Using Uncensored Communication Channels to Divert Spam Traffic

Size: px
Start display at page:

Download "Using Uncensored Communication Channels to Divert Spam Traffic"

Transcription

1 Using Uncensoed Communication Channels to Divet Spam Taffic Benjamin Chiao and Jeffey MacKie-Mason 8/31/06 {bchiao, Abstact We offe a micoeconomic model of the maket fo bulk commecial advetising (the dominant fom of spam). We adopt an incentive-centeed design appoach to develop a simple, feasible impovement to the cuent system: an uncensoed communication channel. Such a channel could be an folde o account, to which popely tagged commecial solicitations ae outed. We chaacteize the cicumstances unde which spammes would voluntaily move much of thei spam into the open channel, leaving the taditional channel dominated by peson-to-peson, non-spam mail. Ou method follows fom obseving that thee is a eal demand fo unsolicited commecial , so that eveyone can be made bette off if a channel is povided fo spammes to meet spam-demandes. As a bonus, the absence of filteing in an open channel estoes to advetises the incentive to make messages tuthful, athe than to disguise them to avoid filtes. We show show that all ecipients ae bette off when an open channel is intoduced. Only ecipients wanting spam will use the open channel enjoying the less disguised messages, and fo all ecipients the satisfaction associated with desiable mail eceived inceases, and dissatisfaction associated with undesiable eceived and desiable mail filteed out deceases. We appeciate comments fom Nat Bulkley, Nick Economides, Michael Hess, Pete Honeyman, Doug Van Houweling, the membes of the Incentive-Centeed Design Lab (especially Geg Gamette, Lian Jian, Kil-Sang Kim, John Lin, Anya Osepayshvili, Toinu Reeves, Ben Steans, and Rick Wash), and paticipants at the STIET wokshop in May We gatefully acknowledge financial suppot fom the NET Institute and fom NSF gants IIS and IGERT School of Infomation, Univ. of Michigan, Ann Abo, MI Dept. of Economics, and School of Infomation, Univ. of Michigan, Ann Abo, MI

2 1 Intoduction We all eceive spam; we all esent it. Justice Potte Stewat, wee he alive, would know it when he saw it. Nonetheless, it is had to find a consensus definition of spam. Some want to include all unsolicited commecial ; othes include unsolicited bulk ; othes distinguish between deceptive, infomative o malicious . We should not be supised, then, that it is also had to find systematic analyses of the spam poblem, when thee ae so many notions of what spam is. Ou modest goal is to identify a paticula (but pevalent) subspecies of spam, analyze its ecology, and popose a mechanism that may incease substantially the social welfae by modifying the flows of this type of spam. Ou immodest goal is to lay goundwok fo systematic modeling of spam, and the consequent development of solutions that ae effective because they addess systematic featues of the poblem. We limit ou consideation to spam defined as bulk, unsolicited, commecial ; that is, effectively identical messages sent unsolicited to lage numbes of ecipients with the goal of inducing a willing, mutuallybeneficial puchase by the ecipient. With this definition (we will call it spam fo convenience, but it s meely one subspecies) we ule out malicious bulk unsolicited (e.g., caying a vius payload); and we ule out deceptive (e.g., phishing messages that attempt to tick ecipients into evealing valuable pesonal infomation such as bank passwods). Defined as we have done, commecial spam is an instance of a diffeentlynamed, well-known phenomenon: advetising. Using the less-pejoative monike advetising might give us a good stat on a thoughtful, systematic consideation; cetainly, it might help us ecognize that at least this type of spam is not pe se evil o moally deficient (though, as with any advetising, some population subgoups might conclude that the poducts advetised might fail that goup s moality test). Nonetheless, we will use commecial spam o just spam fo shot, because we elish the poweful affective esponse the tem eceives, and the oppotunity to punctue the pejoative bubble it engendes. To develop a systematic analysis of (non-deceptive, non-malicious) commecial spam, we need gounding pinciples. We find that supising insights follow fom adopting just two familia, simple economic pinciples: Revealed pefeence Thee is a non-tivial demand fo the eceipt of spam . Rational choice Spam puveyos will send spam messages to whomeve, 2

3 wheeve, wheneve, as long as the expected benefits exceed the expected costs. We expect that only the fist pinciple will aise many eyebows at fist, but we find that the second pinciple consistently has been halfignoed in most pio liteatue on the spam poblem. Fist, demand. Spam is not costless to geneate o delive, despite casual claims to the contay. It is tue that eplication and tanspot costs ae extemely low, compaed to non-digital advetising channels. But thee ae a numbe of othe costs: maketing and contacting costs with advetises, content ceation costs, content disguising costs (to get past technological filtes), distibution technology costs (most spam is now sent out by vius-ceated spambots unning on many machines not owned by the spam povide; these botnets need to be continuously egeneated, which equies developing new viuses to distibute, among othe things). Thee may also be the cost of expected legal penalties. Given the non-zeo costs of poviding a spamming sevice, and the fact that we ae limiting ouselves to commecial spam, fom which the benefit to the sende is the inducement of willing puchases by ecipients, we must conclude the following: by evealed pefeence, thee is a nontivial demand fo the eceipt of spam . Some consenting adults must be puchasing enough fake Viaga and Rolex knock-offs to pay the spamme s costs. Casual evidence is consistent with ou claim that thee is non-tivial demand fo much spam: the lagest faction of spam content is commecial advetising fo poducts had to find though othe advetising channels [Cano and LaMacchia, 1998]. We efe to these as censoed commecial solicitations, though the censoing is not always explicit o govenment-suppoted. Explicitly censoed examples include ads fo non-pesciption povides of egulated dugs, o fo povides of knock-off poducts that intentionally violate copyights o tademaks of well-known bands. An example that, while not govenment censoed, may have eason to avoid othe advetising channels (o may not be accepted by othe channels) is (legal) ponogaphy. Sophos [2005] finds that this patten continues; fo example, in 2005 medication spam constitutes aound 40% of all spam, and adult content fo anothe 10-20%. Evett [2006] estimates that poduct spam constitutes aound 25% of all spam, and adult content fo anothe 19% 1. Recognizing that some ecipients want to ead spam, while many othes evidently do not, we immediately see that one oppotunity fo 1 Evett [2006] compiles the statistics fom souces including Google, Bightmail, Jupite Reseach, emakete, Gatne, MailShell, Hais Inteactive, and Feis Reseach. 3

4 social welfae impovement is to find a way to match commecial spam to those who want it, and not to those who do not. The latte eades would benefit, and spam sendes would also benefit by not incuing the costs of sending to people who will not want to puchase. As a coollay, we expect the willing ecipients of commecial spam to benefit as well: if spammes can find a way to send to those who ae inteested in eceiving the advetisements, then they can educe thei costs and incease the infomation content and quality in thei ads, to the benefit of those who want the commecial infomation. Conside: Yellow Pages ae a faily successful bulk advetising medium because its ads ae geneally viewed only by those who want to see them, and the advetises have the incentive to make the ads clea and infomative, giving the viewes the infomation they desie. Spammes in contast incu substantial costs to disguise the infomation in thei ads so that filtes cannot easily emove the ads fom the steam. But then the eades who do want the infomation so they can make a puchase ae confonted with uninfomative, low-value ads. The second pinciple we offe as a foundation fo systematic analysis of the spam ecology is that spammes ae fo the most pat ational businesspeople, and they will send ads when the net benefit to them exceeds the net cost. What insight do we obtain fom this unsupising obsevation? 2 We answe, fist, indiectly: most othe authos addessing spam have focused on poposals to aise the cost of spamming as a way of educing the amount of spam poduced. This appoach is pincipled, but incomplete. An equivalent eduction in the benefits of spamming should have the same incentive effect. If spam wee flood wates, the existing solutions ae in the spiit of building stonge levees to aise the ive banks, instead of diveting the flood wates using a floodway. We build on these two pinciples to constuct a model fo commecial spam that includes advetises, spam sevice povides, sevice povides and mail ecipients who have heteogeneous tastes fo eceiving spam. 3 See Figue 1. We then intoduce a simple but novel mechanism motivated by the two pinciples above: an uncensoed communication channel though which commecial spam will be accepted without filteing o othe attempts to block. Such a channel could be as simple as a standadized mail client folde that would accept all appopiately 2 We know, of couse, that not evey decision, in evey cicumstance, satisfies a test fo decision-theoetic ationality. We only equie that costly business decisions in geneal follow fom easonable compaisons of benefits to costs. 3 In ou cuent model we focus on the pefeences and behavios of spammes and ecipients; we use educed-fom, non-adaptive epesentations fo advetises and sevice povides. 4

