delay tradeoff in bandwidth-sharing networks in which nodes can regulate their speed according to the load of the system. Assuming that the network is initially congested, we investigate the rate allocation to the classes that drains out the network with minimum total energy and delay cost. We formulate this optimal resource allocation problem as a Markov decision process which proves tobe both analytically and computationally challenging. We thus propose to solve this stochastic problem using a deterministic fluid approximation. For a single link sharedby an arbitrary number of classes, we show that the optimal-fluid solution follows thewell-known cμ rule and give an explicit expression for the optimal speed. Finally, we consider cloud computing platforms under the SaaS model. Assuming a fair share of the capacity of physical resources between virtual machines executed concurrently, we propose simple queueing models for predicting response times of applications.The proposed models explicitly take into account the different behaviors of the different classes of applications (interactive, CPU-intensive or permanent applications). Experiments on a real virtualized platform show that the mathematical models allow to predict response times accurately
Muchna, Jan. "The Bankruptcy Rules in Linear Ordered Structures." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-81888.
Повний текст джерелаNeumeister, Christian C. "The Emiratization of Shari'a: Islam, Modernization and the Legal System of the United Arab Emirates." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1142.
Повний текст джерелаColacce, Maira. "Three essays on intra-household distribution of resources and poverty." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0121.
Повний текст джерелаThis dissertation analyzes the patterns of intra-household inequalities in non-developed countries and how they are affected by culture and policies. Using household expenditure surveys, I employ a collective model to analyze household consumption allocation and its drivers, and to assess its implications for individual poverty.In the first chapter, I present novel findings on intra-household resource distribution for 45 low- and middle-income countries. The results reveal that women are nearly twice as poor as men on a global scale, with children experiencing even greater deprivation. Furthermore, intra-household disparities are more pronounced in poor countries and, within countries, among poor households.In the second chapter, I investigate whether kinship-based post-marital residence customs—specifically, patrilocality (residing with the groom's parents) and matrilocality (residing with the bride's parents)—continue to influence household consumption sharing and individual poverty levels in Ghana and Malawi. Analysis indicates that ancestral patrilocality, compared to matrilocality, corresponds with reduced resource allocation to women and a notably higher incidence of poverty among women across various household consumption levels.In the third chapter, I examine the impact of Uruguay's largest social assistance program, which targets poor families with children and paid to women. Employing a regression discontinuity design within a structural estimation framework, I find a significant increase in resource allocation to eligible women in rural areas, with no effects on children. I translate these results into terms of individual poverty: all family members benefit from the income effect, but the bargaining effect reduces women's poverty even more
Islam, M. D. Nazrul. "Equitable sharing of the water of the Ganges : applicable procedural principles and rules under international law and their adequacy." Thesis, SOAS, University of London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325143.
Повний текст джерелаCarlisle, Jessica. "Rules, negociation, claims and counter claims : Judicial discretion in a damascus Shari's Court." Thesis, SOAS, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.498278.
Повний текст джерелаLefebvre, Marianne. "Mécanismes d'allocation de l'eau d'irrigation et gestion du risque sécheresse en agriculture." Thesis, Montpellier 1, 2011. http://www.theses.fr/2011MON10026/document.
