A Domain Theory for Task Oriented Negotiation
|
|
|
- Shanon Douglas
- 9 years ago
- Views:
Transcription
1 Distributed Information Processing Course EPFL A Domain Theory for Task Oriented Negotiation Gilad Zlotkin & Jeffrey S.Rosenschein (1993) Computer Science Department Hebrew University, Jerusalem, Israel Presented by LUU Vinh-Toan
2 Goals of Paper Present a general theory that captures the relationship between certain domains and negotiation mechanisms Categorize precisely the kinds of domain in which agents can find themselves Use category to choose appropriate negotiation 2
3 Task Oriented Domains (TOD) Describes a certain class of scenarios for multi-agent encounters. TOD is a Tuple <T, A, c> T: (finite) set of all possible tasks A = (A1, A2,.., An), an ordered list of Agent c: c(x) is the cost of executing all the tasks in X (subset of T) by single Agent. C (ø) = 0 An Encounter is set of tasks <T 1, T 2,, T n > such that T k is a set of tasks from T that A k needs to achieve 3
4 Examples(1) Postmen domain 1 2 Task Set: Set of all addresses in the graph Cost Function (of subset X): Length of minimal path from post office, visits all members of X, ends at the Post office Ex: C(X 1 ) = 5, C(X 2 ) =
5 Examples(2) Database Queries Agents have to access to a common DB and each has to carry out a set of queries Agents can exchange results of queries and sub-queries The Fax Domain Agents are sending faxes to locations on a telephone network. Multiple faxes can be sent one the connection is established with receiving node The Agents can exchange message to be faxed 1 1,2 1,2 2 5
6 Attributes(1)- Subadditivity c(x U Y) c(x) + c(y) By combining sets of task, we may reduce (no increase) the total cost, as compared with the cost of achieving the sets alone. 6
7 Attributes(2)- Concavity c(y U Z) c(y) c(x U Z) c(x) The cost of tasks Z adds to set of tasks Y cannot be greater than the cost Z add to a subset of Y The general Postmen domain is not Concave (unless restricted to trees) Example: Z adds 0 to X but adds 2 to its superset Y (all blue nodes) Concavity implies sub-additivity 7
8 Attributes(3)- Modularity c(x U Y) = c(x) + c(y) c(x Y) The cost of the combination of 2 sets of tasks is exactly the sum of their individual costs minus the cost of their intersection Only Fax Domain is modular Modularity implies concavity 8
9 Mechanisms for Subadditive TOD s An encounter (T 1, T 2 ) within a 2 agent. We have: Pure Deal (D 1,D 2 ): redistribution of tasks among 2 agents D 1 U D 2 = T 1 U T 2, A k execute D k Mixed Deal (D 1,D 2 ):p Pure Deal (D 1,D 2 ) and probability p. With p, A 1 executes D 1, A 2 executes D 2. With 1- p, A 1 executes D 2, A 2 executes D 1 Cost k ((D 1,D 2 ):p) = p*c(d k )+(1-p)*c(D 3-k ) All-or-Nothing Deal (T 1 UT 2, 0):p A 1 has a p chance of executing all the tasks T 1 U T 2 and has 1-p chance of doing nothing. 9
10 Deal and Utility in 2 Agents TOD Deal δ is a pair (D 1,D 2 ) Deal Θ Ξ(T 1,T 2 ) is called the conflict deal Utility i (δ)= Cost(T i )-Cost(D i ) A deal δ is called individual rational if δ Θ A deal δ is called pareto optimal if there does not exist another deal δ such that δ > δ Set of all deals that are individual rational and pareto optimal is called the Negotiation Set (NS). 10
11 Incentive Compatible Mechanisms Agents do not have full information about one another s goals=> Agents can benefit from concealing goals, or manufacturing artificial goals. 3 types of lies: Hiding tasks Phantom tasks Decoy tasks A negotiation mechanism is called Incentive compatible when the strategy of telling the truth is in equilibrium 11
12 3-dimensional table of Characterization of Relationship L T T/P Implied relationship between cells Implied relationship with same domain attribute. means lying may be beneficial means telling the truth is always beneficial refers to lies which are not beneficial because they may always be discovers 12
13 Incentive Compatible Fixed Points (FP) FP1: in Subadditive TOD, any optimal negotiation mechanism (ONM) over A-or-N deals, every hiding lie is not beneficial Ex:A 1 hides letter to c, his utility doesn t increase. FP2: in Subadditive TOD, any ONM over Mixed deals, every phantom lie has a positive probability of being discovered. FP3: in Concave TOD, any ONM over Mixed deals, every decoy lie is not beneficial. FP4: in Modular TOD, any ONM over Pure deals, every decoy lie is not beneficial. c 1 a b 2 1,2 13
14 Non-incentive Compatible Fixed Points Post Office FP5: in Concave TOD, any ONM over Pure deals, every Phantom lie is beneficial. Ex1:A 1 creates Phantom letter at node c, his utility has risen from 3 to 4 2 a (A1, A2) 1 b (A1, A2) 3 FP6: in Subadditive TOD, any ONM over A- or- N deals, every Decoy lie is beneficial. Ex2:A 1 lies with decoy letter to h, his utility has risen from 1.5 to 1.72 (A1) (A1) (A1) g f e h d (A1) b c (A2) (A2) c (A1) 14
