• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 78
  • 19
  • 13
  • 6
  • 5
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 157
  • 157
  • 47
  • 25
  • 24
  • 24
  • 23
  • 15
  • 14
  • 13
  • 12
  • 12
  • 12
  • 12
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

予算配分メカニズムの設計に関する研究 / ヨサン ハイブン メカニズム ノ セッケイ ニカンスル ケンキュウ

渡邊, 章好, Watanabe, Fumiyoshi 29 February 2008 (has links)
博士(商学) / 乙第395号 / 63p / 一橋大学
132

Exploring the limits of incentive compatibility and allocative efficiency in complex economic environments

Reinhardt, Markus 29 April 2014 (has links)
In this dissertation auction formats are developed and discussed that focus on three specific economic environments. Regarding the impossibility results from mechanism design, the main task for the implementation of auction designs is to balance allocative efficiency and incentive compatibility – the main characteristics a mechanism should provide. Therefore, the dissertation investigates the limits of conceivable relaxations of allocative efficiency and incentive compatibility for complex settings such as double auctions, interdependent-valuation environments and electricity market designs. The overall aim is to carefully weigh up the advantages and disadvantages for either relaxing allocative efficiency or respectively incentive compatibility.:Preface … 7 1. Introduction … 8 1.1. Applications of auction design … 8 1.2. Optimal use of information in allocation processes … 12 1.3. Modeling non-cooperative situations … 14 1.4. Motivation for the dissertation … 16 2. An Incentive Compatible Double Auction for Multi-Unit Markets with Heterogeneous Goods … 21 2.1. Introduction into double auctions … 21 2.2. Setting of a multi-unit market with heterogeneous goods … 25 2.3. Concept of the Incentive Compatible Double Auction (ICDA) … 29 2.4. Definition of the allocation rule … 31 2.5. Creation of the price vector and the trading bundles … 37 2.6. Characteristics of the Incentive Compatible Double Auction (ICDA) … 40 2.7. Discussion of the properties of the Incentive Compatible Double Auction (ICDA) … 43 3. An Alternating-Price Auction for Interdependent-Valuation Environments … 46 3.1. Introduction into ex-post efficient auction design … 46 3.2. Setting of an interdependent-valuation environment … 50 3.3. Concept of the Alternating-Price Auction (APA) … 54 3.4. Characteristics of the Alternating-Price Auction (APA) 62 3.5. Discussion of the properties of the Alternating-Price Auction (APA) … 64 4. Facilitating Short-Term and Long-Term Efficiency with an Integrated Electricity Market Design … 66 4.1. Introduction into electricity market designs … 66 4.2. Setting of an electricity market … 72 4.3. Concept of the Integrated Electricity Market Design (IEMD) … 78 4.4. Characteristics of the Integrated Electricity Market Design (IEMD) … 88 4.5. Discussion of the properties of the Integrated Electricity Market Design (IEMD) … 91 5. Conclusion ... 94 Reference List … 96
133

Feasibility of Game Theory and Mechanism Design Techniques to Understand Game Balance

Prajwal Balasubramani (9192782) 03 August 2020 (has links)
Game balance has been a challenge for game developers since the time games have become more complex. There have been a handful of proposals for game balancing processes outside the manual labor-intensive play testing methods, which most game developers often are forced to use simply due to the lack of better methods. Simple solutions, like restrictive game play, are limited because of their inability to provide insight on interdependencies among the mechanisms in the game. Complex techniques framed around the potential of AI algorithms are limited by computational budgets or cognition inability to assess human actions. In order to find a middle ground we investigate Game Theory and Mechanism Design concepts. Both have proven to be effective tools to analyse strategic situations among interacting participants, or in this case `players'. We test the feasibility of using these techniques in an Real Time Strategy (RTS) game domain to understand game balance. MicroRTS, a small and simple execution of an RTS game is employed as our model. The results provide promising insight on the effectiveness of the method in detecting imbalances and further inspection to find the cause. An additional benefit out of this technique, besides detecting for game imbalances, the approach can be leveraged to create imbalances. This is useful when the designer or player desires to do so.
134

Central Bank Digital Currencies: Towards a Chinese Approach : Design Choices of Digital Currency Electronic Payment