Повний текст джерелаWith climate change, agriculture will have to adapt to face increasingly frequent and more severe droughts. Agriculture is the largest consumer of water and will face most of the water restrictions in the coming years. Existing water allocation mechanisms (pricing, water markets, rationing scheme) often fail to take into account the high variability of the resource, whereas those mechanisms have strong impacts on the risk born by agricultural water users. Water allocation schemes can contribute to reduce the cost of drought risk for farmers and society by integrating risk management mechanisms. We address this question in two different contexts: France, where water is managed by public authorities that are responsible for the rationing scheme and define the allocation of water between farmers in case of scarcity; Australia, where water markets have been implemented in order to allow water transfers between farmers. This Ph.D. dissertation is composed of 3 articles (chapter 2, 3 and 5 in English) and background information (chapter 1 and 4 in French). Chapter 1 describes the organization of irrigation water allocation in France. Chapters 2 and 3 analyze the interactions between the restrictions rules used in France to share the resource in crisis times and the self-insurance strategies of farmers. We investigate the particular example of on-farm storage, an increasingly widespread risk management tool used by French farmers. Chapter 2 models the decisions of agents heterogeneous in their risk tolerance that can substitute the use of a a secure private alternative to the use of a common pool resource of uncertain size. We find the optimal sharing rule under two assumptions concerning the regulator: i) the social planner defines simultaneously the sharing rule and the diversification choices in order to maximize social welfare; ii) the policy maker uses the sharing rule as an instrument to induce each agent to make the optimal diversification decision. Chapter 3 uses laboratory experiment to analyze how the sharing rule impacts the individual trade-off between relying on a free but uncertain resource and investing in a secure alternative resource. Rules are compared on the basis of their ability to facilitate coordination on the optimal investment in the secure resource. Chapter 4 presents how irrigation water is allocated between users in Australia in case of drought. Chapter 5 studies with a laboratory experiment, designed such as capturing the main characteristics of Australian water markets, whether offering different levels of security for water rights could potentially allow water users to manage the risks of supply uncertainty better. We find that a two security levels system improves both allocative efficiency and risk management, but only when transactions costs are higher in the market for water allocation than in the market for water rights. A system with different levels of security for water rights can be detrimental to cost-effectiveness by increasing the number of costly trades on the water rights market
Thani, Ahmed Abdulla Farhan. "The projected Arab Court of Justice : a study to its draft statute and rules, with specific reference to the International Court of Justice and principles of Islamic Shariah." Thesis, University of Glasgow, 1999. http://theses.gla.ac.uk/1571/.
Повний текст джерела徐嘉宏. "A Rule-Based, Decentralized Approach to Secure Information Sharing." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/94602722288070175936.
Повний текст джерела國立交通大學
資訊科學系所
93
As the Internet becomes a ubiquitous environment where people with different background and purposes can share their information, information security and privacy have become an increasingly critical issue. With poor protection, informa-tion systems may leak sensitive information to the open public. To reduce such risks, there have been many security mechanisms and technologies proposed and developed. Most of these approaches rely on a mixture of label-based access con-trol and information flow mechanisms. Specifically, they enforce various security policies by attaching suitable labels to information as well as users and grant data access based on these labels. However, many labeling approaches often require complicated managerial efforts in order to set up and enforce security policies cor-rectly. In addition, they focus primarily on labeling data without paying too much attention to sharing tools that process these data. As a result, whether a given tool can access a piece of data depends on who is invoking the tool, making correct security management more challenging. In this thesis, we propose an information sharing model that permits controlling information flow in a flexible, decentralized manner, where each user can specify his/her own access hierarchy instead of rely-ing on centralized security management. Based on the access hierarchy, each user can label both data and tools in a consistent manner, and can realize data declassifi-cation by restricting or relaxing the access level of individual tools. Finally, to re-duce the overhead associated with individual data labeling, we introduce a rule-based labeling mechanism to associate data with their access levels correspondingly. In summary, we believe our model is a unification of and improvement over exist-ing access control mechanisms, and can contribute to secure information sharing over the Internet.
"Intra-household allocation, sharing rule and spousal leisure: evidence from China." 2003. http://library.cuhk.edu.hk/record=b5891613.
Повний текст джерелаThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 96-100).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Literature Review --- p.5
Chapter 2.1 --- Pioneering Work --- p.5
Chapter 2.2 --- Collective Household Consumption --- p.8
Chapter 2.3 --- Household Production --- p.16
Chapter 2.4 --- Tests between Unitary Model and Collective Model --- p.17
Chapter 2.5 --- Distribution Factors in Collective Labor Supply --- p.19
Chapter 2.6 --- Identification of Spousal Leisure --- p.20
Chapter 2.7 --- Plan of the thesis --- p.21
Chapter 3 --- Data Descriptions --- p.23
Chapter 3.1 --- Data Collection Process --- p.23
Chapter 3.2 --- Data Characteristics --- p.24
Chapter 4 --- Individual Wage and Labor Supply Equations --- p.30
Chapter 4.1 --- Individual Wage Equations --- p.30
Chapter 4.2 --- Individual Labor Supply Equation --- p.36
Chapter 4.3 --- Conclusion --- p.43
Chapter 5 --- Collective Household Labor Supply --- p.46
Chapter 5.1 --- Theoretical Model --- p.47
Chapter 5.2 --- Parametric Specification --- p.53
Chapter 5.3 --- Data and Empirical Results --- p.56
Chapter 5.4 --- Conclusion --- p.64
Chapter 6 --- Identification of Independent and Spousal Leisure --- p.66
Chapter 6.1 --- Theoretical Model --- p.67
Chapter 6.2 --- Parametric Specification --- p.78
Chapter 6.3 --- Data and Empirical Results --- p.82
Chapter 6.4 --- Conclusion --- p.91
Chapter 7 --- Conclusion --- p.93
References --- p.96
Tables and Appendices --- p.101
Yuan-Chung, Chang, and 張淵琮. "The study on privacy-preserving association rule mining for data sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10395401470955928759.
