Science.gov

Sample records for securities primary auctions

  1. Secure quantum sealed-bid auction

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb

    2009-05-01

    A new experimentally feasible and secure quantum sealed-bid auction protocol using quantum secure direct communication based on GHZ states is proposed. In this scheme all bidders Bob, Charlie, … , and Zach use M groups n-particle GHZ states to represent their bids. Here, an auctioneer gives the auction outcome by performing a sequence of n-particle GHZ-basis measurements on the final quantum states. It has been shown that using this method guarantees the honesty of the protocol, and malicious bidders can not collude with the auctioneers.

  2. Improved secure quantum sealed-bid auction

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Naseri, Mosayeb; Wen, Qiao-Yan

    2009-10-01

    The security of a secure quantum sealed-bid auction protocol using quantum secure direct communication based on GHZ states [M. Naseri, Opt. Commun. 282 (2009) 1939] is reexamined. It is shown that the protocol does not complete the task of a sealed-bid auction fairly. It is shown that a dishonest bidder can obtain all the other one's secret bids by two special types of attack, i.e., double Controlled NOT attack or using fake entangled particles. Furthermore, a simple possible improvement of the protocol is proposed.

  3. Secure quantum sealed-bid auction with post-confirmation

    NASA Astrophysics Data System (ADS)

    Zhao, Zhiwen; Naseri, Mosayeb; Zheng, Yuanqing

    2010-08-01

    A new secure quantum auction with post-confirmation is proposed, which is a direct application of the multi-particle super dense coding scheme to the auction problem. In this scheme all bidders use M groups n-particle GHZ states to represent their bids. Different from classical auction protocols and the previous secure quantum sealed-bid auction protocols, in the present scheme, by introducing a post-confirmation mechanism the honesty of the quantum sealed-bid auction is guaranteed, i.e., malicious bidders cannot collude with auctioneers. Also by sharing secret keys with the bidders the auctioneer could insure the anonymity of the bidders.

  4. Cryptanalysis and improvement of a secure quantum sealed-bid auction

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Gao, Fei; Wen, Qiao-Yan; Meng, Luo-Ming; Zhu, Fu-Chen

    2009-10-01

    The security of a secure quantum sealed-bid auction protocol using quantum secure direct communication [Mosayeb Naseri, Opt. Commun. 282 (2009) 1939] is analyzed. It is shown that this protocol is unfair as a malicious bidder can obtain others' bids without being found, and then he can optimize his bid to win the auction. Finally, a simple improvement to resist this attack is proposed.

  5. Auction-based Security Game for Multiuser Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Wang, An; Cai, Yueming; Yang, Wendong; Cheng, Yunpeng

    2013-04-01

    In this paper, we develop an auction-based algorithm to allocate the relay power efficiently to improve the system secrecy rate in a cooperative network, where several source-destination pairs and one cooperative relay are involved. On the one hand, the cooperative relay assists these pairs to transmit under a peak power constraint. On the other hand, the relay is untrusty and is also a passive eavesdropper. The whole auction process is completely distributed and no instantaneous channel state information exchange is needed. We also prove the existence and uniqueness of the Nash Equilibrium (NE) for the proposed power auction game. Moreover, the Pareto optimality is also validated. Simulation results show that our proposed auction-based algorithm can effectively improve the system secrecy rate. Besides, the proposed auction-based algorithm can converge to the unique NE point within a finite number of iterations. More interestingly, we also find that the proposed power auction mechanism is cheat-proof.

  6. Revisiting "The Loophole of the Improved Secure Quantum Sealed-Bid Auction with Post-Confirmation and Solution"

    NASA Astrophysics Data System (ADS)

    Wang, Qing-Le; Zhang, Wei-Wei; Su, Qi

    2014-09-01

    Recently, Luo et al. make a detailed analysis on the security of quantum sealed-bid auction with post-confirmation protocol (Quantum Information Processing, Volume 11, Issue 6, pp 1359-1369, 2012) and present the corresponding improved strategy for its loophole. Unfortunately, we find their improved version is still not as secure as expected, since it is vulnerable to malicious bidders in collusion with the auctioneer. And there is an unreasonable suspicion in the honesty of the auctioneer for special situation. Then we propose an improved strategy, which can perfectly defeat kinds of attacks.

  7. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What are the book-entry systems in which auctioned Treasury securities may be issued? 356.4 Section 356.4 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF...

  8. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How and when do I pay for securities awarded in an auction? 356.17 Section 356.17 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE SALE AND ISSUE OF MARKETABLE BOOK-ENTRY...

  9. Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation

    NASA Astrophysics Data System (ADS)

    He, Li-Bao; Huang, Liu-Sheng; Yang, Wei; Xu, Rui; Han, Dian-Qi

    2012-12-01

    We investigate the quantum sealed-bid auction protocol proposed by Zhao et al. (Opt Commun 283:1394, 2010). It uses M groups n-particle GHZ states to represent bids and a post-confirmation mechanism to guarantee the honesty of the quantum sealed-bid auction. However, in our opinion the protocol still does not complete the task of a sealed-bid auction fairly. It is shown that a large group of dishonest bidders can collude to obtain all the other one's secret bids before the opening phase of the auction with a probability polynomially close to one. Moreover, a simple feasible improvement of the protocol is proposed.

  10. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How and when do I pay for securities awarded in an auction? 356.17 Section 356.17 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY...

  11. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are...

  12. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are the book-entry systems in which auctioned Treasury securities may be issued or maintained? 356.4 Section 356.4 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE...

  13. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are the book-entry systems in which auctioned Treasury securities may be issued or maintained? 356.4 Section 356.4 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE...

  14. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are the book-entry systems in which auctioned Treasury securities may be issued or maintained? 356.4 Section 356.4 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE...

  15. Do I hear... anyone here? Tax-exempt healthcare facilities have taken a hit on auction-rate securities as the mortgage meltdown has investors skittish.

    PubMed

    Evans, Melanie

    2008-02-25

    The crisis in auction-rate securities is coming down hard on tax-exempt providers. Buyers are disappearing, sending interest rates soaring. Some hospitals and other healthcare borrowers are being forced to pay maximum interest. "Basically, the investor pool has all but vanished," says Melissa Williams, left, of Christus Health. PMID:18491765

  16. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan....

  17. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan....

  18. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and conditions in this part, the regulations in 31 CFR part 363 (for securities held in TreasuryDirect), the regulations in 31 CFR part 357 (for securities held in the commercial book-entry system and Legacy... part to distinguish such securities from “inflation-protected” securities. We refer to...

  19. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and conditions in this part, the regulations in 31 CFR part 363 (for securities held in TreasuryDirect), the regulations in 31 CFR part 357 (for securities held in the commercial book-entry system and...

  20. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and conditions in this part, the regulations in 31 CFR part 363 (for securities held in TreasuryDirect), the regulations in 31 CFR part 357 (for securities held in the commercial book-entry system and Legacy... distinguish such notes and bonds from “inflation-protected securities” and “floating rate notes.” We refer...

  1. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... actual settlement amount due. (See § 356.25.) (c) Legacy Treasury Direct ®. Unless you make other... payable to Legacy Treasury Direct and mail it with the bid to the Federal Reserve Bank handling your... inflation adjustment. (3) Payment by maturing securities. You may use maturing securities held in...

  2. Essays on wholesale auctions in deregulated electricity markets

    NASA Astrophysics Data System (ADS)

    Baltaduonis, Rimvydas

    2007-12-01

    The early experience in the restructured electric power markets raised several issues, including price spikes, inefficiency, security, and the overall relationship of market clearing prices to generation costs. Unsatisfactory outcomes in these markets are thought to have resulted in part from strategic generator behaviors encouraged by inappropriate market design features. In this dissertation, I examine the performance of three auction mechanisms for wholesale power markets - Offer Cost Minimization auction, Payment Cost Minimization auction and Simple-Offer auction - when electricity suppliers act strategically. A Payment Cost Minimization auction has been proposed as an alternative to the traditional Offer Cost Minimization auction with the intention to solve the problem of inflated wholesale electricity prices. Efficiency concerns for this proposal were voiced due to insights predicated on the assumption of true production cost revelation. Using a game theoretic approach and an experimental method, I compare the two auctions, strictly controlling for the level of unilateral market power. A specific feature of these complex-offer auctions is that the sellers submit not only the quantities and the minimum prices that they are willing to sell at, but also the start-up fees, which are designed to reimburse the fixed start-up costs of the generation plants. I find that the complex structure of the offers leaves considerable room for strategic behavior, which consequently leads to anti-competitive and inefficient market outcomes. In the last chapter of my dissertation, I use laboratory experiments to contrast the performance of two complex-offer auctions against the performance of a simple-offer auction, in which the sellers have to recover all their generation costs - fixed and variable - through a uniform market-clearing price. I find that a simple-offer auction significantly reduces consumer prices and lowers price volatility. It mitigates anti-competitive effects

  3. 19 CFR 127.34 - Auctioneer's commissions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Auctioneer's commissions. 127.34 Section 127.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Proceeds of Sale § 127.34...