5 Fig.2 Stakeholde in an Ecosystem incu c pay p 1 Sendes Sevice Povides pass thu pay p 2 fo puchases Good & Sevices Povides Uses Viaga, ebay, IBM Clients Seve Filtes make type 1 & 2 eos Client Filtes make type 1 & 2 eos pass thu Figue 1: Stakeholdes in an ecosystem. labeled messages. See Figue 2. Ou conjectue is that if well-designed, then unde some cicumstances the intoduction of an uncensoed channel could esult in substantial self-segegation by spammes, with advetisements mostly tageted at spam boxes, and much less at the taditional (censoed) channel. See Figue 3. 4 Thee should be little dispute that if uses could implicitly opt-in fo commecial spam by ceating an open spam box, the spammes would send mail to that channel. But why would they stop sending to the censoed channel? Ou conjectue is that if enough of the latent demand fo puchasing spam-advetised poducts is eached though the uncensoed spam box channel, then the emaining commecial benefits obtainable fom also spamming the taditional censoed channel may fall sufficiently low that they no longe justify the incemental costs. 4 One might ague that the Wold Wide Web is close to an uncensoed channel. If so, why doesn t the Web satisfy the demand fo advetising? One obvious eason is that some o many of the poducts using commecial spam advetising do not want a duable, public pesence. If they ae moving thei web site to new domains fequently, they need a communication channel though which to disseminate each new, tempoay location. Indeed, we obseve cases in which the links fo some domains selling medications expied in Google s index well befoe Google got a chance to enew the links. MessageLabs (2005) shows that about 30% of spam domains expie within 24 hous. Moe geneally, we expect thee to always be significant demand fo push advetising in addition to pull (seach-based) advetising, as evidenced by the multiple media fo advetising that co-exist in equilibium (Yellow Pages, local newspapes, billboads, boadcast TV and adio ads, bulk unsolicited commecial suface mail ads, etc.). 5

6 Fig.1 A Hypothetical Open Channel Figue 2: An hypothetical open channel. Fig.3 Sepaating the Demand fo and Supply of Censoed Content Sendes Sevice Povides Good & Sevices Povides ebay, IBM Seve Filtes Good & Sevices Povides Viaga Uses Uses Client Filtes Clients Sendes Sevice Povides Figue 3: Sepaating the demand fo and supply of unsolicited commecial advetising. 6

7 Thee is anothe eason fo spammes to keep sending to the taditional censoed channel: pesuasion. We ae assuming that ecipients know if they want to peiodically puchased based on spam advetisements, and thus can make an ex ante ational choice about which channel to ead. This situation is known in the liteatue as infomative advetising: consumes know they want infomation (pice, location, etc.) about paticula poducts, and seek out infomative advetising to obtain the infomation they need. But thee is anothe categoy: pesuasive advetising, intended to convince consumes to buy poducts they peviously did not ealize they wanted. Since these ads ae aimed at consumes who might geneally opt out of the open channel, it would do little good to send them to the open channel (which these peviously uninteested customes shun), so the pesuasive advetise will geneally go to whee the unpesuaded ae (the censoed channel). Recall also, that if spammes do choose to taget the open channel, then we expect that they will also stop dissipating esouces on unpoductive effots to disguise the infomative content of thei messages. Then those who wish to eceive advetisements will benefit fom the highe quality (infomativeness). This incease in infomativeness, in tun, likely would induce a lage numbe of consumes to want to eceive commecial spam. We constuct a model so that we may fomally identify conditions unde which the conjectues above hold tue (and conditions unde which they do not). Ou main esults ae to chaacteize the degee to which spam will be shifted to the open channel, and to demonstate that all paties benefit fom the intoduction of an open channel, so that it constitutes a Paeto impovement. 2 Pio appoaches to spam To date, most eseach focuses on educing spam geneally, usually though policy, technical o maket mechanisms that aise the cost of sending spam. Befoe we detail ou model of a mechanism that divets spam to those who want it, and away fom those who don t, we eview othe appoaches. 2.1 Technological Technological solutions have gained some patial success but the esults ae fa fom satisfactoy even though they have been implemented fo some time. The poposals include ule-based, Bayesian, and community ( collaboative ) filteing, disposable identities using extended addesses [Bleichenbache et al., 1998], DomainKeys Identified Mail [Peez, 2005], Sende ID o Sende Policy Famewok [Cocke, 7

8 2006] 5, challenge-esponse [Dwok and Nao, 1993, Lauie and Clayton, 2004], whitelists, and blacklists. See Cano and LaMacchia [1998] fo an oveview. Thee is a fundamental poblem with technological systems: they typically ely on the cost to spammes of devising technological wokaounds. If the cost is high enough, the net benefit of spamming will be insufficient and the quantity of successful (deliveed) spam will fall. Howeve, the costs of technological wokaounds falls apidly, as technology becomes exponentially cheape and as algoithmic solutions to had computational poblems apidly impove. Thus, as the wokaound cost falls, the technological baie becomes less effective and spam deliveed inceases. This fundamental cost dynamic ceates a need fo ongoing investment to ceate impoved anti-spam technologies. While an ams ace may not be the fist-best solution, we have not seem feasible methods to avoid this cycle, given the inevitable and apid decline in technology costs. 2.2 Legal Legal ules ae anothe appoach to spam eduction. The U.S. CAN- SPAM act equied a fomal ecommendation fom the Fedeal Tade Commission egading the establishment of a do-not-spam egisty simila in the spiit of the do-not-call and do-not-fax egisties ceated pusuant to the Telephone Consume Potection Act of Although The FTC ecommended against the ceation of the list, othe CAN-SPAM ules took effect 1 Januay Howeve, legal solutions alone ae, and likely will emain incomplete. Fist, to avoid pohibiting desiable communications, legal ules geneally include safe habo povisions guaanteeing the pemissibility of exhibiting cetain chaacteistics. It is geneally difficult o impossible to pevent spammes fom composing thei messages so that they exhibit these chaacteistics, thus ceating a safe habo fo a lage and pobably gowing quantity of spam. Second, legal juisdiction ove spam-distibuting oganizations is a cucial poblem: spammes can easily change thei locations to othe counties. 2.3 Makets Some poposals based on economic incentives have been gaining attention. These shae an impotant featue with ou appoach to the poblem: they typically ae based on a pesumption that uses have heteogeneous values fo eceiving vaious messages. In an expeimental investigation of stamps as a pice fo obtain- 5 As of now, spam-sending domains ae ionically the biggest uses of SPF tags [MXLogic, 2005] 8