15 Non-incentive Compatible Fixed Points FP7: a in Modular TOD, any ONM over Pure deals, every Hide lie is beneficial. f Ex3: A 1 hides his letter node b =>Max Utility is that sends A 1 to node b! 2 1 e d b c (A1,A2) FP8: in Modular TOD, any ONM over Mixed deals, every Hide lie is beneficial. Ex4: A 1 hideshis letter to node a A 1 s Utility is 4.5 > 4 (Utility of telling the truth) (A1,A2) (A1) f e (A1,A2) a b c (A2) (A1,A2) d (A1,A2) (A1,A2) 15
16 Conclusion In order to use Negotiation Protocols, it is necessary to know when protocols are appropriate TOD s cover an important set of Multiagent interaction 16
A Domain Theory for Task Oriented Negotiation 4
A Domain Theory for Task Oriented Negotiation 4 Gilad Zlotkin Jeffrey S. Rosenschein Computer Science Department Hebrew University Givat Ram, Jerusalem, Israel Abstract We present a general theory that
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
The sample space for a pair of die rolls is the set. The sample space for a random number between 0 and 1 is the interval [0, 1].
Probability Theory Probability Spaces and Events Consider a random experiment with several possible outcomes. For example, we might roll a pair of dice, flip a coin three times, or choose a random real
Investigación Operativa. The uniform rule in the division problem
Boletín de Estadística e Investigación Operativa Vol. 27, No. 2, Junio 2011, pp. 102-112 Investigación Operativa The uniform rule in the division problem Gustavo Bergantiños Cid Dept. de Estadística e
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
SQL Tables, Keys, Views, Indexes
CS145 Lecture Notes #8 SQL Tables, Keys, Views, Indexes Creating & Dropping Tables Basic syntax: CREATE TABLE ( DROP TABLE ;,,..., ); Types available: INT or INTEGER REAL or FLOAT CHAR( ), VARCHAR( ) DATE,
Alok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
Lecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
A Non-Linear Schema Theorem for Genetic Algorithms
A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland
Decision Making under Uncertainty
6.825 Techniques in Artificial Intelligence Decision Making under Uncertainty How to make one decision in the face of uncertainty Lecture 19 1 In the next two lectures, we ll look at the question of how
Hurley, Chapter 7 (see also review in chapter 3)
Hurley, Chapter 7 (see also review in chapter 3) Chris Auld Economics 318 February 20, 2014 Why is health care different? Is health care different from other commodities? Yes, but not because it s really
Persuasion by Cheap Talk - Online Appendix
Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Omega Automata: Minimization and Learning 1
Omega Automata: Minimization and Learning 1 Oded Maler CNRS - VERIMAG Grenoble, France 2007 1 Joint work with A. Pnueli, late 80s Summary Machine learning in general and of formal languages in particular
Game Theory 1. Introduction
Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each
Functions. MATH 160, Precalculus. J. Robert Buchanan. Fall 2011. Department of Mathematics. J. Robert Buchanan Functions
Functions MATH 160, Precalculus J. Robert Buchanan Department of Mathematics Fall 2011 Objectives In this lesson we will learn to: determine whether relations between variables are functions, use function
Homework # 3 Solutions
Homework # 3 Solutions February, 200 Solution (2.3.5). Noting that and ( + 3 x) x 8 = + 3 x) by Equation (2.3.) x 8 x 8 = + 3 8 by Equations (2.3.7) and (2.3.0) =3 x 8 6x2 + x 3 ) = 2 + 6x 2 + x 3 x 8
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Extending Data Processing Capabilities of Relational Database Management Systems.
Extending Data Processing Capabilities of Relational Database Management Systems. Igor Wojnicki University of Missouri St. Louis Department of Mathematics and Computer Science 8001 Natural Bridge Road
Class Notes, Econ 8801 Lump Sum Taxes are Awesome
Class Notes, Econ 8801 Lump Sum Taxes are Awesome Larry E. Jones 1 Exchange Economies with Taxes and Spending 1.1 Basics 1) Assume that there are n goods which can be consumed in any non-negative amounts;
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
No-Betting Pareto Dominance
No-Betting Pareto Dominance Itzhak Gilboa, Larry Samuelson and David Schmeidler HEC Paris/Tel Aviv Yale Interdisciplinary Center Herzlyia/Tel Aviv/Ohio State May, 2014 I. Introduction I.1 Trade Suppose
1 VECTOR SPACES AND SUBSPACES
1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such
Choice under Uncertainty
Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory
1. INTRODUCTION TO RDBMS
Oracle For Beginners Page: 1 1. INTRODUCTION TO RDBMS What is DBMS? Data Models Relational database management system (RDBMS) Relational Algebra Structured query language (SQL) What Is DBMS? Data is one
The Max-Distance Network Creation Game on General Host Graphs
The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.