  4. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  5. Cryptographic Combinatorial Clock-Proxy Auctions

    NASA Astrophysics Data System (ADS)

    Parkes, David C.; Rabin, Michael O.; Thorpe, Christopher

    We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase”, all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution, and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem, the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree, and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids, in the usual case, the exponential complexity of previous cryptographically-secure combinatorial auctions.

  6. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  7. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  8. Three essays on auction markets

    NASA Astrophysics Data System (ADS)

    Shunda, Nicholas James

    This dissertation contains a series of theoretical investigations of auction markets. The essays it contains cover wholesale electricity markets, a popular selling mechanism on eBay, and supplier entry into multi-unit procurement auctions. The study in Chapter 1 compares the procurement cost-minimizing and productive efficiency performance of the auction mechanism used by independent system operators in wholesale electricity auction markets in the U.S. with that of a proposed alternative. The current practice allocates energy contracts as if the auction featured a discriminatory final payment method when, in fact, the markets are uniform price auctions. The proposed alternative explicitly accounts for the market-clearing price during the allocation phase. We find that the proposed alternative largely outperforms the current practice on the basis of procurement costs in the context of simple auction markets featuring both day-ahead and real-time auctions and that the procurement cost advantage of the alternative is complete when we simulate the effects of increased competition. We also find that a tradeoff between the objectives of procurement cost minimization and productive efficiency emerges in our simple auction markets and persists in the face of increased competition. The study in Chapter 2 considers a possible rationale for an auction with a buy price. In an auction with a buy price, the seller provides bidders with an option to end the auction early by accepting a transaction at a posted price. The "Buy-It-Now" option on eBay is a leading example of an auction with a buy price. The study develops a model of an auction with a buy price in which bidders use the auction's reserve price and buy price to formulate a reference price. The model both explains why a revenue-maximizing seller would want to augment her auction with a buy price and demonstrates that the seller sets a higher reserve price when she can affect the bidders' reference price through the

  9. Quantum English auctions

    NASA Astrophysics Data System (ADS)

    Piotrowski, Edward W.; Sładkowski, Jan

    2003-02-01

    We continue the analysis of quantum-like description of markets and economics. The approach has roots in the recently developed quantum game theory and quantum computing. The present paper is devoted to quantum English auction which we consider as a special class of quantum market games. The approach allows to calculate profit intensities for various possible strategies.

  10. Adaptive Techniques for Online Auctions

    SciTech Connect

    Sakas, D. P.; Vlachos, D. S.; Simos, T. E.

    2007-12-26

    Online auctions consider a setting in which agents arrive dynamically and require that an allocation and payment decision is made before they depart. An auctioneer must take a decision having no knowledge about the time horizon and the strategy of the bidder agent. In this work, we present an utility theory based model which is capable of taking the auctioneer decision and adopt its assumptions about the bidders from the results of past auctions. Simulation results are presented in order to test the efficiency of the proposed model.

  11. Adaptive Techniques for Online Auctions

    NASA Astrophysics Data System (ADS)

    Sakas, D. P.; Vlachos, D. S.; Simos, T. E.

    2007-12-01

    Online auctions consider a setting in which agents arrive dynamically and require that an allocation and payment decision is made before they depart. An auctioneer must take a decision having no knowledge about the time horizon and the strategy of the bidder agent. In this work, we present an utility theory based model which is capable of taking the auctioneer decision and adopt its assumptions about the bidders from the results of past auctions. Simulation results are presented in order to test the efficiency of the proposed model.

  12. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... discretion in the auction process? (a) We have the discretion to: (1) Accept, reject, or refuse to recognize... to modify the terms and conditions of new securities and to depart from the customary pattern...

  13. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... discretion in the auction process? (a) We have the discretion to: (1) Accept, reject, or refuse to recognize... to modify the terms and conditions of new securities and to depart from the customary pattern...

  14. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... discretion in the auction process? (a) We have the discretion to: (1) Accept, reject, or refuse to recognize... to modify the terms and conditions of new securities and to depart from the customary pattern...

  15. Multiparty quantum sealed-bid auction using single photons as message carrier

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Wang, Hai-Bin; Yuan, Gong-Lin; Xu, Yong; Chen, Zhen-Yu; An, Xing-Xing; Ji, Fu-Gao; Gnitou, Gnim Tchalim

    2016-02-01

    In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols based on the entangled states (GHZ state, EPR pairs, etc.), the present protocol is more economic and feasible within present technology. In order to guarantee the security and the fairness of the auction, the decoy photon checking technique and an improved post-confirmation mechanism with EPR pairs are introduced, respectively.

  16. 76 FR 81932 - Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... listed in Attachment A to the Auction 93 Procedures Public Notice, 76 FR 78645, December 19, 2011, to MM... COMMISSION Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93... the construction permit number for one of the FM broadcast construction permits for Auction 93....

  17. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through...

  18. Internet Auction Sellers: Does Size Really Matter?

    ERIC Educational Resources Information Center

    Halstead, Diane; Becherer, Richard C.

    2003-01-01

    Examines the Internet auction phenomenon as it relates to the marketing mix of online auction sellers. The data indicate that, while there is great diversity among businesses that utilize online auctions, distinct cost leadership and differentiation marketing strategies are both evident. These two approaches are further distinguished in terms of…

  19. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... such offers will be sold to cover the bids, according to each such offeror's pro rata share of all... each auction, the Administrator will pay a pro rata share of the proceeds of each auction to the... withheld for the purposes of establishing the Auction Subaccount. Each unit's pro rata share will...

  20. Exploring Online Auction Behaviors and Motivations

    ERIC Educational Resources Information Center

    Jeon, Sua; Crutsinger, Christy; Kim, Haejung

    2008-01-01

    The availability and convenience of the Internet, combined with the variety of products available at any given time, have contributed to the success of online auctions.This exploratory study examined online auction behaviors among college students in an attempt to identify underlying dimensions of auction motivations. Questionnaires completed by…

  1. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  2. Statistical Properties of Online Auctions

    NASA Astrophysics Data System (ADS)

    Namazi, Alireza; Schadschneider, Andreas

    We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies.

  3. Biological auctions with multiple rewards

    PubMed Central

    Reiter, Johannes G.; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A.; Chatterjee, Krishnendu

    2015-01-01

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards. PMID:26180069

  4. Auctions for coastal energy resources

    NASA Astrophysics Data System (ADS)

    Griffin, Robert M.

    It is becoming increasingly common to allocate public resources to the private sector for the purpose of developing these resources. One of the earliest uses of auctions in the U.S. for allocating rights to public resources was in the offshore oil and gas industry. The U.S. Federal government, through the Department of Interior (DOI), has used auctions to allocate development rights to offshore oil and gas resources to the private sector since the 1950's. Since then many things have changed. Oil and gas markets have gone through boom and bust cycles, giant technological advances in extraction and assessment have taken place, and alternative energy based in the coastal zone is now in demand in markets as well. There has been an enormous amount of research into the drivers of bidder behavior in auctions and optimal auction design in the last 60 years as well. Throughout all of this, the DOI has continued to use basically the same exact auction design to allocate oil and gas leases. The U.S. offshore oil and gas resources sold by the Department of Interior have accounted for more than $65 billion in revenue since the program started. These offshore resources are an important source of government revenue and national wealth. Additionally, the expansion of the energy sector offshore has enormous potential for electricity generation in the U.S., estimated by the National Renewable Energy Laboratory as approaching 54 gigawatts by 2030 (U.S. Department of Energy, 2008). Taken together, the DOI controls access to a large part of the future of energy in the U.S. The research herein assesses the auction formats used to allocate both fossil fuels and renewable resources on the Outer Continental Shelf (OCS). The first manuscript looks at the current method used by the DOI to allocate oil and gas leases on the OCS, and is primarily interested in how bidders behave in this environment. Using latent class estimation techniques to separate distinct bidding behavior in a laboratory

  5. Learning from California`s QF auction

    SciTech Connect

    Gribik, P.