9 ing a ecipient s attention, Kaut et al. [2005] found that chaging causes sendes to be moe selective and to send fewe messages. This method, howeve, equies non-spammes to pay a pice as well. van Zandt [2004] examines the design of an optimal tax that minimizes exploitation of attention though infomation oveload. Vaious stamp systems have been o ae about to be implemented. 6. Lode et al. [2006] popose an attention-bond mechanism in which a sende deposit a monetay bond to a thid-paty agent, to be eleased only if the eceive tells the agent to do so. Payment systems equie substantial infastuctue fo full implementation. The infastuctue necessay fo widespead micopayment is lacking, and fo successful adoption into a sevice exhibiting netwok effects, such as , it is likely necessay that thee be ealy widespead, not incemental, adoption, which is difficult to socially enginee. Also, thee is a nom of fee sevice. Legitimate sendes may esist paying fo outgoing moe stenuously than is stictly justified if they took into account the system benefits to thei ecipients. 3 Theoy In ou bief eview of othe appoaches to spam we highlighted one common featue: they ae geneally based on aising the costs of spamming, not on educing the benefits. In addition, technological and legal methods (and some maket methods, but less so) implicitly assume that cetain mail (o mail sendes) ae unifomly undesiable; that is, they ignoe heteogeneity in ecipient pefeences. In this section we pesent a model of the two-sided maket fo commecial spam, in which poduct selles pay bulk sevice povides to delive advetisements to ecipients, some of whom in tun willingly choose to puchase the advetised poducts. We then analyze the effect of intoducing an open (i.e., uncensoed) channel. The open channel appoach is designed to lowe the benefits to spammes of sending unsolicited mail to all ecipients, and woks only and pecisely because ecipient pefeences ae heteogeneous: viz., some ecipients want to eceive advetisements. 6 Two of the wold s lagest povides of accounts, Ameica Online and Yahoo!, announced in ealy 2006 that they would give pefeential teatment to messages fom companies paying fom 1/4 of a cent to a penny each. An stamp system was aleady implemented in Koea in Daum Copoation, the lagest potal in Koea, chages about 0.8 cents to the sendes who send moe than 1000 messages pe day. Fees scale downwads if sendes ae anked lowe than the biggest sendes o moe uses ate the s as useful. Data cited by Kaut et al. [2005] indicate that spam was educed by about 40% fom its peak in a half-yea peiod aound the implementation. 9

10 3.1 The Recipients Poblem Recipient t is eithe of type (h)igh o (l)ow. The type is the intensity of pefeence fo censoed content. Channel j is eithe (o)pen o (c)ensoed. 7 Sendes ae defined by two attibutes: whethe they send mass o tageted mail, and whethe they send censoed o uncensoed content. 8 The fist attibute is mainly a cost attibute. Specifically, massmail satisfies the following chaacteistics of distibution and infomation costs: Low distibution cost. The population of sendes could in pinciple be distibuted continuously accoding to how efficient they ae in sending mass-mail. Fo simplicity and to a geat extent a desciption of the eal wold, we assume howeve that eithe a sende can o cannot send mass-mail. The ability to send mass-mail efes to the ability to sending tens of thousands of mail pe day. Revenue invaiance to andomization. A mass-mail does not imply that copies ae necessaily identical. In fact, a common stategy is fo a mass-mail sende to andomize some uninfomative text in an othewise identical message to fool content filtes. It is equivalent, fo ou pupose, if a sende andomizes ove infomation content (e.g., sends some medication messages and some motgage loan messages), but obtain the same expected evenue fom each. By both of the above chaacteistics, mass mail always appea in multiple and sometimes almost identical copies in a given ecipient s inbox. This highe substitutability implies that thee is a low type II eo cost associated with mass mail. That is, mass mail wongly filteed will cause much less inconvenience than the countepat of tageted-mail, even fo those ecipients who want mass-mail. The convese is not tue. Some ecipients pefe even to neglect tageted mail fom some people they know. We ae going to assume, howeve, that on aveage thee is a much lowe type II eo cost associated with mass mail. We do not equie that it is possible to identify that mail is sent by a bulk sevice povide. It is easy to fool geneal pupose filtes of the 7 We call the cuently available standad channel censoed because sevice povide filtes and domain-blocking ules ae ubiquitous. 8 By censoed content we mean content of a type that conventional sevice povides outinely attempt to filte out of the ecipient s steam. Such content may o may not be illegal, and the filteing effots geneally will be impefect. Thus, as we make explicit below, some censoed content may be unfilteed, and thus be eceived. 10

11 identity of the sende, and the ecipient often won t know until afte incuing the cost of viewing the message. In pactice, much spam can be automatically identified as being sent fom a bulk povide, but ou esults ae obust as long as consideable spam cannot. The second sende attibute is whethe it sends content of a type that is censoed (if ecognized) by the sevice povide (ESP). 9 Content-based filteing can ely on any available infomation heades and body text. Fo example, Gmail, Hotmail and Yahoo! usually filte adult content and all mail fom some blacklisted sendes (usually based on IP addesses). On the othe hand, we assume that sendes can, at a cost, disguise content to some degee. In all, we identify fou types of mail: Censoed-content mass Examples include Viaga and eotic content advetisements. Censoed-content tageted Examples include pesonalized adult mateials, pehaps sent by a pay subsciption sevice. Uncensoed-content mass Examples include advetisements fom conventional bookselles, non-pofit fundaises, and othe legal and less socially objectionable puveyos. Uncensoed-content tageted Examples include pesonal coespondence. Ou design goal was to develop a social welfae-inceasing mechanism that induces censoed-content mass mailes to educe the supply of thei messages deliveed to the cuently standad channel (the censoed channel). Theefoe, we simplify by assuming that mass mailes send only censoed content, and tageted mailes send only uncensoed content. 10 To model the use poblem we suppose that ecipient chooses which channel(s) to ead in ode to maximize utility, which depends on the quantity of vaious categoies of U (desied mail eceived, undesied mail eceived, desied mail not eceived) (1) 9 Recipient censoship (with, fo example, pesonal spam filtes) ae not vey impotant to ou cental esults, as long as the value of spam that evades these filtes is, on aveage, negative to a segment of the population. 10 Thee ae inteesting eseach questions associated with the othe two types as well, but they fall outside the scope of ou pesent analysis. Adding them to ou model fo the questions we ask in this pape would complicate notation and poofs, but would not change the qualitative esults. 11

