Through Trial and Error to Collusion*

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collusion through communication in auctions

We study the extent to which communication can serve as a collusion device in one-shot firstand second-price sealed-bid auctions. Theoretically, second-price auctions are more fragile to collusion through communication than first-price auctions. In an array of laboratory experiments we vary the amount of interactions (communication and/or transfers without commitment) available to bidders. We f...

متن کامل

zTuned: Automated SQL Tuning through Trial and (Sometimes) Error

SQL tuning—the attempt to improve a poorly-performing execution plan produced by the database query optimizer—is a critical aspect of database performance tuning. Ironically, as commercial databases strive to improve on the manageability front, SQL tuning is becoming more of a black art. It requires a high level of expertise in areas like (i) query optimization, run-time execution of query plan...

متن کامل

From trial and error to Equator Network

The dissemination of science is grounded on the reliability and value of the research literature that, through an editorial process, expresses the necessary detail to meet the reproducibility and refutably demands that underlie the scientific method. Three roles are defined in this editorial process that the researcher may assume at differing times or simultaneously, from the beginning of his c...

متن کامل

ONLINE APPENDIX Collusion through Communication in Auctions

In this Online Appendix, we conduct additional analysis of the data and robustness checks as well as provide some theoretical analysis. We proceed as follows. At the end of Section 1, we describe the type of statistical analysis we perform to compare treatments and behaviors in different parts of the experiment. This section also contains definitions we use in the Online Appendix. In Section 2,...

متن کامل

Collusion Set Detection Through Outlier Discovery

Digging in the details : a case study in network data mining p. 14 Efficient identification of overlapping communities p. 27 Event-driven document selection for terrorism information extraction p. 37 Link analysis tools for intelligence and counterterrorism p. 49 Mining candidate viruses as potential bio-terrorism weapons from biomedical literature p. 60 Private mining of association rules p. 7...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Economic Review

سال: 2004

ISSN: 0020-6598,1468-2354

DOI: 10.1111/j.1468-2354.2004.00122.x