Повний текст джерела國防大學中正理工學院
資訊科學研究所
96
Data mining is a popular technology for the application of database in recent years. In addition, association rule mining has been applied to discover the interesting relationships hidden in large databases by the administrators of some organizations. The discovered information is valuable for making decisions. Furthermore, international information organizations have dedicated to establish an “Information Sharing and Analysis Center (ISAC)” for sharing the information and providing early warning of critical events. Similarly, through data sharing from different organizations, administrators can collect more useful information to enhance their competition superiority. However, data sharing will potentially involve threats in which privacy or sensitive information is unconsciously divulged. In this study, we present an efficient algorithm for fast hiding sensitive rule sets, DSSI (decrease support of sensitive items), for privacy preservation against association rule mining. Through slightly modifying transactions in the database, the proposed algorithm can completely hide the set of sensitive association rules. This not only obtains the benefits but also reduces the risk from data sharing. This research proves that DSSI 1) can completely hide all sensitive association rule sets and 2) will not produce any new rules. Moreover, compared with the current-best works, experimental results show that DSSI 1) reduces the number of transactions modified; and 2) limits lost rules generated, i.e., all lost rules are related to the given sensitive item.
Dlamini, Mbuso Gerald, and Mbuso Gerald Dlamini. "Privacy Preserving Data Mining and Association Rule Sharing for Business Intelligence." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7sefy2.
Повний текст джерела國立臺北科技大學
電資學院外國學生專班
103
The growing interest in business intelligence, cloud computing and technological advancements has necessitated the usage of data mining as a service in order to ensure business success and sustainability. As a result data mining techniques are becoming more useful to discover and understand unknown customer patterns and their behaviors through association rules discovered from the transactional databases. The lack of expertise and computational resources have compelled companies to outsource data mining activities as it is a complex and expensive exercise. However, the need to ensure privacy and confidentiality is inevitable. There has only been a few research work that has been done on privacy preservation data mining in market basket analysis. Most current researches have focused on developing privacy preserving algorithms which have only been tested on small databases with ten or less transactions. Other researches have focused on complex and resource intensive privacy preserving which are more complex and expensive for data mining service providers and for businesses. All these researches have depended on the database owner to specify the sensitive items in the database. This thesis, therefore, seeks to provide a low cost solution in privacy preservation data mining for service providers. The study aims to reduce costs and complications by providing a framework that automatically detects sensitive items in the transactional databases which are difficult and time consuming to detect manually by the owner and service provider. This in turn results in the discovery of sensitive association rules which are then hidden using two low cost heuristic algorithms named MDSRRC (Modified Decrease Support of R.H.S item of Rule Cluster) and ADSRRC (Advanced Decrease Support of R.H.S item of Rule Cluster). The performance of the framework was analyzed using both synthetic and real transactional data. The results show that this solution to privacy preserving data mining in market basket analysis is viable and will empower both the service provider and the customer in terms of business intelligence. Our investigation concludes that privacy-preserving data mining is to some extent possible and the use of heuristic algorithms simplified privacy preservation by focusing on pattern lengths rather than transaction lengths thus eliminating the possibility of distorting more valuable data.
Hlatshwayo, Muzi Wandile, and Muzi Wandile Hlatshwayo. "Privacy Preserving Data Mining and Association Rule Sharing Using The High Lift Algorithm." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6vyhq3.
