Nash Bargaining Via Flexible Budget Markets

submitted by: dougramsey
In his seminal 1950 paper, John NashIn his seminal 1950 paper, John Nash defined the bargaining game; the ensuing theory of bargaining lies at the heart of game theory. In this work, we initiate an algorithmic study of Nash bargaining games. For a certain class of Nash bargaining games, we show that they can be transformed into a market (in a new variant of a traditional market model from mathematical economics). We then extend techniques developed in theoretical computer science over the...

Dynamic Mechanism Design

submitted by: dougramsey
I will consider the design of efficient and profit-maximizing Bayesian incentive-compatible mechanisms for general dynamic environments with private information. In the environment, agents observe a sequence of private signals over a number of periods. In each period, the agents report their private signals and choose public (contractible) and private actions based on the reports. The probability distribution over future signals may depend on both past signals and past decisions. The general...

The Algorithmic Lens: How the Computational Perspective is Transforming the Sciences

submitted by: dougramsey
Presentation by Christos Papadimitriou, Electrical Engineering and Computer Sciences Department, UC Berkeley, CA. Computational research transforms the sciences (physical, mathematical, life or social) not just by empowering them analytically, but mainly by providing a novel and powerful perspective which often leads to unforeseen insights. Examples abound: quantum computation provides the right forum for questioning and testing some of the most basic tenets of quantum physics, while...

Strategic Network Formation with Structural Holes

submitted by: dougramsey
Presented by Siddharth Suri, Yahoo! Research Scientist. A fundamental principle in social network research is that individuals can benefit from serving as intermediaries between others who are not directly connected. Through such intermediation, they potentially can broker the flow of information and synthesize ideas arising in different parts of the network. These principles form the underpinning for the theory of structural holes, which studies the ways in which individuals, particularly...

The Human Oral Microbiome by Floyd Dewhirst, Harvard University

submitted by: dougramsey
The human oral cavity is a diverse habitat that contains approximately bacterial 600 predominant species. The oral microbiome is comprised of 44% named species, 12% isolates representing unnamed species, and 44% phylotypes known only from 16S rRNA based cloning studies. Species from 11 phyla have been identified: Firmicutes (211), Bacteroidetes (106), Proteobacteria (99), Actinobacteria (64), Spirochaetes (49), Fusobacteria (29), TM7 (12), Synergistetes (10), Chlamydiae (1), Chloroflexi (1)...

FDNY Certified Flame Proofing Company NYC

submitted by: flameproofingny

CERTIFIED FLAMEPROOFING is a FDNY Certified Flameproofing Company for Flameproof Materials! Get rid of all Flameproof violation worries with Certified Flameproofing Services today!