Shi, Ye, Zhou, Shucheng January 2020 (has links)
Inspired by the digital revolution to the financial industry, the discussion around central bank digital currency also attract attention from academics and central banks. The People’s Bank of China (PBOC) is also researching on China’s CBDC: digital currency electronic payment (DCEP) and announced that DCEP would be issued as soon as possible.  However, the PBOC does not systematically disclose the information of DCEP. The characteristics and mechanism design are still obscured and need to be explored deeply. This thesis analysed the classification and mechanism design choices of DCEP from the perspective of two different demands: general demand and central bank demand. Based on pragmatism philosophy, we use a mixed-methods approach that is a combination of qualitative and quantitative research. Through the interview and surveys, we identified the demands from the PBOC and the general public in China and the characteristics of DCEP from official claims. Then generate the design choices via the money flower and the pyramid of CBDC models and compare the result with the demand. The analysis shows that the DCEP belongs to type B general-purpose CB digital tokens, and it would adopt a complex multi-layer hybrid architecture design, with the support from both DLT and conventional way. In conclusion, the current mechanism design choices can meet the demands from each side to a certain extent and reached a delicate balance under the trade-off between privacy and security issues. This thesis provides an insightful view on the classification and design choices of DCEP, fulfils the lack of systematic research relating to the demand and design choices of DCEP, and reveals the public’s insufficient knowledge in DCEP.
135

Toward Novel Remote-Center-of-Motion Manipulators and Wearable Hand-Grounded Kinesthetic Haptics for Robot-Assisted Surgery / 外科手術支援のためのロボットマニピュレータとハプティクスに関する研究

Sajid, Nisar 25 March 2019 (has links)
付記する学位プログラム名: デザイン学大学院連携プログラム / 京都大学 / 0048 / 新制・課程博士 / 博士(工学) / 甲第21759号 / 工博第4576号 / 新制||工||1713(附属図書館) / 京都大学大学院工学研究科機械理工学専攻 / (主査)教授 松野 文俊, 教授 椹木 哲夫, 教授 小森 雅晴 / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DFAM
136

Compliant robotic arms for inherently safe physical human-robot interaction

She, Yu January 2018 (has links)
No description available.
137

Extremal Mechanisms for Pointwise Maximal Leakage / Extremala Mekanismer för Pointwise Maximal Leakage

Grosse, Leonhard January 2023 (has links)
In order to implement privacy preservation for individuals, systems need to utilize privacy mechanisms that privatize sensitive data by randomization. The goal of privacy mechanism design is to find optimal tradeoffs between maximizing the utility of the privatized data while providing a strict sense of privacy defined by a chosen privacy measure. In this thesis, we explore this tradeoff for the pointwise maximal leakage measure. Pointwise maximal leakage (PML) was recently proposed as an operationally meaningful privacy measure that quantifies the guessing advantage of an adversary that is interested in a random function of the private data. Opposite to many other information-theoretic measures, PML considers the privacy loss for every outcome of the privatized view separately, thereby enabling more flexible privacy guarantees that move away from averaging over all outcomes. We start by using PML to analyze the prior distribution-dependent behavior of the established randomized response mechanism designed for local differential privacy. Then, we formulate a general optimization problem for the privacy-utility tradeoff with PML as a privacy measure and utility functions based on sub-linear functions. Using methods from convex optimization, we analyze the valid region of mechanisms satisfying a PML privacy guarantee and show that the optimization can be solved by a linear program. We arrive at extremal formulations that yield closed-form solutions for some important special cases: Binary mechanism, general high-privacy regions, i.e., regions in which the required level of privacy is high, and low-privacy mechanisms for equal priors. We further present an approximate solution for general priors in this setting. Finally, we analyze the loss of optimality of this construction for different prior distributions. / För att kunna implementera integritetsskydd för individer, så behöver system utnyttja integritetsmekanismer som privatiserar känslig data genom randomisering. Målet vid design av integritetsmekanismer är att hitta den optimala balansen mellan att användbarheten av privatiserad data maximeras, samtidigt som det tillhandahålls integritet i strikt mening. Detta definierat av något valt typ av integritetsmått. I den här avhandlingen, så undersöks detta utbyte specifikt med “pointwise maximal leakage”-måttet. Pointwise maximal leakage (PML) har nyligen föreslagits som ett operativt meningsfullt integritetsmått som kvantifierar en gissande motparts informationstillgång om denna är intresserad av en slumpmässig funktion av den privata datan. Till skillnad mot många andra informations-teoretiska mått, så tar PML i åtanke integritetsinskränkningen separat för varje utfall av den privata slumpmässiga variabeln. Därmed möjliggörs mer flexibla försäkringar av integriteten, som strävar bort från genomsnittet av alla utfall. Först, används PML för att analysera det ursprungsberoende beteendet av den etablerade “randomized response”-mekanismen designad för local differential privacy. Därefter formuleras ett generellt optimeringsproblem för integritets-användbarhets-kompromissen med PML som ett integritetsmått och användbarhetsfunktioner baserade på sublinjära funktioner. Genom att utnyttja metoder från konvex optimering, analyseras den giltiga regionen av mekanismer som tillfredsställer en PML-integritetsgaranti och det visas att optimeringen kan lösas av ett linjärt program. Det leder till extremala formuleringar som ger slutna lösningar för några viktiga specialfall: Binär mekanism, allmänna högintegritets-regioner (d.v.s. regioner där kravet på nivån av integritet är hög) och lågintegritets-mekanismer för ekvivalenta ursprungliga distributioner. Vidare presenteras en approximativ lösning för allmänna ursprungliga distributioner i denna miljö. Slutligen, analyseras förlusten av optimalitet hos denna konstruktion för olika ursprungliga distributioner.
138