Повний текст джерела國立臺北科技大學
電機工程研究所
105
The growing need in Companies to make it in business and to stay relevant to customer needs and reactions, has resulted in many companies turning to Business Intelligence. This is done through outsourcing, however the idea of maintaining the company’s secrets throughout the process then becomes an issue of utmost importance thus bringing forth the need for Privacy Preserving Data Mining (PPDM). Little research has been done in this field and especially in areas involving the market basket analysis. Current researches have focused on developing privacy preserving algorithms which have only been tested on small databases with ten or less transactions. This thesis seeks to provide an affordable solution in privacy preservation data mining for service providers. This Framework results in the automatic discovery of sensitive association rules which are then hidden using a low cost heuristic algorithm introduced in this study called the High Lift Algorithm (HLA). The performance of the framework was analyzed using real transactional data from the business environment and was compared against other algorithms already in use. The results show that this solution to privacy preserving data mining in market basket analysis is better than other approaches and will add value both the service provider and the customer in terms of business intelligence. Our investigation concludes that privacy-preserving data mining is possible and the use of the HLA simplified privacy preservation by incorporating aspects that other algorithms have been trying to focus on.
Chao, Yi-Jia, and 趙怡嘉. "Paradigm Shift of the Administrative Regulation in Sharing Economy: Focusing on the Rule of Law to Uber." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/encc4w.
Повний текст джерела國立臺灣大學
法律學研究所
107
Sharing Economy is not only a well-known phrase of economics, but it’s also widely practiced in every aspect of our daily life. Law is necessary in keeping our society in order, as a result, the change of lifestyle necessarily leads to the change of legal regulation. Centering on the transaction pattern of car passenger transportation as the business model, the research carried out in this thesis is: to respond to the changed consumption pattern how the government adjusts and changes the administrative regulations. In other words, if the activity appears in the market with a business model that does not comply with the previous legal definition, how will the country deal with the risk and harm it has brought to society by instituting new regulations? This paper first introduces the definition of the Sharing Economy and the Uber system as a sharing transport representative. Then it analyzes the original regulation of traditional car passenger transportation business, bringing up the image of the regulatory relationship between the government, the supply and demand of the state in car transportation services. It leads to the conclusion that in the sharing economy, the regulatory image has changed and been sufficient to serve as basis for the change of regulations, that is, to be specific, the introduction of the fourth role, which did not exist in the past. In addition to the creation of the fourth party in the administrative regulations due to Uber''s participation as a platform operator, which links the supplier and the consumer of transportation services in the existing social activities, with respect to the actual supplier of the car passenger transport service, the law also faces the challenge of the legitimacy as well as the adjustment of the regulatory content. As the issues of Uber bubbling up in countries around the world, this paper observes the regulations of the Transportation Network Company in California and the Diversified Taxis in Taiwan. However, both of the adjustments adopted for the sharing transportation do not deem the platform an important role in the administrative regulations. On the other hand, although the participation of platform operators ought to be a new regulatory target, laws and regulations for service suppliers who have been regulated in traditional regulations of car passenger transport business cannot be eliminated. In order to fulfill the spirit of sharing economy, the proper way is to adjust the intervention of public authority to the actual provider of car passenger transport service.
"Essays in Organizational Economics: Information Sharing and Organizational Behavior." Doctoral diss., 2014. http://hdl.handle.net/2286/R.I.25180.
Повний текст джерелаDissertation/Thesis
Ph.D. Economics 2014
WU, TING-I., and 吳亭儀. "The Influence of Intra-group Sharing Rule on Rent-seeking Activities under the Two-stage Between-group Rent-seeking Model." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/45726705722067746291.
Повний текст джерела國立臺北大學
財政學系
104
This paper plans to adjust the model of two-stage group rent-seeking contest in Katz and Tokatlidu (1996). We adopt Nitzan’s intra-group sharing rule for the second stage game in our two-stage between-group rent-seeking model. Using our model, we focus our discussion on the influence of intra-group sharing rule on intra-group, inter-group and social rent-seeking activities. Different from Nitzan’s (1991a) finding and the intuition that a more egalitarian sharing rule will reduce the social rent-seeking waste, our finding shows that when a single group takes a more egalitarian sharing rule, the social rent-seeking waste may increase rather than decrease.