12 The utility function is inceasing in the fist agument, and deceasing in the othes. Befoe explaining the aguments above, we intoduce futhe notation. Assume that fo all ecipients, thee is a (pehaps small) faction ɛ of uncensoed mail that is not desied. We assume that individuals eithe desie (all) censoed-content mail in a given channel o not, and use the indicato φ j t to epesent those pefeences. If a ecipient of type t {h, l} desies censoed-content mail in channel j, then φ j t = 1; othewise φ j t = We assume that only high type ecipients put a positive value on censoed content (φ j l = 0, φ j h = 1). Whethe mail (desied o undesied) is eceived depends on the filteing technology employed by the sevice povide. We model this below, but fo now simply efe to mail that gets though as unfilteed and mail that does not as filteed. Then the fist agument of the full utility function (1), desied mail eceived, becomes: (1 ɛ) unfilteed uncensoed mail+unfilteed censoed mail φ j t (2) The second agument of utility function (1), undesied mail eceived, becomes: ɛ unfilteed uncensoed mail+unfilteed censoed mail (1 φ j t) (3) The thid agument of the utility function (1), desied mail not eceived, becomes: (1 ɛ) filteed uncensoed mail+filteed censoed mail φ j t (4) In the censoed channel filteing technology is designed to distinguish between censoed and uncensoed content, but it does so impefectly. Each sende knows that the filte has a stength of γ c [1, ) fo censoed content, and stength ˆγ c [1, ) fo uncensoed content, with γ c > ˆγ c. The filte stength is simply the invese of the faction of mail that gets though the filte. By definition thee is no filteing in the open channel, γ o = 1. Sende s can make an effot to disguise its content to educe the filte s success ate. We let sende s choose a disguise level, d j s [ 1, 1], γ j 11 We have an asymmety between the faction of desiable censoed- and uncensoed-content mail in a channel: ecipients may not want 100% of the uncensoed mail sent to them in a channel, but if they want any censoed-content mail, then want all of it. We do this to simplify the algeba, without losing anything qualitatively impotant. In both cases, not all mail is desied: fo uncensoed, each individual may not want some; fo censoed, some individuals don t want any. Thus, thee is the possibility of both Type I and Type II eos fo each. 12

13 fo mail sent to channel j, whee d j s is a multiplicative facto adjusting filte stength. If d j s = 1, disguising has no impact and the effective filte stength is the technological stength γ j. If d j s = 1/γ j, the effective filte stength is one, which is to say, all content passes though unfilteed. Disguising is costly, so we let d o s = 1 (no effot to disguise in the open channel). We let n denote the volume of censoed-content mail, and ˆn denote the volume of uncensoed-content mail. Then, fo some given censoedcontent mail volume sent to ecipient in the censoed channel, n c, the potion that actually eaches the ecipient is nc, whee d j is the disguise d c γ c level associated with n j. Note that we assume that thee is no need to disguise uncensoed content. In ou infomal specification (1), ecipient utility depends on the undiffeentiated volume of vaious mail categoies. Howeve, by intoducing content disguising, we cannot avoid anothe dimension of quality: the value of a given type of mail to a ecipient will now also depend on how infomative it is, which geneally will be invesely popotional to the amount of disguising the sende does. That is, clutteing a message with extaneous gabage text to get past a filte also makes it difficult fo the ecipient to find the useful infomation. Theefoe, we allow utility to depend on the infomativeness-adjusted volume of eceived. To adjust fo message infomativeness afte disguising, we intoduce an adjustment function b, which is inceasing in the effot made to disguise censoed-content mail. We define κ j = 1 if ecipient uses channel j, zeo othewise. Now we can fomally expess the utility function (1). The fist agument, which is infomativeness-adjusted desied mail eceived, becomes: u desied eceived = j {o,c} (1 ɛ)κ j ˆn j + ˆγ } {{ j } uncensoed content mail j {o,c} φ j tκ j b(d j )n j d j γ } {{ j } censoed content mail (5) in which the fist tem is (desiable) unfilteed uncensoed-content mail, and the second tem is unfilteed, censoed-content, and disguised mail fo high type ecipients (i.e., those who find it desiable). The second agument of the utility function (1), which is infomativenessadjusted undesied mail eceived, becomes: u Type I eos = j {o,c} ɛκ j ˆn j ˆγ + (1 φ j t)κ j b(d j )n j j (6) d j γ j j {o,c} in which the fist tem is undesiable unfilteed uncensoed mail, and 13

14 the second tem is unfilteed, censoed-content, disguised mail fo low type ecipients (who give it a negative value). The thid agument of utility function (1), desied mail not eceived, becomes: u Type II eos = j {o,c} (1 ɛ)κ j ˆn j (1 1ˆγj ) + j {o,c} φ j tκ j b(d j )n j (1 1 d j γ j ) (7) whee the fist tem is desied filteed uncensoed mail, and the second tem is filteed censoed-content mail fo high type ecipients. 12 As a special case, we assume that the censoed channel is essential so that evey ecipient uses it: κ c = 1. Then, given the filte stengths, disguise levels, volume and actions of othe ecipients, ecipient makes a binay choice whethe to ead mail in the open channel, κ o {0, 1}, by maximizing: U (u desied eceived, u Type 1 eos, u Type 2 eos) (8) Poposition 1 If evey ecipient uses the censoed channel and thee is no uncensoed-content mail in the open channel (ˆn o = 0), then ecipients who have a positive value fo censoed contents, and only they, will use also the open channel. Poof. The esult is obtained staightfowadly fom the thee components of (dis)utility, (5) (6). Fist, fo a ecipient who finds censoed content undesiable (φ j l = 0), eading the open channel povides no benefit, but ceates disutility by inceasing the amount of objectionable mail (see the second summand in (6)). Fo a ecipient who values censoed content, eading mail in the open channel inceases the second summand in (5) (desied mail eceived). It has no effect on Type I eos (6). Likewise it has no effect on Type II eos (7) because fo the open channel d j = γ j = 1, so the second summand is zeo when j = o. Thus, if an open channel is intoduced, h-type ecipients will use it to obtain benefit fom desied commecial spam, but l-types, who do not want spam, will not (as long as pesonal sendes do not stat sending (much) to the open channel). We now tun to sendes to find the equilibium behavio of spammes when an open channel is intoduced, afte which we analyze the welfae effects of an open channel. 12 We could elaboate by allowing Type II eos associated with tageted mail to be moe annoying. 14

15 3.2 The Sende s Poblem We will descibe in detail the cost and evenue functions of the censoedcontent mass-mail sendes only. This is because the focus of the pape is to move the supply of and demand fo censoed-content mass-mail out of the cuent system. The total cost function fo mass- sende m, c m (n o m, n c m, d c m), eflects the costs of geneating the volumes, and of disguising mail sent to the censoed channel. The disguise cost is captued by c m / d j m < 0, and the volume geneating cost by c m / n j m > We allow fo economies of scale in the sense of sub-additivity, c m (n o m, 0, d c m)+ c m (0, n o m, d c m) > c m (n o m, n c m, d c m), and cost complementaity (ie., < 2 c m n j m n i m 0, i j). To be concete, we specify c m (n o m, n c m, d c m) = F C m + g m (d c m) + δn o mn c m (no m) (nc m) 2, in which g m (d c m) = , so that the d c m cost of no disguising (d c m = 1) is g m (1) = 0. Cost complementaity and subadditivity ae both ensued by letting δ < We also assume a egulaity condition of δ 2 < 1. On the evenue side, sendes ae pice takes. Selles of censoed goods o othe legitimate goods pay them fo solicitations. Let p j be the advetising chage pe disguised ( nj m ) eaching the uses in d j j mγ channel j Rathe than having a zeo maginal cost as commonly asseted, spammes incu cost to enew technologies, which depeciate quickly, to geneate spam. Fo example, zombies (ie. home computes hijacked by cackes) ae consistently destoyed by antivius softwae, so spammes must continuously develop and distibute new viuses to captue new (tempoay) zombies. Zombies ae esponsible fo elaying moe than 60% of the wold s spam (Sophos, 2005). 14 We could have used a deceasing maginal cost function such as g(d c m) = 1 (d 1. c m )2 15 Cost complementaity follows fom δ < 0 because cm n c m δn c m + n o m. Subadditivty does as well because c m (n o m, n c m, d c m) [c m (n o m, 0, d c m) + c m (0, n c m, d c m)] = δn o m + n c m, and cm n o m =F C m + g m (d c m) + δn o mn c m (no m) (nc m) 2 [F C m (no m) 2 + F C m + g m (d c m) (nc m) 2 ] = δn o mn c m F C m < 0. = 16 In pactice, thee is a volume discount (that might o might not due to diminishing likelihood to espond). Fo instance, Send-Safe is a sevice spammes offe to advetises. One picing scheme asks fo US$125 pe 1 million cedits (a poxy of n j m ) when an advetise pays fo 0.4 million cedits. The pice dops monotonically d j j mγ to US$10 pe 1 million cedits when an advetise pays fo 300 million cedits. This picing scheme is available at 15