Business Analytics using Data Mining Project Report. Optimizing Operation Room Utilization by Predicting Surgery Duration
Business Analytics using Data Mining Project Report Optimizing Operation Room Utilization by Predicting Surgery Duration Project Team 4 102034606 WU, CHOU-CHUN 103078508 CHEN, LI-CHAN 102077503 LI, DAI-SIN
Iterated Dynamic Belief Revision. Sonja Smets, University of Groningen. website: http://www.vub.ac.be/clwf/ss
LSE-Groningen Workshop I 1 Iterated Dynamic Belief Revision Sonja Smets, University of Groningen website: http://www.vub.ac.be/clwf/ss Joint work with Alexandru Baltag, COMLAB, Oxford University LSE-Groningen
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
Relational Algebra. Basic Operations Algebra of Bags
Relational Algebra Basic Operations Algebra of Bags 1 What is an Algebra Mathematical system consisting of: Operands --- variables or values from which new values can be constructed. Operators --- symbols
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
each college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
Relational Databases
Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 18 Relational data model Domain domain: predefined set of atomic values: integers, strings,... every attribute
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
Y. Xiang, Constraint Satisfaction Problems
Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are
Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers
Domain Name Servers COMP76 Networked Computer Systems Internet Names Hierarchical starting from the right host.subnet.organization.type Names are case insensitive and can be in either upper or lower case.
Institute for Empirical Research in Economics University of Zurich. Working Paper Series ISSN 1424-0459. Working Paper No. 229
Institute for Empirical Research in Economics University of Zurich Working Paper Series ISSN 1424-0459 Working Paper No. 229 On the Notion of the First Best in Standard Hidden Action Problems Christian
A Framework for Highly Available Services Based on Group Communication
A Framework for Highly Available Services Based on Group Communication Alan Fekete [email protected] http://www.cs.usyd.edu.au/ fekete Department of Computer Science F09 University of Sydney 2006,
Graph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis [email protected] http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses
Chapter ML:IV IV. Statistical Learning Probability Basics Bayes Classification Maximum a-posteriori Hypotheses ML:IV-1 Statistical Learning STEIN 2005-2015 Area Overview Mathematics Statistics...... Stochastics
Introductory Probability. MATH 107: Finite Mathematics University of Louisville. March 5, 2014
Introductory Probability MATH 07: Finite Mathematics University of Louisville March 5, 204 What is probability? Counting and probability 2 / 3 Probability in our daily lives We see chances, odds, and probabilities
II. BASICS OF PACKET FILTERING
Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer
Max Flow, Min Cut, and Matchings (Solution)
Max Flow, Min Cut, and Matchings (Solution) 1. The figure below shows a flow network on which an s-t flow is shown. The capacity of each edge appears as a label next to the edge, and the numbers in boxes
Probabilities. Probability of a event. From Random Variables to Events. From Random Variables to Events. Probability Theory I
Victor Adamchi Danny Sleator Great Theoretical Ideas In Computer Science Probability Theory I CS 5-25 Spring 200 Lecture Feb. 6, 200 Carnegie Mellon University We will consider chance experiments with
Demand and supply of health insurance. Folland et al Chapter 8
Demand and supply of health Folland et al Chapter 8 Chris Auld Economics 317 February 9, 2011 What is insurance? From an individual s perspective, insurance transfers wealth from good states of the world
SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
6.3 Conditional Probability and Independence
222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted
Second degree price discrimination
Bergals School of Economics Fall 1997/8 Tel Aviv University Second degree price discrimination Yossi Spiegel 1. Introduction Second degree price discrimination refers to cases where a firm does not have
Lecture 10: Regression Trees
Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,
CHAPTER 4: FINANCIAL ANALYSIS OVERVIEW
In the financial analysis examples in this book, you are generally given the all of the data you need to analyze the problem. In a real-life situation, you would need to frame the question, determine the
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
Least-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
Galois Theory III. 3.1. Splitting fields.