Vision-based Manipulation In-the-Wild

Chi, Cheng January 2024 (has links)
Deploying robots in real-world environments involves immense engineering complexity, potentially surpassing the resources required for autonomous vehicles due to the increased dimensionality and task variety. To maximize the chances of successful real-world deployment, finding a simple solution that minimizes engineering complexity at every level, from hardware to algorithm to operations, is crucial. In this dissertation, we consider a vision-based manipulation system that can be deployed in-the-wild when trained to imitate sufficient quantity and diversity of human demonstration data on the desired task. At deployment time, the robot is driven by a single diffusion-based visuomotor policy, with raw RGB images as input and robot end-effector pose as output. Compared to existing policy representations, Diffusion Policy handles multimodal action distributions gracefully, being scalable to high-dimensional action spaces and exhibiting impressive training stability. These properties allow a single software system to be used for multiple tasks, with data collected by multiple demonstrators, deployed to multiple robot embodiments, and without significant hyper-parameter tuning. We developed a Universal Manipulation Interface (UMI), a portable, low-cost, and information-rich data collection system to enable direct manipulation skill learning from in-the-wild human demonstrations. UMI provides an intuitive interface for non-expert users by using hand-held grippers with mounted GoPro cameras. Compared to existing robotic data collection systems, UMI enables robotic data collection without needing a robot, drastically reducing the engineering and operational complexity. Trained with UMI data, the resulting diffusion policies can be deployed across multiple robot platforms in unseen environments for novel objects and to complete dynamic, bimanual, precise, and long-horizon tasks. The Diffusion Policy and UMI combination provides a simple full-stack solution to many manipulation problems. The turn-around time of building a single-task manipulation system (such as object tossing and cloth folding) can be reduced from a few months to a few days.
139

Essays in Information Economics

Wangenheim, Jonas von 23 August 2018 (has links)
Diese Dissertation besteht aus drei unabhängigen Artikeln in dem Forschungsfeld der Informationsökonomik. Ein wiederkehrendes Motiv in allen drei Artikeln ist die ambivalente Rolle von privater Information. In Kontrast zur klassischen Entscheidungstheorie, in der mehr Informationen Individuen niemals schlechter stellt, analysiere ich drei verschiedene Umgebungen, in denen mehr Konsumenteninformation die Konsumentenrente verringern kann. / This dissertation comprises three independent chapters in the field of information economics. The recurrent theme of all three chapters is the ambiguous role of information: While in standard decision theory additional information enables individuals to weakly increase utility through making better choices, I analyze three di erent environments in which more information to consumers may actually be detrimental to consumer utility.
140

訊息不對稱下銀行之放款策略信號賽局理論之運用

薛舜仁, Allen Si Unknown Date (has links)
以探討銀行放款策略訂定的角度而言,在過去的文獻中, 要仍是在說明 於訊息不對稱下,產生逆選擇及道德危機,因 有信用分配的現象;而本 文所強調的重點則和Milde & Ril-y(1988)的精神相同,利用信號機能來 求出各種貸款申請人之抩A均衡契約,進而區分出各個貸款申請人債信品 質的高低。誘撠眾]在貸款額固定下,擔保品為投資計畫利潤函數中的正 袺鷌僂?A成功地導出擔保品可用來作為信號的指標,在銀行飢馴□v爭下 ,債信較高(違約風險小)的貸款申請人會願意接□U款利率低但須提供較 多擔保品的契約,而債信較低 (違約滅I大) 的貸款申請人則反之。對於 均衡時分離契約(separating contracts)的穩定性,畯怬Q用Cho & Kreps (1987)之sequential equilibrium觀念討出可能優於(dominate) 最適分離契約之pooling契約,是存在的;其原因來自於銀行間的層層牽 制,而不敢提出此契,使得上述的分離契約才是唯一均衡時的契約。由於 我國對於設立銀行所需資本額頗為龐大,因此仍僅限騚X個大財團與大企 業間共同籌資才得以完成,故在銀行的產~中若僅以完全競爭的情況來探 討,似乎仍不夠完善,在本文澈嵽b段,我們即以銀行是獨佔的角度來探 討均衡契約的訂定A並與完全競爭時的情況相比較。這亦使得銀行在不同 結構間A對放款契約的探討有了更完整的架構。

Page generated in 0.0814 seconds