    1995-04-15

    California`s 1993 qualifying facility (QF) auction dramatically illustrates problems that can be encountered in structuring auctions for electric utility solicitations of supply-side resources from qualifying cogeneration and small power production facilities. In the 1993 California QF auction, three California utilities were to select QFs that would be awarded long-term purchased-power contracts. The auction produced some unexpected outcomes that could potentially cost the utilities and their customers tens of millions of dollars per year. A year after the auction was held, the parties were still attempting to revise contracts, or even rebid a portion of the auction. And all of this effort may come to naught, depending upon what happens now that the Federal Energy Regulatory Commission has struck down the auction process under California`s Biennial Resource Plan Update, claiming that it violates the Public Utility Regulatory Policies Act (PURPA) by using an improper method to calculate avoided costs. A study of the California QF auction illustrates yet again that the devil is in the details. And the stakes will only rise farther as regulators in other states rely more on auctions to open up the electric industry to further competition.

  6. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  7. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  8. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  9. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  10. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  11. Collusion in Auctions for Emission Permits: An Experimental Analysis

    ERIC Educational Resources Information Center

    Burtraw, Dallas; Goeree, Jacob; Holt, Charles A.; Myers, Erica; Palmer, Karen; Shobe, William

    2009-01-01

    Environmental markets have several institutional features that provide a new context for the use of auctions and that have not been studied previously. This paper reports on laboratory experiments testing three auction forms--uniform and discriminatory price sealed-bid auctions and an ascending clock auction. We test the ability of subjects to…

  12. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... yields or discount rates through successively higher yields or discount rates, up to the amount required to meet the offering amount. When necessary, we prorate bids at the highest accepted yield or... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high...

  13. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... yields or discount rates through successively higher yields or discount rates, up to the amount required to meet the offering amount. When necessary, we prorate bids at the highest accepted yield or... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high...

  14. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    PubMed Central

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project. PMID:25848559

  15. Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions

    NASA Astrophysics Data System (ADS)

    Nielek, Radoslaw; Wawer, Aleksander; Wierzbicki, Adam

    An auction platform is a dynamic environment where a rich variety of social effects can be observed. Most of those effects remain unnoticed or even hidden to ordinary users. The in-depth studies of such effects should allow us to identify and understand the key factors influencing users’ behaviour. The material collected from the biggest Polish auction house has been analyzed. NLP algorithms were applied to extract sentiment-related content from collected comments. Emotional distance between negative, neutral and positive comments has been calculated. The obtained results confirm the existence of the spiral-of-hatred effect but also indicate that much more complex patterns of mutual relations between sellers and buyers exist. The last section contains a several suggestions which can prove useful to improve trustworthiness of users’ reports and security of an auction platform in general.

  16. Sequential Auctions in Uncertain Information Settings

    NASA Astrophysics Data System (ADS)

    Fatima, Shaheen; Wooldridge, Michael; Jennings, Nicholas R.

    This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically, there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale, the number of objects for sale, and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting, we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the computational and economic properties of the equilibrium solution. The former analysis is essential if we want to use software agents to bid on our behalf. The latter is essential because both the auctioneer and the bidders want to know how these uncertainties affect their profits. Thus we compare the outcomes for these settings from the perspective of the bidders (i.e., in terms of their profits), from the perspective of the auctioneer (i.e., in terms of his revenue), and from a global perspective (i.e., in terms of auction efficiency).

  17. Quantum auctions: Facts and myths

    NASA Astrophysics Data System (ADS)

    Piotrowski, Edward W.; Sładkowski, Jan

    2008-06-01

    Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group (Hogg et al.) seems to be much easier to implement. We focus on problems related to combinatorial auctions and technical assumptions that are made. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of the agent’s activity could in principle be guaranteed. Then we point out some key problems that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for an experimental realization in the near future.

  18. Bayesian Auctions with Friends and Foes

    NASA Astrophysics Data System (ADS)

    Chen, Po-An; Kempe, David

    We study auctions whose bidders are embedded in a social or economic network. As a result, even bidders who do not win the auction themselves might derive utility from the auction, namely, when a friend wins. On the other hand, when an enemy or competitor wins, a bidder might derive negative utility. Such spite and altruism will alter the bidding strategies. A simple and natural model for bidders’ utilities in these settings posits that the utility of a losing bidder i as a result of bidder j winning is a constant (positive or negative) fraction of bidder j’s utility.

  19. Impact of Patient Portal Secure Messages and Electronic Visits on Adult Primary Care Office Visits

    PubMed Central

    Crane, Sarah J.; Chaudhry, Rajeev; Ebbert, Jon O.; Ytterberg, Karen; Tulledge-Scheitel, Sidna M.; Stroebel, Robert J.

    2014-01-01

    Abstract Introduction: Secure messages and electronic visits (“e-visits”) through patient portals provide patients with alternatives to face-to-face appointments, telephone contact, letters, and e-mails. Limited information exists on how portal messaging impacts face-to-face visits in primary care. Materials and Methods: We conducted a retrospective cohort study of 2,357 primary care patients who used electronic messaging (both secure messages and e-visits) on a patient portal. Face-to-face appointment frequencies (visits/year) of each patient were calculated before and after the first message in a matched-pairs analysis. We analyzed visit frequencies with and without adjustments for a first message surge in visits, and we examined subgroups of high message utilizers and long-term users. Results: Primary care patients who sent at least one message (secure message or e-visit) had a mean of 2.43 (standard deviation [SD] 2.3) annual face-to-face visits before the first message and 2.47 (SD 2.8) after, a nonsignificant difference (p=0.45). After adjustment for a first message surge in visits, no significant visit frequency differences were observed (mean, 2.35 annual visits per patient both before and after first message; p=0.93). Subgroup analysis also showed no significant change in visit frequency for patients with higher message utilization or for those who had used the messaging feature longer. Conclusions: No significant change in face-to-face visit frequency was observed following implementation of portal messaging. Secure messaging and e-visits through a patient portal may not result in a change of adult primary care face-to-face visits. PMID:24350803

  20. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management... Sales Process Competitive Sales § 102-38.95 What is an auction? An auction is a sale where the...

  1. Auctioneering Training Certificate Program 93-1001. Final Report.

    ERIC Educational Resources Information Center

    Clark, Charles H.

    A project was conducted to prepare a catalog of duties and tasks, performance objectives and guides, and instructional materials that would enable schools to develop instructional programs designed to prepare persons to enter the career of auctioneering. An occupational survey of auctioneers was conducted; a writing team of auctioneers prepared…

  2. Competitive Financing Mechanisms: Auctions Used by Federal Agencies.

    ERIC Educational Resources Information Center

    Joyner, Carlotta C.

    This report reviews auctions used by various federal agencies to examine the feasibility of using similar auctions to determine interest rates for student borrowing through the Federal Family Education Loan Program (FFELP) and the William D. Ford Federal Direct Loan Program. The review identified 31 different auctions, divided into two major…

  3. Bidding Agents That Perpetrate Auction Fraud

    NASA Astrophysics Data System (ADS)

    Trevathan, Jarrod; McCabe, Alan; Read, Wayne

    This paper presents a software bidding agent that inserts fake bids on the seller's behalf to inflate an auction's price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target, or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items, can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm, to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent's ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.

  4. China’s Land Market Auctions: Evidence of Corruption?

    PubMed Central

    Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125

  5. 47 CFR 1.2208 - Public notice of auction completion and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROCEDURE Grants by Random Selection Competitive Bidding Proceedings Broadcast Television Spectrum Reverse... broadcast television spectrum incentive auction conducted under section 6403 of the Spectrum Act, public... indicate that the reassignments of television channels and reallocations of broadcast television...

  6. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  7. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  8. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  9. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  10. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    .... This section provides guidance on the sale of all inventory property by auction, except FSA real... property, will determine and document the minimum sale price acceptable. In determining a minimum sale... on sales of program and property. For NP property, credit may be offered to facilitate the...

