This paper investigates the influence of market design, market size, and trading network structure on market efficiency and trade participation rate. The study considers two market designs: Zero Intelligence Traders (...
详细信息
ISBN:
(数字)9783031592058
ISBN:
(纸本)9783031592041;9783031592058
This paper investigates the influence of market design, market size, and trading network structure on market efficiency and trade participation rate. The study considers two market designs: Zero Intelligence Traders (ZIT) in Chamberlin's bilateral haggling market and a greedy matching of traders on a network. Sellers and buyers are embedded in a random bipartite graph with varying network densities, and markets vary in size from 20 to 2000 traders. Simulations reveal that greedy matching generally leads to more efficient allocations than ZIT trading networks. By increasing the average degree of a trading network from 1 to 5 or 10, market efficiency can be significantly improved for both market designs, achieving 89% and 95% of maximum efficiency, respectively. The study also contradicts the common belief that larger markets are better, as no significant impact of market size was found. We discuss the policy implications of these results.
In recent years, digital technologies and serious game have widely affected the cultural heritage sector, offering incredible opportunities to enhance the experiential value of heritage assets and improve cultural act...
详细信息
Federated learning (FL) is an emerging distributed machine learning paradigm that enables participants to cooperatively train learning tasks without revealing the raw data. However, the distributed nature of FL makes ...
详细信息
Understanding the amount of Soil Organic Carbon (SOC) at farm and field scale is a necessary precursor to effective management, important for both agricultural productivity and to reduce CO2 emissions. To avoid the pr...
详细信息
This paper presents a prototype of a non-contact UR robot based Virtual Control (UR-VC) system for collaborative robots of the UR family, which is based on computer vision techniques and a virtual interaction interfac...
详细信息
The threat of malware is increasing and poses significant computer security risks to both individuals and organizations. Understanding the tactics employed by these malicious software entities and their dynamics durin...
详细信息
ISBN:
(纸本)9783031785993;9783031786006
The threat of malware is increasing and poses significant computer security risks to both individuals and organizations. Understanding the tactics employed by these malicious software entities and their dynamics during the epidemic process is crucial for designing robust defense strategies and ensuring the protection of computer systems. In this article, we investigate a population of digital nodes (such as phones, computers,...) under attack by modeling the network using a susceptible-infected-resistant (SI2R) compartmental model, where hosts can transition between susceptible, infected, or resistant states. Our model considers two types of infected nodes: active nodes, whose resources are exploited, and passive nodes, which spread the virus. Both active and passive nodes can develop resistance with certain probabilities, which are influenced by the resource utilization percentages set by the malware designer. Thus, rather than optimizing resource utilization, the malware's goal is to maximize the number of active hosts at the end of the process. To achieve this objective, we aim to determine the optimal percentage of passive nodes to consider at each period, recognizing that the variation in the number of active nodes depends on the number of passive nodes.
Recently, neural machine translation (NMT) has become highly successful achieving state-of-the-art results on many resource-rich language pairs. However, it fails when there is a lack of sufficiently large amount of p...
详细信息
During the several years of production of an animated movie, review meetings take place daily, where supervisors and directors generate text notes about fixes needed for the movie. These notes are manually assigned to...
详细信息
The analysis of Twitter data can help to better understand the interplay between scientific institutions, volunteers and other actors in a Citizen science (CS) context. A first essential distinction has to be made bet...
详细信息
ISBN:
(纸本)9783031421402;9783031421419
The analysis of Twitter data can help to better understand the interplay between scientific institutions, volunteers and other actors in a Citizen science (CS) context. A first essential distinction has to be made between different user types such as organizations and individuals. We have applied and evaluated different machine learning approaches for this purpose. On this basis, we have analyzed networks based on different Twitter relations to characterize roles and interactions between different user types. Relations based on retweets, quotes, and replies capture the short term dynamics of on-going discussions. Our findings indicate that institutions are the main information sources, whereas personal users have an important role in active information spreading and dissemination through retweeting and quoting. Projecting the dynamic interactions onto a static network based on the follower relationship shows that pathways of dynamic information diffusion are largely determined by the static follower topology. These findings provide strategic information for managing CS-related discussions.
Generative Artificial Intelligence (AI) has the potential to transform medicine. It is helpful to clinicians and radiologists for diagnosis, screening, treatment planning, interventions, and drug development. It benef...
详细信息
暂无评论