16 On a pactical level, the sende chooses whethe to send to the censoed o the open channel (o both). If sending to the open channel, the sende does not disguise content, and adds a tag that indicates the message should be deliveed to the open channel. If sending to the closed channel, the sende does not tag the message, and in fact may expend some effot to disguise the content. We assume that mail send is distibuted unifomly to the ecipients in a given channel. Given the pices and filte stengths, sende m chooses (n o m, n c m, d c m) to maximize: s.t. π m (n o m, n c m, d c m) = p o n o m + pc n c m d c mγ c c m(n o m, n c m, d c m) (9) d c m [ 1, 1]. (10) γc Poposition 2 Conside thee cases. Case (a): p o pc (b): p o pc δ γc (1 δ 2 ) δp c ; case (c): Othewise. If p o = p c = 0, Else, the best esponses of sende m ae: Case (a): Case (b): Case (c): d c m = 1; n o m = 1 1 δ 2 (po δpc γ γc (1 δ 2 ) δγ c δp c ; case d c m = 1; n o m = 0; n c m = 0 (11) c ); n c m = 1 1 δ ( pc 2 γ c δpo ) (12) d c m = 1 γ ; c n o m = 1 1 δ 2 (po δp c ); n c m = 1 1 δ 2 (pc δp o ) (13) d c m = Poof. See Appendix 1. (p c ) 2 (1 δ 2 )(γ c ) 2 + δp o p c γ c ; (14) n o m = p o δ γo p ; c n c m = γc (15) p c Coollay 1 As long as eithe p o o p c is (o both ae) stictly positive, a non-zeo quantity of mass will be sent to both channels. 16

17 Poposition 3 When eithe p o o p c is (o both ae) stictly positive, the optimal solutions n o m, n c m and d c m exhibit the following chaacteistics: (1) d c m is i) deceasing in γ c in cases b and c, independent othewise; ii) inceasing in p o and p c in case c, independent othewise; iii) deceasing in δ in case c, independent othewise. (2) n o m and n c m ae i) inceasing in both p o and p c in cases a and b; ii) deceasing in δ in cases a and b; iii) deceasing in γ c in case a, and independent in case b. Fo case (c), n o m is inceasing in p o and deceasing in p c. Fo case (c), n c m is deceasing in p c and is independent of p o. Poof. By diffeentiation of each of the best esponses in Poposition Welfae Poposition 4 The welfae of censoed-content mass-mail sendes and all ecipients will be unchanged o inceased when thee is an open channel if the following assumptions hold: (1) thee is no censoed-content tageted-mail; (2) thee is no uncensoed-content mail in the open channel; (3) b(d j ) (d j ) 2 ; (4) the maginal evenue of sending uncensoedcontent mail to the censoed channel does not change with o without the open channel; (5) p o p c.(6) Eithe p o o p c equal to zeo. Poof. See Appendix Implementation Issues We emphasize that ou poposal is a stating point. Thee ae implementation issues, which ae outside the scope of this eseach, that must be addessed: Will the total tade volume of censoed goods incease? Is it easonable to assume that the open channel simply shifts the supply of such goods fom othe outlets? What is the magnitude of the maginal exposue of ponogaphy fo minos in the open channel? Have they aleady been exposed significantly by websites on the Intenet? Should we add minimal censoship to the open channel by blocking sexually explicit images o equiing cedit cad numbes to access the open channel? O should we block at least some contents with viuses and woms? Will the main agument still hold as long as the open channel is significantly less censoed than othe channels? Moe geneally, what ae the social implications if it is easie to obtain countefeit poducts o piated softwae because of the open channel? 17

18 The open channel is a typical poblem of two-sided makets, which need both the sides of sendes and ecipients. Is it desiable fo the lage sevice povides to unilateally opt-in fo all the ecipients (so at least one side of the maket is on boad)? 17 Cuently, Gmail lists side-by-side some advetisements even fo spam messages. Will the possibly inceased volume (at least with censoed contents) be sufficient incentives fo the pivate povision of the open channel? How many povides adoptions do we need fo the open channel to be effective? Ae the customes willing to switch to the few adoptes? 5 Conclusions We popose a pincipled appoach to developing and analyzing spam policies. Ou appoach is gounded in an economic, ational choice chaacteization of the choices made by spammes and ecipients. Ou novel insight is to induce the supplies fo and demandes of commecial spam to move out of the cuent system (a censoed channel), by poviding an open channel in which those who want the advetisements can find them. As a coollay benefit, esouces ae not wasted on unpoductive content disguising, and eades eceive highe quality (moe infomative) ads. Technical filtes and legal ules aise the cost of deliveing spam to eades. Costs ae bone by advetises (who must develop eve-changing techniques fo avoiding filtes, etc.), but also by ecipients, who spend time doing the difficult filteing and eviewing that cannot be automated. Methods that channel communications moe diectly to those who want them would lowe costs on both sides and be welfae impoving. In ou mathematical model, we have shown that all ecipients ae bette off with the intoduction of such open channel: only ecipients wanting spam will use the open channel enjoying the less disguised messages, and fo all ecipients the satisfaction associated with desiable mail eceived inceases, and dissatisfaction associated with undesiable eceived and desiable mail filteed out deceases. We do not claim that ou idea would povide a complete solution to the cuent spam poblem, but we do offe a novel new tool that, togethe with the othe well-known tools (technical, legal and economic), may contibute to a eduction in the flow of low-infomation, unsolicited bulk . The ultimate solution, simple economics pedicts, is fo the value of puchasing stimulated by spam to fall sufficiently low that 17 Gmail, Yahoo!, and Hotmail ae thee lagest online sevice povides, each with a maket shae close to 1/3. 18

19 it is less than the aleady low cost of sending spam. If we can tempt a substantial numbe of consumes who want to puchase spam-advetised poducts into a sepaate channel (tempt them with the expectation of highe quality, moe infomative ads to help them find the poducts they want), the puchasing value emaining in the taditional, filteed channel may dop sufficiently to stat discouaging spammes fom using that inceasingly unpoductive channel. In othe wods, we take a staightfowad economic appoach to the question, by ecognizing that thee is not just a supply cuve but also a demand cuve fo spam. We model the incentives, within the ecosystem of existing spam solutions, to induce both supplies and demandes to move out of the cuent censoed channel and into the open channel. If customes who want to puchase will benefit fom moe infomative ads in a sepaate channel, then spam advetises will benefit fom focusing thei advetising spending on that channel. This should not be a vey contovesial idea, but it is, we believe, an idea that has been lagely missing fom the debate. Thee is anothe illuminating economic pespective on ou wok: spam is fundamentally a poblem that aises when disposal is not fee. We know fom the Fist Fundamental Welfae Theoem that unegulated fee makets ae geneally Paeto efficient, but that esult equies fee disposal. Spam is not fee to dispose: it equies time to open and conside. Some types of spam ae malicious and may actually cause ham to one s data files o opeating system befoe we can dispose of it. Ou poposal eceates an efficient fee maket the open channel fo those who do not want to dispose of spam. But we povide those fo whom the disposal costs ae sufficiently high (not fee) the choice to opt out and paticipate only in the censoed channel. Meanwhile, sendes don t intenalize the disposal costs of uninteested ecipients, but the sendes nonetheless choose to send less to the censoed channel because the aveage popensity to buy falls as spam eades move to the open channel. Of couse, not all spam is designed to delive infomative advetising messages to willing customes. A significant potion of spam is intended to deceive eades (e.g., phishing and othe scams), and othe spam messages ae intended to pesuade eades who may not have peviously thought they wanted to puchase a spam-advetised poduct (and thus, who would not ead the messages in the uncensoed advetising channel). We do not suggest that ou poposal will have a diect effect on the quantity of misleading spam (it might affect pesuasive advetising because a lage faction of those susceptible to this may aleady be inclined to ead the uncensoed and moe infomative advetising 19