  11. Books at Auction: The Art of Deaccessioning.

    ERIC Educational Resources Information Center

    Model, Peter

    1981-01-01

    Lack of space and budget cuts force many libraries to weed out books and to be selective in accepting collection bequests. The approach for deciding which books to weed out and whether to dispose of these books through dealers or auctions are decisions private clubs and many libraries must make. (RBF)

  12. 7 CFR 1955.131 - Auctioneers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Auctioneers. 1955.131 Section 1955.131 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE (CONTINUED)...

  13. Auction design and the market for sulfur dioxide emissions

    SciTech Connect

    Joskow, P.L.; Schmalensee, R.; Bailey, E.M.

    1997-12-31

    Title IV of the Clean Air Act Amendments of 1990 created a market for electric utility emissions of sulfur dioxide (SO{sub 2}). Recent papers have argued that flaws in the design of the auctions that are part of this market have adversely affected its performance. These papers incorrectly assume that trade can only occur at auctions, however. Our empirical analysis of the SO{sub 2} emissions market shows that the auctions have become a small part of a relatively efficient market and that the auction design problems that have attracted the most attention have had no effect on actual market prices.

  14. Auctions vs negotiations: a study of price differentials.

    PubMed

    Kjerstad, Egil

    2005-12-01

    Recent contributions in auction and bargaining theory suggest that a procurer should place more faith in the power of competition among alternative suppliers than in his or her own negotiating skill. Based on data from 216 contracts between procurers and suppliers of medical and surgical articles, we test whether auctions and bargaining result in significantly different prices. The main results are that auctions give 'thicker' markets compared with negotiations, as expected, but that auctions do not result in significantly lower prices compared with negotiations. PMID:15945037

  15. Security risk assessment of the primary layer of wavelength division multiplexing passive optical network

    NASA Astrophysics Data System (ADS)

    Koudelka, Petr; Siska, Petr; Latal, Jan; Poboril, Radek; Hajek, Lukas; Kepak, Stanislav; Vasinek, Vladimir

    2015-01-01

    Next-generation passive optical access networks come to the fore nowadays. These optical next-generation networks are the response to the increasing qualitative requirements from end users. Technologies using Time Division Multiplexing include NG-PON (XG-PON 1 and XG-PON 2) and 10GEPON. Their advantage is the applicability to older topologies, which are operated by the original technology of passive optical access networks. Wavelength Division Multiplexing Passive Optical Network (WDM-PON) is an alternative also belonging to next-generation networks. Time Division Multiplexing is in this case replaced by Wavelength Division Multiplexing. Certain variants of WDM-PON use a combination of broadband light source, optical circulator, optical phased array and tunable FP laser. Construction of the terminal units (ONU) is advantageous because it can always tune in to the appropriate wavelength in the given optical DWDM channel (100 GHz). The disadvantage is the increased security risk on the primary layer due to channel crosstalk in an optical phased array (AWG). The aim of this paper is to assess the degree of security risk in real conditions. The article includes both simulation and real measurements in C + L bands with 100 GHz DWDM spacing.

  16. Health Auctions: a Valuation Experiment (HAVE) study protocol

    PubMed Central

    Kularatna, Sanjeewa; Petrie, Dennis; Scuffham, Paul A; Byrnes, Joshua

    2016-01-01

    Introduction Quality-adjusted life years are derived using health state utility weights which adjust for the relative value of living in each health state compared with living in perfect health. Various techniques are used to estimate health state utility weights including time-trade-off and standard gamble. These methods have exhibited limitations in terms of complexity, validity and reliability. A new composite approach using experimental auctions to value health states is introduced in this protocol. Methods and analysis A pilot study will test the feasibility and validity of using experimental auctions to value health states in monetary terms. A convenient sample (n=150) from a population of university staff and students will be invited to participate in 30 auction sets with a group of 5 people in each set. The 9 health states auctioned in each auction set will come from the commonly used EQ-5D-3L instrument. At most participants purchase 2 health states, and the participant who acquires the 2 ‘best’ health states on average will keep the amount of money they do not spend in acquiring those health states. The value (highest bid and average bid) of each of the 24 health states will be compared across auctions to test for reliability across auction groups and across auctioneers. A test retest will be conducted for 10% of the sample to assess reliability of responses for health states auctions. Feasibility of conducting experimental auctions to value health states will also be examined. The validity of estimated health states values will be compared with published utility estimates from other methods. This pilot study will explore the feasibility, reliability and validity in using experimental auction for valuing health states. Ethics and dissemination Ethical clearance was obtained from Griffith University ethics committee. The results will be disseminated in peer-reviewed journals and major international conferences. PMID:27056589

  17. A Trustworthy Internet Auction Model with Verifiable Fairness.

    ERIC Educational Resources Information Center

    Liao, Gen-Yih; Hwang, Jing-Jang

    2001-01-01

    Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)

  18. A Classroom Auction with Externalities: Applied to Mergers and Acquisitions

    ERIC Educational Resources Information Center

    Meister, J. Patrick; Anderson, Kyle J.

    2007-01-01

    The authors describe an in-class exercise in which students participate in an auction to buy US Airways. The exercise is based on events of late 1995, in which neither United nor American Airlines decided to bid for US Airways. Two teams of students participate in an English auction. Students learn that the equilibrium of the sequential game is…

  19. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... announces the auction of certain broadcast FM, AM, and FM Translator construction permits scheduled to... certain broadcast FM, AM, and FM Translator construction permits and sought comment on the procedures to... resolve mutual exclusivity between applications for new AM stations on 640 kHz and 1230 kHz in the...

  20. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    NASA Astrophysics Data System (ADS)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  1. Detecting Fraud in Internet Auction Systems

    NASA Astrophysics Data System (ADS)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  2. Auction Mechanism to Allocate Air Traffic Control Slots

    NASA Technical Reports Server (NTRS)

    Raffarin, Marianne

    2003-01-01

    This article deals with an auction mechanism for airspace slots, as a means of solving the European airspace congestion problem. A disequilibrium, between Air Traffic Control (ATC) services supply and ATC services demand are at the origin of almost one fourth of delays in the air transport industry in Europe. In order to tackle this congestion problem, we suggest modifying both pricing and allocation of ATC services, by setting up an auction mechanism. Objects of the auction will be the right for airlines to cross a part of the airspace, and then to benefit from ATC services over a period corresponding to the necessary time for the crossing. Allocation and payment rules have to be defined according to the objectives of this auction. The auctioneer is the public authority in charge of ATC services, whose aim is to obtain an efficient allocation. Therefore, the social value will be maximized. Another objective is to internalize congestion costs. To that end, we apply the principle of Clarke-Groves mechanism auction: each winner has to pay the externalities imposed on other bidders. The complex context of ATC leads to a specific design for this auction.

  3. Rationality, Irrationality and Escalating Behavior in Lowest Unique Bid Auctions

    PubMed Central

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A. N.

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions – lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of “bid space”. The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. PMID:22279553

  4. Smarter than Others? Conjectures in Lowest Unique Bid Auctions

    PubMed Central

    Hu, Rui; Chen, Qinghua

    2015-01-01

    Research concerning various types of auctions, such as English auctions, Dutch auctions, highest-price sealed-bid auctions, and second-price sealed-bid auctions, is always a topic of considerable interest in interdisciplinary fields. The type of auction, known as a lowest unique bid auction (LUBA), has also attracted significant attention. Various models have been proposed, but they often fail to explain satisfactorily the real bid-distribution characteristics. This paper discusses LUBA bid-distribution characteristics, including the inverted-J shape and the exponential decrease in the upper region. The authors note that this type of distribution, which initially increases and later decreases, cannot be derived from the symmetric Nash equilibrium framework based on perfect information that has previously been used. A novel optimization model based on non-perfect information is presented. The kernel of this model is the premise that agents make decisions to achieve maximum profit based on imaginary information or assumptions regarding the behavior of others. PMID:25849631

  5. Competition strength influences individual preferences in an auction game

    PubMed Central

    Toelch, Ulf; Jubera-Garcia, Esperanza; Kurth-Nelson, Zeb; Dolan, Raymond J.