Galois Theory III. 3.1. Splitting fields. We know how to construct a field extension L of a given field K where a given irreducible polynomial P (X) K[X] has a root. We need a field extension of K where
2. Information Economics
2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
PRE-CALCULUS GRADE 12
PRE-CALCULUS GRADE 12 [C] Communication Trigonometry General Outcome: Develop trigonometric reasoning. A1. Demonstrate an understanding of angles in standard position, expressed in degrees and radians.
parent ROADMAP MATHEMATICS SUPPORTING YOUR CHILD IN HIGH SCHOOL
parent ROADMAP MATHEMATICS SUPPORTING YOUR CHILD IN HIGH SCHOOL HS America s schools are working to provide higher quality instruction than ever before. The way we taught students in the past simply does
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Data Grids. Lidan Wang April 5, 2007
Data Grids Lidan Wang April 5, 2007 Outline Data-intensive applications Challenges in data access, integration and management in Grid setting Grid services for these data-intensive application Architectural
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
Mathematics Review for MS Finance Students
Mathematics Review for MS Finance Students Anthony M. Marino Department of Finance and Business Economics Marshall School of Business Lecture 1: Introductory Material Sets The Real Number System Functions,
PHYSICS 151 Notes for Online Lecture #6
PHYSICS 151 Notes for Online Lecture #6 Vectors - A vector is basically an arrow. The length of the arrow represents the magnitude (value) and the arrow points in the direction. Many different quantities
Types of Degrees in Bipolar Fuzzy Graphs
pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department
Negotiating over Small Bundles of Resources
Negotiating over Small Bundles of Resources Yann Chevaleyre 1, Ulle Endriss 2, Jérôme Lang 3 and Nicolas Maudet 1 1 LAMSADE, Université Paris-Daupine (France) 2 Department of Computing, Imperial College
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Statistical Models in Data Mining
Statistical Models in Data Mining Sargur N. Srihari University at Buffalo The State University of New York Department of Computer Science and Engineering Department of Biostatistics 1 Srihari Flood of
Test Management Tool for Risk-based Security Testing
Test Management Tool for Risk-based Security Testing Michael Berger (Fraunhofer FOKUS) [email protected] Outline Introduction to traceability Test Management Tool requirement and concept
x a x 2 (1 + x 2 ) n.
Limits and continuity Suppose that we have a function f : R R. Let a R. We say that f(x) tends to the limit l as x tends to a; lim f(x) = l ; x a if, given any real number ɛ > 0, there exists a real number
1 Nonzero sum games and Nash equilibria
princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic
TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query)
TechTips Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) A step-by-step guide to connecting Xcelsius Enterprise XE dashboards to company databases using
5544 = 2 2772 = 2 2 1386 = 2 2 2 693. Now we have to find a divisor of 693. We can try 3, and 693 = 3 231,and we keep dividing by 3 to get: 1
MATH 13150: Freshman Seminar Unit 8 1. Prime numbers 1.1. Primes. A number bigger than 1 is called prime if its only divisors are 1 and itself. For example, 3 is prime because the only numbers dividing
Analysis of Cloud Solutions for Asset Management
ICT Innovations 2010 Web Proceedings ISSN 1857-7288 345 Analysis of Cloud Solutions for Asset Management Goran Kolevski, Marjan Gusev Institute of Informatics, Faculty of Natural Sciences and Mathematics,
Review of Fundamental Mathematics
Review of Fundamental Mathematics As explained in the Preface and in Chapter 1 of your textbook, managerial economics applies microeconomic theory to business decision making. The decision-making tools
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,
PLANNING (BUDGETING)
Accounting & Information Management System PLANNING (BUDGETING) Table of Contents AIMS/SAP Planning I. Periods/Versions/Profiles Fiscal Periods/Years... I-1 Plan Versions... I-1 Plan Profiles... I-2 II.
DPL. Portfolio Manual. Syncopation Software, Inc. www.syncopation.com
1 DPL Portfolio Manual Syncopation Software, Inc. www.syncopation.com Copyright 2009 Syncopation Software, Inc. All rights reserved. Printed in the United States of America. March 2009: First Edition.
Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
Chapter 6 The database Language SQL as a tutorial
Chapter 6 The database Language SQL as a tutorial About SQL SQL is a standard database language, adopted by many commercial systems. ANSI SQL, SQL-92 or SQL2, SQL99 or SQL3 extends SQL2 with objectrelational
Lecture 7: Concurrency control. Rasmus Pagh
Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction
Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
Cassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
The process of database development. Logical model: relational DBMS. Relation
The process of database development Reality (Universe of Discourse) Relational Databases and SQL Basic Concepts The 3rd normal form Structured Query Language (SQL) Conceptual model (e.g. Entity-Relationship
Building Data Cubes and Mining Them. Jelena Jovanovic Email: [email protected]
Building Data Cubes and Mining Them Jelena Jovanovic Email: [email protected] KDD Process KDD is an overall process of discovering useful knowledge from data. Data mining is a particular step in the