20 channel). An open advetising channel is possible at low cost, and it seems evident would make uses at least weakly bette off (no wose off) than the status quo. If well-designed, an incentive-compatible advetising channel that hanesses the simultaneous foces of demand and supply could significantly educe the flow of unsolicited bulk commecial . 6 Appendix 6.1 Poof of Poposition 2 The sende s pofit function is π m (n o m, n c m, d c m) = p o n o m + pc n c m d c mγ c c m(n o m, n c m, d c m), (16) so, the Lagangian is: L = π( ) λ c 1(d c m 1) + λ c 2(d c m 1 γ c ) + µo n o m + µ c n c m (17) whee λ c 1, λ c 2, µ c, µ o 0. The complementay slackness conditions ae: FOCs: λ c 1(d c m 1) = 0 (18) λ c 2(d c m 1 γ c ) = 0 (19) µ o n o m = 0 (20) µ c n c m = 0 (21) p o = c m µ o = δn c n o m + n o m µ o m = n o m = p o δn c m + µ o (22) p c d c mγ = c m µ c = δn o c n c m + n c m µ c m = n c m = pc d c mγ c δno m + µ c (23) p c n c m (d c m) 2 γ c λc 1 + λ c 2 = c m d c m = g m(d c m) = (d c m) 2 1 = pc n c m γ c + (λ c 1 λ c 2)(d c m) 2 (24) = d c m = ( 1 pcnc m γ c ) 1/2, λ c λ c 1 λ c 1 λ c 2 (25) 2 20

21 Combining (22) and (23): n o m = p o δ( pc d c mγ c δno m + µ c ) + µ o n c m = = 1 1 δ 2 [po δ( pc d c mγ c + µc ) + µ o ] (26) pc d c mγ c δ(po δn c m + µ o ) + µ c = 1 1 δ 2 [ p c d c mγ c δ(po + µ o ) + µ c ] (27) Befoe doing moe substitutions in the above nonlinea equations to solve fo d c m, n o m, n c m moe explicitly, we fist see if we could eliminate some cases below. Case 1: n o m, n c m > 0 = µ o = µ c = 0. Fom (26), n o m = 1 p c 1 δ 2 [po δ( )] (28) d c mγm c Fom (27), Subcase 1: d c m = 1 = λ c 2 = 0 Fom (28), Fom (29), Fom (24), Fom (32), λ c 1 > 0 Fom (32), λ c 1 = 0 n c m = 1 1 δ 2 [ p c d c mγ c δpo ] (29) n o m = 1 1 δ 2 [po δ( pc )] (30) γm c n c m = 1 1 δ 2 [ pc γ c δpo ] (31) λ c 1 = γc p c n c m γ c (32) γ c > p c n c m (33) γ c > pc 1 δ ( pc 2 γ c δpo ) (34) γ c = p c n c m γ c = pc 1 δ ( pc 2 γ c δpo ) 21

22 Theefoe, subcase 1 is admissible when γ c p c γc (1 δ 2 ). 18 δγ c δp c Subcase 2: d c m = 1 = λ c γ c 1 = 0 Fom (28), Fom (29), Fom (24), pc ( pc δp o ), o equivalently p o 1 δ 2 γ c n o m = 1 1 δ 2 [po δp c ] (35) n c m = 1 1 δ 2 [pc δp o ] (36) Fom (38), λ c 2 > 0 1 = pc n c m λc 2 γ c (γ c ) 2 (37) λ c 2 = γ c p c n c m (γ c ) 2 (38) Fom (38), λ c 2 = 0 γ c p c n c m (γ c ) 2 > 0 (39) p c n c m > γ c (40) p c (p c δp o ) > γ c 1 δ 2 (41) p c n c m = γ c (42) p c (p c δp o ) = γ c 1 δ 2 (43) Theefoe, subcase 2 is admissible when γ c pc 1 δ 2 (p c δp o ) o equivalently p o pc δ γc (1 δ 2 ) δp c. Subcase 3: d c m ( 1, 1) = λ c γ c 1 = λ c 2 = 0. Equation (24) and the pemises fo this subcase imply that: γ c = n c mp c (44) 18 The inequality eveses diection because we multiplied both sides by δ < 0. 22

23 Substitute (44) into (29) to get 19 : d c m = (p c ) 2 (1 δ 2 )(γ c ) 2 + δp o p c γ c (45) The solution fo n c m is aleady available fom (44) (o can be equivalently obtained by substituting (45) into (29)): Substitute (46) into (22) to get Case 2: n o m > 0, n c m = 0 Fom (23), n c m = γc p c (46) n o m = p o δ γc ) p c (47) n c m = pc d c mγ c δno m + µ c 0 = pc d c mγ c δno m + µ c Since the ight hand side is non-negative, the only pemissible values ae p c = µ c = n o m = 0,which contadicts with n o m > 0. Case 3: n o m = 0, n c m > 0 Fom (22), n o m = p o δn c m + µ o (48) 0 = p o δn c m + µ o (49) Since the ight hand side is non-negative, the only pemissible values ae p o = µ o = n c m = 0,which contadicts with n c m > δp o + (1 δ 2 ) γc p c = pc d c mγ c n c m = 1 1 δ 2 ( p c d c mγ c δpo ) γ c p c = 1 1 δ 2 ( p c d c mγ c δpo ) d c (p c ) 2 m = (1 δ 2 )(γ c ) 2 + δp o p c γ c 23

24 Case 4: n o m = n c m = 0. Fom (22), n o m = p o δn c m + µ o (50) 0 = p o + µ o (51) Since the ight hand side is non-negative, the only pemissible values ae p o = µ o = 0. Fom (23), n c m = pc d c mγ c δno m + µ c (52) 0 = pc d c mγ c + µc (53) Since the ight hand side is non-negative, the only pemissible values ae p c = µ c = 0. n c m = 0 implies that (25) gives: d c 1 m = ( ) 1/2 (54) λ c 1 λ c 2 Subcase 1: If λ c 1 = 0 and λ c 2 = 0, (24) implies a contadiction because: p c n c m γ c = 1 (55) n c m = γc p c 0 (56) Subcase 2: If λ c 1 = 0 and λ c 2 > 0, it gives a contadiction of d c m being negative by (54). Subcase 3: If λ c 1 > 0 = d c m = 1 (see (18)). Theefoe, case 4 is admissible when d c m = 1; p o = p c = 0 (57) 6.2 Poof of the Welfae Gain of the Recipients Assume the intechangeability of the limit signs fo U : lim U (u γ o,ˆγ o desied eceived, u Type 1 eos, u Type 2 eos) (58) = U ( lim lim γ o,ˆγ o u desied eceived, γ o,ˆγ o u Type 1 eos, γ o,ˆγ o u Type 2 eos) lim (59) 24