    2014-01-01

    Competitive interactions between individuals are ubiquitous in human societies. Auctions represent an institutionalized context for these interactions, a context where individuals frequently make non-optimal decisions. In particular, competition in auctions can lead to overbidding, resulting in the so-called winner’s curse, often explained by invoking emotional arousal. In this study, we investigated an alternative possibility, namely that competitors’ bids are construed as a source of information about the good’s common value thereby influencing an individuals’ private value estimate. We tested this hypothesis by asking participants to bid in a repeated all-pay auction game for five different real items. Crucially, participants had to rank the auction items for their preference before and after the experiment. We observed a clear relation between auction dynamics and preference change. We found that low competition reduced preference while high competition increased preference. Our findings support a view that competitors’ bids in auction games are perceived as valid social signal for the common value of an item. We suggest that this influence of social information constitutes a major cause for the frequently observed deviations from optimality in auctions. PMID:25168161

  6. The communications spectrum: Frequency allocations and auctions

    NASA Astrophysics Data System (ADS)

    Pritchard, Wilbur

    1997-01-01

    Demands on the communications spectrum have increased sharply because of the growth in radio communication services, the large bandwidths now required, and the rapid increases in world population. The problem will be exacerbated by the requirements of high definition television and the enormous amounts of information that will be transmitted by radio. The electromagnetic spectrum is a finite natural resource of great value used for emergency communications and military operations as well as for commercial purposes. Both government and the marketplace have proper roles in the allocation of its resources. There are no viable alternatives to international organizations such as the International Telecommunication Union or to agencies such as the Federal Communications Commission for the regulation of radio communication and the assignment of spectrum to essential public services. Although government auctions of spectrum are justifiable where there is no way to distinguish among commercial entities seeking to use the same bands for similar services, the practice is inherently inequitable and discourages development of new uses for the spectrum by removing investment protection. Recommended alternatives to auctions are: (1) lotteries, which keep assets and proceeds in the economy; and (2) ongoing charges for current as well as new users of the spectrum.

  7. Statistical theory of the continuous double auction

    NASA Astrophysics Data System (ADS)

    Smith, Eric; Doyne Farmer, J.; Gillemot, László; Krishnamurthy, Supriya

    2003-12-01

    Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyse it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand versus price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a non-dimensional granularity parameter, is in most cases a more significant determinant of market behaviour than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable.

  8. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  9. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  10. 31 CFR 363.202 - What marketable Treasury securities may I purchase and hold through my TreasuryDirect ® account?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security that is available for purchase through the TreasuryDirect ® website. One day each week, marketable securities that are scheduled for auction within 8 weeks will be made available on the TreasuryDirect...

  11. 31 CFR 363.202 - What marketable Treasury securities may I purchase and hold through my TreasuryDirect ® account?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security that is available for purchase through the TreasuryDirect ® website. One day each week, marketable securities that are scheduled for auction within 8 weeks will be made available on the TreasuryDirect...

  12. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    ERIC Educational Resources Information Center

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  13. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    SciTech Connect

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  14. A Study of Central Auction Based Wholesale Electricity Markets

    NASA Astrophysics Data System (ADS)

    Ceppi, Sofia; Gatti, Nicola

    The deregulation of electricity markets produced significant economic benefits, reducing prices to customers and opening several opportunities for new actors, e.g., new generators and distributors. A prominent scientific and technological challenge is the automation of such markets. In particular, we focus our attention on wholesale electricity markets based on a central auction. In these markets, generators sell electricity by means of a central auction to a public authority. Instead, the distribution of electricity to customers takes part in retail markets. The main works presented in the literature model wholesale markets as oligopolies, neglecting thus the specific auction mechanism. In this paper, we enrich these models by introducing an auction mechanism shaped on that used in the Italian wholesale electricity market, we solve the winner determination problem, and we preliminarily study the problem of searching for equilibria.

  15. 6. East rear, cattle auction arena below in background, Omaha ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. East rear, cattle auction arena below in background, Omaha livestock market offices above. View to west. - South Omaha Union Stock Yards, Stock Yards Autopark, 2900 "O" Plaza, Omaha, Douglas County, NE

  16. Auction fever: exploring informational social influences on bidder choices.

    PubMed

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations. PMID:21192763

  17. Statistical mechanics of budget-constrained auctions

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Realpe-Gomez, J.; Zecchina, R.

    2009-07-01

    Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being in the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). On the basis of the cavity method of statistical mechanics, we introduce a message-passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise.

  18. The association of family food security and depression in mothers having primary school children in Ray-Iran

    PubMed Central

    2014-01-01

    Background As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. Methods This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. Results The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). Conclusion The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group. PMID:24940566

  19. Competition in decentralized electricity markets: Three papers on electricity auctions

    NASA Astrophysics Data System (ADS)

    Harbord, David William Cameron

    This thesis consists of three self-contained papers on the analysis of electricity auctions written over a period of twelve years. The first paper models price competition in a decentralized wholesale market for electricity as a first-price, sealed-bid, multi-unit auction. In both the pure and mixed-strategy equilibria of the model, above marginal cost pricing and inefficient despatch of generating units occur. An alternative regulatory pricing rule is considered and it is shown that offering to supply at marginal cost can be induced as a dominant strategy for all firms. The second paper analyses strategic interaction between long-term contracts and price competition in the British electricity wholesale market, and confirms that forward contracts will tend to put downward pressure on spot market prices. A 'strategic commitment' motive for selling forward contracts is also identified: a generator may commit itself to bidding lower prices into the spot market in order to ensure that it will be despatched with its full capacity. The third paper characterizes bidding behavior and market outcomes in uniform and discriminatory electricity auctions. Uniform auctions result in higher average prices than discriminatory auctions, but the ranking in terms of productive efficiency is ambiguous. The comparative effects of other market design features, such as the number of steps in suppliers' bid functions, the duration of bids and the elasticity of demand are analyzed. The paper also clarifies some methodological issues in the analysis of electricity auctions. In particular we show that analogies with continuous share auctions are misplaced so long as firms are restricted to a finite number of bids.

  20. Auctionable fixed transmission rights for congestion management

    NASA Astrophysics Data System (ADS)

    Alomoush, Muwaffaq Irsheid

    the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.

  1. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    PubMed Central

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative

  2. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) ODOMETER DISCLOSURE REQUIREMENTS § 580.9 Odometer record retention for auction companies. Each auction company shall establish and... following records: (a) The name of the most recent owner (other than the auction company); (b) The name...

  3. Using Laboratory Experiments for Policymaking: An Example from the Georgia Irrigation Reduction Auction

    ERIC Educational Resources Information Center

    Cummings, Ronald G.; Holt, Charles A.; Laury, Susan K.

    2004-01-01

    In recent years, interest has been growing in policy applications of different auction systems. This paper reports a series of experiments that were used to design and implement an auction in a unique policymaking environment. In April 2000, the Georgia legislature passed a law that mandated that the state hold an auction in drought years to pay…

  4. A Greedy Double Auction Mechanism for Grid Resource Allocation

    NASA Astrophysics Data System (ADS)

    Ding, Ding; Luo, Siwei; Gao, Zhan

    To improve the resource utilization and satisfy more users, a Greedy Double Auction Mechanism(GDAM) is proposed to allocate resources in grid environments. GDAM trades resources at discriminatory price instead of uniform price, reflecting the variance in requirements for profits and quantities. Moreover, GDAM applies different auction rules to different cases, over-demand, over-supply and equilibrium of demand and supply. As a new mechanism for grid resource allocation, GDAM is proved to be strategy-proof, economically efficient, weakly budget-balanced and individual rational. Simulation results also confirm that GDAM outperforms the traditional one on both the total trade amount and the user satisfaction percentage, specially as more users are involved in the auction market.

