منابع مشابه
Lex-Optimal Multiclass Scheduling with Deadlines
A new optimality criterion and associated scheduling and dropping algorithm are presented for multiclass packets with deadlines. Equal length packets with deadlines and priority labels are either scheduled by their deadlines or dropped on or possibly before their deadlines. An L-bit priority label is used to handle up to 2 priority classes. A scheduling policy is called lex-optimal within the c...
متن کاملOptimal dynamic mechanism design with deadlines
A dynamic mechanism design problem with multi-dimensional private information is studied. There is one object and two buyers who arrive in two different periods. In addition to his privately known valuation, the first buyer also has a privately known deadline for purchasing the object. The seller wants to maximize revenue. Depending on the type distribution, the incentive compatibility constrai...
متن کاملForbearance in optimal multilateral trade agreements∗
I present a theory of optimal multilateral trade agreements with public political shocks. I show that “forbearance” where one country withholds retaliation when its trading partner receives a shock is a feature of an optimal agreement. This provides a rationale for countries not acting on retaliatory rights granted under GATT. I show that there is a limit to forbearance allowable in a self-enfo...
متن کاملAsymmetry, optimal transfers and international environmental agreements
Science in 2008 to advance public and private action on climate change through innovative, rigorous research. The Centre is funded by the UK Economic and Social Research Council and has five inter-linked research programmes: 1. Developing climate science and economics 2. Climate change governance for a new global deal 3. Adaptation to climate change and human development 4. Governments, markets...
متن کاملThree-party authenticated key agreements for optimal communication
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Economics
سال: 2012
ISSN: 1933-6837
DOI: 10.3982/te847