25 whee (use as a supescipt to denote the best esponses of the sendes when γ o, ˆγ o ): lim γ o,ˆγ o u desied eceived = (1 ɛ) κc ˆn c, ˆγ c + φc tκ c b(d c, )n c, (60) d c, γ c lim γ o,ˆγ o u Type 1 eos = ɛ κc ˆn c, ˆγ c + (1 φc t)κ c b(d c, )n c, (61) d c, γ c lim γ o,ˆγ o u Type 2 eos (62) = (1 ɛ)κ c ˆn c, (1 1ˆγ ) + c φc tκ c b(d c, )n c, (1 1 d c, γ ) (63) c Since U lim γ o,ˆγ o U 0 if (a) u desied eceived lim γ o,ˆγ o u desied eceived,(b) u Type 1 eos lim γ o,ˆγ o u Type 1 eos, and (c) u Type 2 eos lim γ o,ˆγ o u Type 2 eos, we ae going to pove each of these inequalitities in thee pats. (i) Inequality (a) is u desied eceived lim γ o,ˆγ o u desied eceived, o equivalently: j {o,c} (1 ɛ)κ j (1 ɛ) κc ˆn c, ˆγ c ˆn j ˆγ + j j {o,c} φ j tκ j b(d j )n j d j γ j + φc tκ c b(d c, )n c, (64) d c, γ c As in Poposition 1, if we assume that thee is no uncensoed-content mail in the open channel (implying (1 ɛ)κ o ˆn o = 0), then it implies that ˆγ o the sendes of such mail aleady find it pofit maximizing by sending only to the censoed channel. Since the maginal cost function has not changed, as long as the maginal evenue of sending uncensoed-content mail to the censoed channel does not change with o without the open channel, such sendes will not change the values of decision vaiables chosen even when the open channel disappeas because the fist ode condition of equations of equating maginal evenue and maginal cost do not change. This implies that (1 ɛ)κ c ˆn c = (1 ɛ) κc ˆγ c ˆnc,. Then it is ˆγ c equivalent to poving that: φ c tκ o n o γ o φc tκ c b(d c, )n c, (65) d c, γ c 25

26 The above is tue fo φ o t = 0 because both sides ae zeo. Fo φ o t = 1, because κ o = κ c = 1 by Poposition 1 and γs o = 1, it is sufficient to pove that n o n c, whee is a high type ecipient because: n o b(dc, )n c, (66) d c, γ c n o n c, because d c, γ c 1 and b(d c, ) 1 (67) To pove that n o n c,. Let s fist look at the censoed-content massmail sende s poblem. Fo n o m, the maginal evenue is p o and the maginal cost is cm = δn c m + n o m. Fo n c, m, the maginal evenue is p c d c, n o m and the maginal cost is n c, m γ c m (set δ = 0 in cm = δn o n c m + n c m). m Pofit maximization implies that each censoed-content mass-mail sende equates maginal evenue with maginal cost: and p o = δn c m + n o m (68) p c d c, m γ = c nc, m (69) Since we have aleady assumed that p o p c and d c, γ c 1, we have p o pc d c, γ c (70) Substitute the value of the above inequalities fom the two pofit maximization conditions above, we have: δn c m + n o m n c, m (71) n o m n c, m because δ < 0 = (72) ctt o n o m ctt c n c, m if ctt o ctt c 0 = (73) n o n c, (74) The last inequality holds because of the following. We aleady assumed that the volume of censoed-content tageted-mail is negligible 20. Then we could intepet the constants ctt o and ctt c as the ecipocals of the 20 Altenatively, by popely defining the costs function of the censoed-content tageted-mail sendes, we could assume a weake condition that the atio of the volume of mail sent by censoed-content tageted- ove mass-mail sendes in the open channel is geate o equal to the coesponding atio in the censoed channel. 26

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

NET Institute* www.netinst.org

NET Institute* www.netinst.org NET Institute* www.netinst.og Woking Pape #06-20 Octobe 2006 Using Uncensoed Counication Channels to Divet Spa Taffic Benjain Chiao and Jeffey MacKie-Mason Univesity of Michigan * The Netwoks, Electonic

More information

Controlling the Money Supply: Bond Purchases in the Open Market

Controlling the Money Supply: Bond Purchases in the Open Market Money Supply By the Bank of Canada and Inteest Rate Detemination Open Opeations and Monetay Tansmission Mechanism The Cental Bank conducts monetay policy Bank of Canada is Canada's cental bank supevises

More information

Questions for Review. By buying bonds This period you save s, next period you get s(1+r)

Questions for Review. By buying bonds This period you save s, next period you get s(1+r) MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

CHAPTER 10 Aggregate Demand I

CHAPTER 10 Aggregate Demand I CHAPTR 10 Aggegate Demand I Questions fo Review 1. The Keynesian coss tells us that fiscal policy has a multiplied effect on income. The eason is that accoding to the consumption function, highe income

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Personal Saving Rate (S Households /Y) SAVING AND INVESTMENT. Federal Surplus or Deficit (-) Total Private Saving Rate (S Private /Y) 12/18/2009

Personal Saving Rate (S Households /Y) SAVING AND INVESTMENT. Federal Surplus or Deficit (-) Total Private Saving Rate (S Private /Y) 12/18/2009 1 Pesonal Saving Rate (S Households /Y) 2 SAVING AND INVESTMENT 16.0 14.0 12.0 10.0 80 8.0 6.0 4.0 2.0 0.0-2.0-4.0 1959 1961 1967 1969 1975 1977 1983 1985 1991 1993 1999 2001 2007 2009 Pivate Saving Rate

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Patent renewals and R&D incentives

Patent renewals and R&D incentives RAND Jounal of Economics Vol. 30, No., Summe 999 pp. 97 3 Patent enewals and R&D incentives Fancesca Conelli* and Mak Schankeman** In a model with moal hazad and asymmetic infomation, we show that it can

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Definitions and terminology

Definitions and terminology I love the Case & Fai textbook but it is out of date with how monetay policy woks today. Please use this handout to supplement the chapte on monetay policy. The textbook assumes that the Fedeal Reseve

More information

Problem Set # 9 Solutions

Problem Set # 9 Solutions Poblem Set # 9 Solutions Chapte 12 #2 a. The invention of the new high-speed chip inceases investment demand, which shifts the cuve out. That is, at evey inteest ate, fims want to invest moe. The incease

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Improving Network Security Via Cyber-Insurance A Market Analysis

Improving Network Security Via Cyber-Insurance A Market Analysis 1 Impoving Netwok Secuity Via Cybe-Insuance A Maket Analysis RANJAN PAL, LEANA GOLUBCHIK, KONSTANTINOS PSOUNIS Univesity of Southen Califonia PAN HUI Hong Kong Univesity of Science and Technology Recent

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Supply chain information sharing in a macro prediction market

Supply chain information sharing in a macro prediction market Decision Suppot Systems 42 (2006) 944 958 www.elsevie.com/locate/dss Supply chain infomation shaing in a maco pediction maket Zhiling Guo a,, Fang Fang b, Andew B. Whinston c a Depatment of Infomation

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Ignorance is not bliss when it comes to knowing credit score

Ignorance is not bliss when it comes to knowing credit score NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

CONCEPT OF TIME AND VALUE OFMONEY. Simple and Compound interest

CONCEPT OF TIME AND VALUE OFMONEY. Simple and Compound interest CONCEPT OF TIME AND VALUE OFMONEY Simple and Compound inteest What is the futue value of shs 10,000 invested today to ean an inteest of 12% pe annum inteest payable fo 10 yeas and is compounded; a. Annually

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

GESTÃO FINANCEIRA II PROBLEM SET 1 - SOLUTIONS

GESTÃO FINANCEIRA II PROBLEM SET 1 - SOLUTIONS GESTÃO FINANCEIRA II PROBLEM SET 1 - SOLUTIONS (FROM BERK AND DEMARZO S CORPORATE FINANCE ) LICENCIATURA UNDERGRADUATE COURSE 1 ST SEMESTER 2010-2011 Chapte 1 The Copoation 1-13. What is the diffeence

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Define What Type of Trader Are you?

