Rethinking Lock-in and Locking: Adopters Facing Network Effects

نویسندگان

  • Marc R. H. Roedenbeck
  • Barnas Nothnagel
چکیده

When are we locked in a path? This is one of the main questions concerning path dependency. Coming from Arthur's model of increasing returns and technology adoption (Arthur 1989), this paper addresses the question of when and how a lock-in occurs. To gain a better understanding of the path process, different modifications are made. First, the random selection of two types of adopters is substituted with a random selection of adopters having a Gaussian distributed natural inclination. Second, Arthur's model shows only indirect network effects, so direct network effects are added to the model. Furthermore, it is shown that there is an asymptotic lock-in function referring to the technology A and B adopter ratio; this ratio is calculated within the process on the basis of a returning probability to an open state. In the following, the developed model is used to simulate path process without increasing returns, with increasing returns stopping when a lock-in occurs, as well as random drop-outs of increasing returns. One answer that could be drawn out of this new extended model is that there is no lock-in without further stabilizing returns. This and other aspects are used to provide a simplified path-model for empirical research. Finally, its limits are discussed in regard to uncertainty, innovation, and changes in network effect parameters.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Minuet: Rethinking Concurrency Control in Storage Area Networks

Clustered applications in storage area networks (SANs), widely adopted in enterprise datacenters, have traditionally relied on distributed locking protocols to coordinate concurrent access to shared storage devices. We examine the semantics of traditional lock services for SAN environments and ask whether they are sufficient to guarantee data safety at the application level. We argue that a tra...

متن کامل

Hydraulic anti-lock, anti-skid braking system using fuzzy controller

To maintain the stability trajectory of vehicles under critical driving conditions, anti lock-anti skid controllers, consisting of four anti-lock sub-controllers for each wheel and two anti-skid sub-controllers for left and right pair wheels have been separately designed. Wheel and body systems have been simulated with seven degrees of freedom to evaluate the proper functioning of controllers. ...

متن کامل

طراحی PLL دو حلقه ای مبتنی بر آشکارسازی فاز پنجره‌ای با سرعت قفل بالا، توان مصرفی و اسپور مرجع پایین

In this paper, a dual loop PLL with short locking time, low power consumption and low reference spur is presented. The output frequency and reference frequency of the designed circuit are 3.2 GHz and 50 MHz, respectively, aimed to WiMAX applications. In the proposed circuit in locked state, some parts of the circuit could be powered off, to reduce overall power consumption. Phase detection in t...

متن کامل

Permit Based Locking

The Permit based Locking design pattern provides fast acquisition and release of locks without network communication even in distributed systems build around a central lock server. Instead of plain locks, the server manages "permits to lock", and passes them to those clients which probably need the lock next. If a client hosts a permit, the associated lock can be acquired immediately without se...

متن کامل

Performance Evaluation of the Group Two - Phase Locking

In this paper, we discuss the initial results of a detailed simulation of the group two-phase locking (g-2PL) protocol which was developed for gigabit-networked databases. These results show that the grouping of lock grants, client-end caching and data migration proposed in the g-2PL protocol improves the transaction response time upto 25% at moderate to high network latencies, when compared to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Artificial Societies and Social Simulation

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2008