  5. Multi-unit auctions with budget-constrained bidders

    NASA Astrophysics Data System (ADS)

    Ghosh, Gagan Pratap

    In my dissertation, I investigate the effects of budget-constraints in multi-unit auctions. This is done in three parts. First, I analyze a case where all bidders have a common budget constraint. Precisely, I analyze an auction where two units of an object are sold at two simultaneous, sealed bid, first-price auctions, to bidders who have demand for both units. Bidders differ with respect to their valuations for the units. All bidders have an identical budget constraint which binds their ability to spend in the auction. I show that if valuation distribution is atom-less, then their does not exist any symmetric equilibrium in this auction game. In the second and third parts of my thesis, I analyze the sale of licenses for the right to drill for oil and natural gas in the Outer Continental Shelf (OCS) of the United States. These sales are conducted using simultaneous sealed-bid first-price auctions for multiple licenses, each representing a specific area (called a tract). Using aspects of observed bidding-behavior, I first make a prima facie case that bidders are budget-constrained in these auctions. In order to formalize this argument, I develop a simple extension of the standard model (where bidders differ in their valuations for the objects) by incorporating (random) budgets for the bidders. The auction-game then has a two-dimensional set of types for each player. I study the theoretical properties of this auction, assuming for simplicity that two units are being sold. I show that this game has an equilibrium in pure strategies that is symmetric with respect to the players and with respect to the units. The strategies are essentially pure in the sense that each bidder-type has a unique split (up to a permutation) of his budget between the two auctions. I then characterize the equilibrium in terms of the bid-distribution and iso-bid curves in the value-budget space. I derive various qualitative features of this equilibrium, among which are: (1) under mild

  6. Application for Single Price Auction Model (SPA) in AC Network

    NASA Astrophysics Data System (ADS)

    Wachi, Tsunehisa; Fukutome, Suguru; Chen, Luonan; Makino, Yoshinori; Koshimizu, Gentarou

    This paper aims to develop a single price auction model with AC transmission network, based on the principle of maximizing social surplus of electricity market. Specifically, we first formulate the auction market as a nonlinear optimization problem, which has almost the same form as the conventional optimal power flow problem, and then propose an algorithm to derive both market clearing price and trade volume of each player even for the case of market-splitting. As indicated in the paper, the proposed approach can be used not only for the price evaluation of auction or bidding market but also for analysis of bidding strategy, congestion effect and other constraints or factors. Several numerical examples are used to demonstrate effectiveness of our method.

  7. A Multiple Auctions Support System BiddingBot based on a Cooperative Bidding Mechanism among Agents

    NASA Astrophysics Data System (ADS)

    Ito, Takayuki; Hattori, Hiromitsu; Shintani, Toramatsu

    Online auctions are becoming an increasingly important channel for electronic commerce. There are a number of online auction sites on the Internet. It is hard for users to attend, monitor, and make bids at simultaneous multiple auctions. In this paper, we implement BiddingBot which is a multiagent system that supports users in attending, monitoring, and bidding in multiple auctions. Further, we propose a new cooperative bidding mechanism among agents. Our current experiment demonstrates that our new cooperative bidding mechanism can effectively support users to monitor, attend, and make bids on multiple simultaneous auctions.

  8. Building Secure Attachments for Primary School Children: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Ubha, Neerose; Cahill, Sharon

    2014-01-01

    Despite the wide implications of attachment theory there remains a lack of research exploring interventions which encapsulate the principles of an attachment-based framework in the school context. The aim of this research was to address this gap by implementing an intervention for a group of five primary-aged pupils with identified insecure…

  9. Competition in the economic crisis: Analysis of procurement auctions

    PubMed Central

    Gugler, Klaus; Weichselbaumer, Michael; Zulehner, Christine

    2015-01-01

    We study the effects of the recent economic crisis on firms׳ bidding behavior and markups in sealed bid auctions. Using data from Austrian construction procurements, we estimate bidders׳ construction costs within a private value auction model. We find that markups of all bids submitted decrease by 1.5 percentage points in the recent economic crisis, markups of winning bids decrease by 3.3 percentage points. We also find that without the government stimulus package this decrease would have been larger. These two pieces of evidence point to pro-cyclical markups. PMID:25673884

  10. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  11. 75 FR 16878 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... Rate Securities and Variable Rate Demand Obligations March 26, 2010. Pursuant to Section 19(b)(1) of... Auction Rate Securities (``ARS'') and Variable Rate Demand Obligations (``VRDOs''). The proposed rule change would: (i) Amend Rules G-8, books and records, and G-34(c), variable rate security...

  12. Teaching Auction Strategy Using Experiments Administered Via the Internet

    ERIC Educational Resources Information Center

    Asker, John; Grosskopf, Brit; McKinney, C. Nicholas; Niederle, Muriel; Roth, Alvin E.; Weizsacker, Georg

    2004-01-01

    The authors present an experimental design used to teach concepts in the economics of auctions and implications for e-Business procurement. The experiment is easily administered and can be adapted to many different treatments. The chief innovation is that it does not require the use of a lab or class time. Instead, the design can be implemented on…

  13. Making Marketing Principles Tangible: Online Auctions as Living Case Studies

    ERIC Educational Resources Information Center

    Wood, Charles M.; Suter, Tracy A.

    2004-01-01

    This article presents an effective course supplement for Principles of Marketing classes. An experiential project involving online auctions is offered to instructors seeking to create a more participatory student environment and an interactive teaching style. A number of learning points are illustrated that allow instructors to use an auction…

  14. Understanding Persuasive Online Sales Messages from eBay Auctions

    ERIC Educational Resources Information Center

    White, Barbara Jo; Clapper, Danial; Noel, Rita; Fortier, Jenny; Grabolosa, Pierre

    2007-01-01

    Online auctions are dominated by eBay, which started bringing together buyers and sellers in 1995. eBay product listings can easily be used in business communication courses to better understand online sales messages. One great advantage is that the vast majority of nearly 15 million listings a day are written and assembled by everyday consumers…

  15. 77 FR 57085 - Mobility Fund Phase I Auction; Release of Files with Recalculated Road Miles for Auction 901...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    .../ecfs/ . 1. In the Auction 901 Procedures Public Notice, 77 FR 32092, May 31, 2012, the Bureaus... Notice, 77 FR 7152, February 10, 2012, in calculating the number of road miles associated with each eligible census block, the Bureaus used the sum of linear road miles within the block plus half of the...

  16. A QoS-Enabled Double Auction Protocol for the Service Grid

    NASA Astrophysics Data System (ADS)

    Gao, Zhan; Luo, Siwei

    Traditional double auction protocols only concern the price information of participants without considering their QoS requirements, which makes them unsuitable for the service grid. In this paper we first introduce QoS information into double auction to present the QoS-enabled Double Auction Protocol (QDAP). QDAP tries to assign the asks which have the least candidate bids firstly to make more participants trade and provides QoS guarantee at the same time. Simulation experiments have been performed to compare QDAP with two traditional double auction protocols and the result shows that QDAP is more suitable for the service grid.

  17. Design and Promotion Strategy of Marketing Platform of Aquatic Auction based on Internet

    NASA Astrophysics Data System (ADS)

    Peng, Jianliang

    For the online trade and promotion of aquatic products and related materials through the network between supply and demand, the design content and effective promotional strategies of aquatic auctions online marketing platform is proposed in this paper. Design elements involve the location of customer service, the basic function of the platform including the purchase of general orders, online auctions, information dissemination, and recommendation of fine products, human services, and payment preferences. Based on network and mobile e-commerce transaction support, the auction platform makes the transaction of aquatic products well in advance. The results are important practical value for the design and application of online marketing platform of aquatic auction.

  18. A Large Generator's Bids in an Electricity Supply Auction: Uniform Pricing vs. Pay-as-Bid Pricing

    NASA Astrophysics Data System (ADS)

    Yamamoto, Yoshihiro; Tezuka, Tetsuo

    A pay-as-bid auction has been adopted in a balancing market under New Electricity Trading Arrangements in England and Wales since 2001 instead of a uniform price auction previously used in a day-ahead pool market. In contrast, a spot market in Japan, where a general electric utility would be the main supplier, plans to employ a uniform price auction. In this paper we model an electricity spot market in which one large generator competes with many fringe generators to supply electricity, analyze how this large generator bids to maximize its profits, and report some implication for the design of this market. Three types of auction are analyzed: a highest-winning-bid pricing (HWB) uniform price auction, a lowest-losing-bid pricing (LLB) uniform price auction and a pay-as-bid auction. It is shown that the slope of the bid curve, which is obtained by plotting the large generator's bidding prices against its generation costs, are steeper in an LLB uniform price auction and flatter in a pay-as-bid auction than those in an HWB uniform price auction. This implies that an LLB uniform price auction or a pay-as-bid auction would make room for the fringe generators to win an auction.

  19. Auctions with Dynamic Populations: Efficiency and Revenue Maximization

    NASA Astrophysics Data System (ADS)

    Said, Maher

    We study a stochastic sequential allocation problem with a dynamic population of privately-informed buyers. We characterize the set of efficient allocation rules and show that a dynamic VCG mechanism is both efficient and periodic ex post incentive compatible; we also show that the revenue-maximizing direct mechanism is a pivot mechanism with a reserve price. We then consider sequential ascending auctions in this setting, both with and without a reserve price. We construct equilibrium bidding strategies in this indirect mechanism where bidders reveal their private information in every period, yielding the same outcomes as the direct mechanisms. Thus, the sequential ascending auction is a natural institution for achieving either efficient or optimal outcomes.