Awan, Irfan U., Demetres D. Kouvatsos, and Khalid Al-Begain. "Analysis of a wireless cell with multiple service classes under an aggregate sharing scheme." 2002. http://hdl.handle.net/10454/467.
Повний текст джерелаBELETE, GETACHEW YIRGA. "CHILDREN'S RESOURCES, WELL-BEING AND SOCIAL PROTECTION: EVIDENCE FROM ETHIOPIA." Doctoral thesis, 2019. http://hdl.handle.net/11562/995356.
Повний текст джерелаAwan, Irfan U., and Khalid Al-Begain. "Maintaining QoS through preferential treatment to UMTS services." 2003. http://hdl.handle.net/10454/476.
Повний текст джерелаKouvatsos, Demetres D., and Irfan U. Awan. "Entropy Maximisation and Open Queueing Networks with Priority and Blocking." 2003. http://hdl.handle.net/10454/3084.
Повний текст джерелаA review is carried out on the characterisation and algorithmic implementation of an extended product-form approximation, based on the principle of maximum entropy (ME), for a wide class of arbitrary finite capacity open queueing network models (QNMs) with service and space priorities. A single server finite capacity GE/GE/1/N queue with R (R>1) distinct priority classes, compound Poisson arrival processes (CPPs) with geometrically distributed batches and generalised exponential (GE) service times is analysed via entropy maximisation, subject to suitable GE-type queueing theoretic constraints, under preemptive resume (PR) and head-of-line (HOL) scheduling rules combined with complete buffer sharing (CBS) and partial buffer sharing (PBS) management schemes stipulating a sequence of buffer thresholds {N=(N1,¿,NR),0
Gopalakrishnan, Ragavendran. "Characterizing Distribution Rules for Cost Sharing Games." Thesis, 2013. https://thesis.library.caltech.edu/7822/1/gopalakrishnan_ragavendran_2013.pdf.
Повний текст джерелаIn noncooperative cost sharing games, individually strategic agents choose resources based on how the welfare (cost or revenue) generated at each resource (which depends on the set of agents that choose the resource) is distributed. The focus is on finding distribution rules that lead to stable allocations, which is formalized by the concept of Nash equilibrium, e.g., Shapley value (budget-balanced) and marginal contribution (not budget-balanced) rules.
Recent work that seeks to characterize the space of all such rules shows that the only budget-balanced distribution rules that guarantee equilibrium existence in all welfare sharing games are generalized weighted Shapley values (GWSVs), by exhibiting a specific 'worst-case' welfare function which requires that GWSV rules be used. Our work provides an exact characterization of the space of distribution rules (not necessarily budget-balanced) for any specific local welfare functions remains, for a general class of scalable and separable games with well-known applications, e.g., facility location, routing, network formation, and coverage games.
We show that all games conditioned on any fixed local welfare functions possess an equilibrium if and only if the distribution rules are equivalent to GWSV rules on some 'ground' welfare functions. Therefore, it is neither the existence of some worst-case welfare function, nor the restriction of budget-balance, which limits the design to GWSVs. Also, in order to guarantee equilibrium existence, it is necessary to work within the class of potential games, since GWSVs result in (weighted) potential games.
We also provide an alternative characterization—all games conditioned on any fixed local welfare functions possess an equilibrium if and only if the distribution rules are equivalent to generalized weighted marginal contribution (GWMC) rules on some 'ground' welfare functions. This result is due to a deeper fundamental connection between Shapley values and marginal contributions that our proofs expose—they are equivalent given a transformation connecting their ground welfare functions. (This connection leads to novel closed-form expressions for the GWSV potential function.) Since GWMCs are more tractable than GWSVs, a designer can tradeoff budget-balance with computational tractability in deciding which rule to implement.
CHUANG, CHIA-CHUN, and 莊嘉峻. "The Influence of Sharing Rules on Two-Dimension Rent-Seeking Activity." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/2b3pbn.