Define What Type of Trader Are you? Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Seshadri constants and surfaces of minimal degree

Seshadri constants and surfaces of minimal degree Seshadi constants and sufaces of minimal degee Wioletta Syzdek and Tomasz Szembeg Septembe 29, 2007 Abstact In [] we showed that if the multiple point Seshadi constants of an ample line bundle on a smooth

More information

Equity compensation plans New Income Statement impact on guidance Earnings Per Share Questions and answers

Equity compensation plans New Income Statement impact on guidance Earnings Per Share Questions and answers Investos/Analysts Confeence: Accounting Wokshop Agenda Equity compensation plans New Income Statement impact on guidance Eanings Pe Shae Questions and answes IAC03 / a / 1 1 Equity compensation plans The

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Chapter 11: Aggregate Demand II, Applying the IS-LM Model Th LM t

Chapter 11: Aggregate Demand II, Applying the IS-LM Model Th LM t Equilibium in the - model The cuve epesents equilibium in the goods maket. Chapte :, Applying the - Model Th t C ( T) I( ) G The cuve epesents money maket equilibium. M L(, ) The intesection detemines

More information

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques Loyalty Rewads and Gift Cad Pogams: Basic Actuaial Estimation Techniques Tim A. Gault, ACAS, MAAA, Len Llaguno, FCAS, MAAA and Matin Ménad, FCAS, MAAA Abstact In this pape we establish an actuaial famewok

More information

Open Economies. Chapter 32. A Macroeconomic Theory of the Open Economy. Basic Assumptions of a Macroeconomic Model of an Open Economy

Open Economies. Chapter 32. A Macroeconomic Theory of the Open Economy. Basic Assumptions of a Macroeconomic Model of an Open Economy Chapte 32. A Macoeconomic Theoy of the Open Economy Open Economies An open economy is one that inteacts feely with othe economies aound the wold. slide 0 slide 1 Key Macoeconomic Vaiables in an Open Economy

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

Research and the Approval Process

Research and the Approval Process Reseach and the Appoval Pocess Emeic Heny y Maco Ottaviani z Febuay 2014 Abstact An agent sequentially collects infomation to obtain a pincipal s appoval, such as a phamaceutical company seeking FDA appoval

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

The Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing?

The Predictive Power of Dividend Yields for Stock Returns: Risk Pricing or Mispricing? The Pedictive Powe of Dividend Yields fo Stock Retuns: Risk Picing o Mispicing? Glenn Boyle Depatment of Economics and Finance Univesity of Cantebuy Yanhui Li Depatment of Economics and Finance Univesity

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

AFFILIATE MEMBERSHIP APPLICATION

AFFILIATE MEMBERSHIP APPLICATION Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

The future challenges of Healthcare

The future challenges of Healthcare The futue challenges of Healthcae D. Eich Hunzike CFO F. Hoffmann La Roche Ltd. JPMogan Healthcae Confeence San Fancisco, Januay 12, 2005 This pesentation contains cetain fowad-looking statements. These

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

Confirmation of Booking

Confirmation of Booking The Pesentes Rebecca Mogan Rebecca is a Taxation Consultant with the NTAA and has ove 15 yeas tax expeience. Rebecca holds a Bachelo of Ats and Law and a Mastes of Taxation. Rebecca has pesented a numbe

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Intertemporal Macroeconomics

Intertemporal Macroeconomics Intetempoal Macoeconomics Genot Doppelhofe* May 2009 Fothcoming in J. McCombie and N. Allington (eds.), Cambidge Essays in Applied Economics, Cambidge UP This chapte eviews models of intetempoal choice

More information

NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING?

NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING? NBER WORKING PAPER SERIES FISCAL ZONING AND SALES TAXES: DO HIGHER SALES TAXES LEAD TO MORE RETAILING AND LESS MANUFACTURING? Daia Bunes David Neumak Michelle J. White Woking Pape 16932 http://www.nbe.og/papes/w16932

More information

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

More information

Public Health and Transportation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Work Plan August 2, 2012

Public Health and Transportation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Work Plan August 2, 2012 Public Health and Tanspotation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Wok Plan 2, 2012 Vision We envision Maine as a place whee people of all ages and abilities can move about in ways

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

SELF-INDUCTANCE AND INDUCTORS

SELF-INDUCTANCE AND INDUCTORS MISN-0-144 SELF-INDUCTANCE AND INDUCTORS SELF-INDUCTANCE AND INDUCTORS by Pete Signell Michigan State Univesity 1. Intoduction.............................................. 1 A 2. Self-Inductance L.........................................

More information

Exam #1 Review Answers

Exam #1 Review Answers xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%

More information

Referral service and customer incentive in online retail supply Chain

Referral service and customer incentive in online retail supply Chain Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics

More information

9.5 Amortization. Objectives

9.5 Amortization. Objectives 9.5 Aotization Objectives 1. Calculate the payent to pay off an aotized loan. 2. Constuct an aotization schedule. 3. Find the pesent value of an annuity. 4. Calculate the unpaid balance on a loan. Congatulations!

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Experimentation under Uninsurable Idiosyncratic Risk: An Application to Entrepreneurial Survival

Experimentation under Uninsurable Idiosyncratic Risk: An Application to Entrepreneurial Survival Expeimentation unde Uninsuable Idiosyncatic Risk: An Application to Entepeneuial Suvival Jianjun Miao and Neng Wang May 28, 2007 Abstact We popose an analytically tactable continuous-time model of expeimentation

More information

Left- and Right-Brain Preferences Profile

Left- and Right-Brain Preferences Profile Left- and Right-Bain Pefeences Pofile God gave man a total bain, and He expects us to pesent both sides of ou bains back to Him so that He can use them unde the diection of His Holy Spiit as He so desies

More information

Epdf Sulf petroleum, Eflecti and Eeflecti

Epdf Sulf petroleum, Eflecti and Eeflecti ANALYSIS OF GLOBAL WARMING MITIGATION BY WHITE REFLECTING SURFACES Fedeico Rossi, Andea Nicolini Univesity of Peugia, CIRIAF Via G.Duanti 67 0615 Peugia, Italy T: +9-075-585846; F: +9-075-5848470; E: fossi@unipg.it

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

College Enrollment, Dropouts and Option Value of Education

College Enrollment, Dropouts and Option Value of Education College Enollment, Dopouts and Option Value of Education Ozdagli, Ali Tachte, Nicholas y Febuay 5, 2008 Abstact Psychic costs ae the most impotant component of the papes that ae tying to match empiical

More information

Article Two pricing mechanisms in sponsored search advertising

Article Two pricing mechanisms in sponsored search advertising econsto www.econsto.eu De Open-Access-Publikationsseve de ZBW Leibniz-Infomationszentum Witschaft The Open Access Publication Seve of the ZBW Leibniz Infomation Cente fo Economics Yang, Wei; Feng, Youyi;

More information

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information