  20. Auction-based distributed efficient economic operations of microgrid systems

    NASA Astrophysics Data System (ADS)

    Zou, Suli; Ma, Zhongjing; Liu, Xiangdong

    2014-12-01

    This paper studies the economic operations of the microgrid in a distributed way such that the operational schedule of each of the units, like generators, load units, storage units, etc., in a microgrid system, is implemented by autonomous agents. We apply and generalise the progressive second price (PSP) auction mechanism which was proposed by Lazar and Semret to efficiently allocate the divisible network resources. Considering the economic operation for the microgrid systems, the generators play as sellers to supply energy and the load units play as the buyers to consume energy, while a storage unit, like battery, super capacitor, etc., may transit between buyer and seller, such that it is a buyer when it charges and becomes a seller when it discharges. Furthermore in a connected mode, each individual unit competes against not only the other individual units in the microgrid but also the exogenous main grid possessing fixed electricity price and infinite trade capacity; that is to say, the auctioneer assigns the electricity among all individual units and the main grid with respect to the submitted bid strategies of all individual units in the microgrid in an economic way. Due to these distinct characteristics, the underlying auction games are distinct from those studied in the literature. We show that under mild conditions, the efficient economic operation strategy is a Nash equilibrium (NE) for the PSP auction games, and propose a distributed algorithm under which the system can converge to an NE. We also show that the performance of worst NE can be bounded with respect to the system parameters, say the energy trading price with the main grid, and based upon that, the implemented NE is unique and efficient under some conditions.

  1. Single-Parameter Combinatorial Auctions with Partially Public Valuations

    NASA Astrophysics Data System (ADS)

    Goel, Gagan; Karande, Chinmay; Wang, Lei

    We consider the problem of designing truthful auctions, when the bidders' valuations have a public and a private component. In particular, we consider combinatorial auctions where the valuation of an agent i for a set S of items can be expressed as v i f(S), where v i is a private single parameter of the agent, and the function f is publicly known. Our motivation behind studying this problem is two-fold: (a) Such valuation functions arise naturally in the case of ad-slots in broadcast media such as Television and Radio. For an ad shown in a set S of ad-slots, f(S) is, say, the number of unique viewers reached by the ad, and v i is the valuation per-unique-viewer. (b) From a theoretical point of view, this factorization of the valuation function simplifies the bidding language, and renders the combinatorial auction more amenable to better approximation factors. We present a general technique, based on maximal-in-range mechanisms, that converts any α-approximation non-truthful algorithm (α ≤ 1) for this problem into Ω(α/log{n}) and Ω(α)-approximate truthful mechanisms which run in polynomial time and quasi-polynomial time, respectively.

  2. AUCTION MECHANISMS FOR IMPLEMENTING TRADABLE NETWORK PERMIT MARKETS

    NASA Astrophysics Data System (ADS)

    Wada, Kentaro; Akamatsu, Takashi

    This paper proposes a new auction mechanism for implementing the tradable network permit markets. Assuming that each user makes a trip from an origin to a destination along a path in a specific time period, we design an auction mechanism that enables each user to purchase a bundle of permits corresponding to a set of links in the user's preferred path. The objective of the proposed mechanism is to achieve a socially optimal state with minimal revelation of users' private information. In order to achieve this, the mechanism employs an evolutionary approach that has an auction phase and a path capacity adjustment phase, which are repeated on a day-to-day basis. We prove that the proposed mechanism has the following desirable properties: (1) truthful bidding is the dominant strategy for each user and (2) the proposed mechanism converges to an approximate socially optimal state in the sense that the achieved value of the social surplus reaches its maximum value when the number of users is large.

  3. 78 FR 68839 - Tribal Mobility Fund Phase I Auction Rescheduled for February 25, 2014; Notice of Changes to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ...In this document, the Wireless Telecommunications and Wireline Competition Bureaus (the Bureaus) announce the rescheduling of Auction 902 and revise the dates and deadlines for the filing window for short- form applications and other auction...

  4. 75 FR 8703 - Auction of Lower and Upper Paging Bands Licenses Scheduled for May 25, 2010; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ... Public Notice, 74 FR 67221, December 18, 2009. i. Licenses to be Offered in Auction 87 2. Auction 87 will... Second Report and Order, 71 FR 26245, May 5, 2006, meaning that those preexisting relationships alone... seeking to participate in a Commission auction and select licenses in the same or overlapping markets....

  5. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Display of burley tobacco on auction warehouse floors... § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each lot of burley tobacco displayed for sale on auction warehouse floors shall have a minimum space of...

  6. 75 FR 52793 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ...), 75 FR 16878 (``Original Notice'') (the ``original proposed rule change''). \\4\\ See letters from... Securities Exchange Act Release No. 62550 (July 22, 2010), 75 FR 44296 (``Notice of Amendment No. 1''). II... Made Transparent by the MSRB on Municipal Auction Rate Securities and Variable Rate Demand...

  7. 31 CFR 356.22 - Does the Treasury have any limitations on auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Does the Treasury have any limitations on auction awards? 356.22 Section 356.22 Money and Finance: Treasury Regulations Relating to Money..., PUBLIC DEBT SERIES NO. 1-93) Determination of Auction Awards; Settlement § 356.22 Does the Treasury...

  8. Sold! The Elementary Classroom Auction as Learning Tool of Communication and Economics

    ERIC Educational Resources Information Center

    Boyd, Josh; Boyd, Gina

    2014-01-01

    An auction, though an economic tool, is essentially a performance dependent on communication (Smith, 1989). The auctioneer dictates the pace, asks for bids, and acknowledges responses; the enterprise is controlled by a voice (Boyce, 2001). Bidders must listen and respond strategically to the communication of the people around them. An auction…

  9. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285.220 What auction format may MMS use... renewable energy leases and will use one of the following auction formats, as determined through the...

  10. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined...

  11. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285... competitive auctions to award renewable energy leases and will use one of the following auction formats,...

  12. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined...

  13. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  14. 75 FR 57947 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ...; Comment Sought on Competitive Bidding Procedures for Auction 90 AGENCY: Federal Communications Commission... scheduled to commence on February 15, 2011 (Auction 90). This document also seeks comment on competitive... the fair and efficient conduct of competitive bidding. In such cases, the Bureaus, in their...

  15. Are Structural Estimates of Auction Models Reasonable? Evidence from Experimental Data

    ERIC Educational Resources Information Center

    Bajari, Patrick; Hortacsu, Ali

    2005-01-01

    Recently, economists have developed methods for structural estimation of auction models. Many researchers object to these methods because they find the strict rationality assumptions to be implausible. Using bid data from first-price auction experiments, we estimate four alternative structural models: (1) risk-neutral Bayes-Nash, (2) risk-averse…

  16. 29 CFR 780.619 - Work “in connection with” livestock auction operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Work âin connection withâ livestock auction operations. 780... FAIR LABOR STANDARDS ACT Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.619 Work “in connection with” livestock...

  17. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  18. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  19. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  20. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  1. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  2. 77 FR 15369 - Mobility Fund Phase I Auction GIS Data of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... COMMISSION Mobility Fund Phase I Auction GIS Data of Potentially Eligible Census Blocks AGENCY: Federal... information system (GIS) data for the census blocks potentially eligible for Mobility Fund Phase I support to...-0432 (TTY). SUPPLEMENTARY INFORMATION: This is a summary of the Mobility Fund Phase I Auction GIS...

  3. 77 FR 38061 - Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... Notice, 77 FR 32092, May 31, 2012, the Bureaus provided general instructions for completing FCC Form 180... COMMISSION Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information AGENCY... provide other information regarding Auction 901. DATES: Short-Form applications are due prior to 6 p.m....

