منابع مشابه
Expert Advice for Multiple Audiences with Conflicting Interests
This paper examines a simple (repeated) cheap talk game between a single expert and two audiences with conflicting interests. The expert, who is informed about a payoff relevant parameter, sends an unverifiable message to the receivers. Conditional on the message they observe, the receivers simultaneously choose their actions, which collectively determine the payoffs of all three. The paper ans...
متن کاملWhen mandatory disclosure hurts: Expert advice and conflicting interests
We study the quality of advice that an informed and biased expert gives to an uninformed decision maker. We compare two scenarios: mandatory disclosure of the bias and non-disclosure, where information about the bias can only be revealed through cheap-talk. We find that in many scenarios non-disclosure allows for higher welfare for both parties. Hiding the bias allows for more precise communica...
متن کاملPlacebo Controlled Trials: Interests of Subjects versus Interests of Drug Regulators.
The use of placebo-controlled trials in situations where established therapies are available is considered ethically problematic since the patients randomised to the placebo group are deprived of the beneficial treatment. The pharmaceutical industry and drug regulators seem to argue that placebo-controlled trials with extensive precautions and control measures in place should still be allowed s...
متن کاملGPU Taint Tracking
Dynamic tainting tracks the influence of certain inputs (taint sources) through execution and it is a powerful tool for information flow analysis and security. Taint tracking has primarily targeted CPU program executions. Motivated by recent recognition of information leaking in GPU memory and GPU-resident malware, this paper presents the first design and prototype implementation of a taint tra...
متن کاملAnomalous Taint Detection
Software security has become an increasing necessity for guaranteeing, as much as possible, the correctness of computer systems. A number of techniques have been developed over the past two decades to mitigate software vulnerabilities. Learning-based anomaly detection techniques have been pursued for many years due to their ability to detect a broad range of attacks, including novel attacks. Mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2005
ISSN: 0028-0836,1476-4687
DOI: 10.1038/4371070a