Повний текст джерела國立臺北大學
財政學系
106
This paper is based on the two-dimension rent-seeking model of Faria et al. (2014). When the local government wants to provides public goods or public construction. The local government will seek some subsidy which comes from the central government. In order to gain more subsidy. It will input two-dimension effort. The first dimension effort is for expend total subsidy. The second dimension effort is to gain more subsidy. In this paper, the sharing rule of subsidy is based on two ratios. First is population ratio. Second is the effort which inputs to gain more subsidy. We focus our discussion on the effects of changing in sharing rule of subsidy on two-dimension rent-seeking activity. According to the economic intuition. There is more ratio of sharing rule is based on population ratio will reduce the rent-seeking level. However, different from the economic intuition. We found that social rent-seeking outlays may increase rather than decrease when sharing rule is more based on population ratio.
Carvalho, Arthur. "Sharing Rewards Based on Subjective Opinions." Thesis, 2010. http://hdl.handle.net/10012/5333.
Повний текст джерелаNiño, David. "Communication rules and processes of knowledge sharing in a high technology organization." 2002. http://hdl.handle.net/2152/11645.
Повний текст джерелаNiño, David. "Communication rules and processes of knowledge sharing in a high technology organization." 2002. http://wwwlib.umi.com/cr/utexas/fullcit?p3110667.
Повний текст джерелаAgbaglah, Messan H. "Agreements with overlapping coalitions." Thèse, 2012. http://hdl.handle.net/1866/9764.
Повний текст джерелаWhen groups can perform a task more efficiently than single individuals, a desirable behavior is to form coalitions. Coalitions can be disjoint or overlapping. But, almost all the economics literature on coalition formation is mostly restricted to models where coalitions are disjoint. However, in politics, environmental issues, customs unions, informal insurance, and many other economic, social, and political interactions, we observe overlapping coalitions. How can we understand agreements involving overlapping coalitions ? How can we study their efficiency if there is no theory to model them ? My thesis solves these questions by developing a framework on coalition formation that accommodates overlapping coalitions. In the first chapter, following a non-cooperative approach, I develop a bargaining game to model the formation of overlapping coalitions. I show the existence of a subgame perfect equilibrium and I provide an algorithm that generates equilibrium outcomes for symmetric games. I establish an overlapping coalition’s representation for each network and I show that, under some conditions, they are equilibrium outcomes. The core is the most popular solution concept in cooperative game. In the second chapter, following a cooperative approach, I develop a new concept of core that accommodates overlapping coalitions, and coincides with the recursive core when coalitions do not intersect. First, I extend naively the residual game to only embody overlapping coalitions, and I obtain a range of allocations between the optimistic and the pessimistic core. Secondly, I provide a consistent notion of residual game and I show that the overlapping coalition structure core not only stands as a generalization of the coalition structure core, but also induces a refinement of the extended recursive core. As I build a theoretical framework for overlapping coalition formation, I provide applications in the remainder of the thesis. In the third chapter, I model informal insurance arrangements as a collection of overlapping trust coalitions. The model is based on empirical facts. I enrich the theoretical modeling of informal insurance arrangements by introducing four key features : the merging of the group approach and the network approach, the possibility for informal insurance organizations to overlap, the endogenous punishment scheme, and externalities. I characterize self enforcing stable informal insurance arrangements and I derive conditions under which deviation occurs. While it is always assumed in the literature that only wealthy individuals may deviate. I formally isolate conditions under which this assumption holds. Furthermore, I show that if these conditions does not hold, this assumption is violated. Finally, I provide static comparative results for consumption under two distinct sharing norms. Finally in the fourth chapter, I investigate multilateral informal insurance organizations built on networks of trust relationships. The model is based on empirical findings and nests the traditional approaches which use bilateral links or groups. I characterize self enforcing stable informal insurance organizations without imposing extreme discounting. I show that density and clustering characterize networks that match the lowest discounting for stability. While insurance is formally arranged to smooth consumption, I show that external effects such as social privileges tend to reinforce the stability of such arrangement. I use my stability results to derive comparative statics for exogenous parameters of the model. Finally, I develop a procedure in finite steps that equates consumption for all linked individuals. Contrary to the existing procedures in infinite steps, my procedure is more realistic and useful to policy makers.