  4. Teaching Marginal Cost, Supply, and Efficiency with an English-Auction Experiment.

    ERIC Educational Resources Information Center

    Bernard, John C.; Schulze, William

    2000-01-01

    Describes a computerized English-auction experiment that helps students to understand marginal cost and its interrelationships with supply and the efficiency of competitive markets. Explains that the English auction is in a market where there are many sellers (students) and one buyer (computer). States that this exercise offers a good introduction…

  5. Pricing strategies, the strength of bidding intentions, and online auction performance: a cross-cultural study.

    PubMed

    Peng, Yu-Shu; Jan, Lih-Tsyr

    2009-10-01

    Over the past decade, electronic markets based on the Internet, particularly online auctions, have become popular venues for conducting business. Previous studies often focused on the construction of the best bidding model, while few studies have tried to integrate multiple pricing strategies to predict the probability of closing an auction and the price premium. This study constructs a mediated model to examine the relationship among pricing strategies, the strength of bidding intentions, and online auction performance. The sample consists of 1,055 auctions of iPod MP3 players from eBay Web sites in Hong Kong, Singapore, Belgium, and France. Empirical results show that the pricing strategies directly influence both the probability of closing an auction and the level of price premium. The pricing strategies also indirectly influence the price premium through the mediating effect of the strength of bidding intentions. PMID:19817564

  6. Multiagent model and mean field theory of complex auction dynamics

    NASA Astrophysics Data System (ADS)

    Chen, Qinghua; Huang, Zi-Gang; Wang, Yougui; Lai, Ying-Cheng

    2015-09-01

    Recent years have witnessed a growing interest in analyzing a variety of socio-economic phenomena using methods from statistical and nonlinear physics. We study a class of complex systems arising from economics, the lowest unique bid auction (LUBA) systems, which is a recently emerged class of online auction game systems. Through analyzing large, empirical data sets of LUBA, we identify a general feature of the bid price distribution: an inverted J-shaped function with exponential decay in the large bid price region. To account for the distribution, we propose a multi-agent model in which each agent bids stochastically in the field of winner’s attractiveness, and develop a theoretical framework to obtain analytic solutions of the model based on mean field analysis. The theory produces bid-price distributions that are in excellent agreement with those from the real data. Our model and theory capture the essential features of human behaviors in the competitive environment as exemplified by LUBA, and may provide significant quantitative insights into complex socio-economic phenomena.

  7. Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets

    NASA Astrophysics Data System (ADS)

    Toft, I. E.; Bagnall, A. J.

    This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent Small Increment (SI). ZI-C agents submit random but profitable bids/offers and cause high volatility in prices and individual trader performance. Our new zero-intelligence agent, SI, makes small random adjustments to the outstanding bid/offer and hence is more cautious than ZI-C. We present results for SI in self-play and then analyse Kaplan in volatile and stable markets. We demonstrate that the non-adaptive Kaplan sniper can be configured to suit either market conditions, but no single configuration is performs well across both market types. We believe that in a dynamic auction environment where current or future market conditions cannot be predicted a viable sniping strategy should adapt its behaviour to suit prevailing market conditions. To this end, we propose the Adaptive Sniper (AS) agent for the CDA. AS traders classify sniping opportunities using a statistical model of market activity and adjust their classification thresholds using a Widrow-Hoff adapted search. Our AS agent requires little configuration, and outperforms the original Kaplan sniper in volatile and stable markets, and in a mixed trader type scenario that includes adaptive strategies from the literature.

  8. Analysis of Residential Demand Response and Double-Auction Markets

    SciTech Connect

    Fuller, Jason C.; Schneider, Kevin P.; Chassin, David P.

    2011-10-10

    Demand response and dynamic pricing programs are expected to play increasing roles in the modern Smart Grid environment. While direct load control of end-use loads has existed for decades, price driven response programs are only beginning to be explored at the distribution level. These programs utilize a price signal as a means to control demand. Active markets allow customers to respond to fluctuations in wholesale electrical costs, but may not allow the utility to control demand. Transactive markets, utilizing distributed controllers and a centralized auction can be used to create an interactive system which can limit demand at key times on a distribution system, decreasing congestion. With the current proliferation of computing and communication resources, the ability now exists to create transactive demand response programs at the residential level. With the combination of automated bidding and response strategies coupled with education programs and customer response, emerging demand response programs have the ability to reduce utility demand and congestion in a more controlled manner. This paper will explore the effects of a residential double-auction market, utilizing transactive controllers, on the operation of an electric power distribution system.

  9. Impacts of climate and land use change on ecosystem hydrology and net primary productivity: Linking water availability to food security in Asia

    NASA Astrophysics Data System (ADS)

    Dangal, S. R. S.; Tian, H.; Pan, S.; Zhang, B.; Yang, J.

    2015-12-01

    The nexus approach to food, water and energy security in Asia is extremely important and relevant as the region has to feed two-third of the world's population and accounts for 59% of the global water consumption. The distribution pattern of food, water and energy resources have been shaped by the legacy effect of both natural and anthropogenic disturbances and therefore are vulnerable to climate change and human activities including land use/cover change (LUCC) and land management (irrigation and nitrogen fertilization). In this study, we used the Dynamic Land Ecosystem Model (DLEM) to examine the effects of climate change, land use/cover change, and land management practices (irrigation and nitrogen fertilization) on the spatiotemporal trends and variability in water availability and its role in limiting net primary productivity (NPP) and food security in the 20th and early 21st centuries. Our specific objectives are to quantify how climate change, LUCC and other environmental changes have interactively affected carbon and water dynamics across the Asian region. In particular, we separated the Asian region into several sub-region based on the primary limiting factor - water, food and energy. We then quantified how changes in environmental factors have altered the water and food resources during the past century. We particularly focused on Net Primary Productivity (NPP) and water cycle (Evapotranspiration, discharge, and runoff) as a measure of available food and water resources, respectively while understanding the linkage between food and water resources in Asia.

  10. 75 FR 74719 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-01

    ... Auction 90 Comment Public Notice 75 FR 59747, September 23, 2010. i. Background 2. The Media Bureau... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS... 90 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces...

  11. Bid distribution derived from consistent mixed strategy in lowest unique bid auction

    NASA Astrophysics Data System (ADS)

    Zhao, Yinan; Chen, Qinghua; Wang, Yougui

    2014-12-01

    The Lowest Unique Bid Auction (LUBA) booms recently through the Internet. A typical distribution pattern of bid price in this reverse auction has been found and needs to be interpreted. The distribution curve is a decreasing one whose slope has a close relationship with the number of agents participating in the auction. To explain this stylized fact, we develop a model assuming that agents prefer to bid on the price at which the probability of winning is higher. The bid distributions of actual auctions with the number of agents less than 200 can be fitted very well using the parameters for the value of items and the number of bids. When this number becomes larger, however, a deviation occurs between prediction and empirical data, which can be adjusted by introducing cognitive illusion of the bid number.

  12. Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus

    NASA Astrophysics Data System (ADS)

    Dong, Naipeng; Jonker, Hugo; Pang, Jun

    We formally study two privacy-type properties for online auction protocols: bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied π calculus. We analyse the receipt-free auction protocol by Abe and Suzuki. Bidding-price-secrecy of the protocol is verified using ProVerif, whereas receipt-freeness of the protocol is proved manually.

  13. Modeling and simulation of a double auction artificial financial market

    NASA Astrophysics Data System (ADS)

    Raberto, Marco; Cincotti, Silvano

    2005-09-01

    We present a double-auction artificial financial market populated by heterogeneous agents who trade one risky asset in exchange for cash. Agents issue random orders subject to budget constraints. The limit prices of orders may depend on past market volatility. Limit orders are stored in the book whereas market orders give immediate birth to transactions. We show that fat tails and volatility clustering are recovered by means of very simple assumptions. We also investigate two important stylized facts of the limit order book, i.e., the distribution of waiting times between two consecutive transactions and the instantaneous price impact function. We show both theoretically and through simulations that if the order waiting times are exponentially distributed, even trading waiting times are also exponentially distributed.

  14. Understanding Financial Market States Using an Artificial Double Auction Market

    PubMed Central

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  15. Understanding Financial Market States Using an Artificial Double Auction Market.

    PubMed

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  16. Green Auctions and Reduction of Information Rents in Payments for Environmental Services: An Experimental Investigation in Sunan County, Northwestern China

    PubMed Central

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the “Grain for Green” Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. “Perfect information” in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions. PMID:25793263

  17. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    PubMed

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions. PMID:25793263

  18. Thoraco-pelvic orthosis: a portable and removable bassinet for secure patient immobilization after primary bladder exstrophy closure.

    PubMed

    Castagnetti, Marco; Berrettini, Alfredo; Beniamin, Francesco; Rigamonti, Waifro

    2010-12-01

    A portable and removable thoraco-pelvic orthosis for patient immobilization after neonatal primary bladder exstrophy closure is described. The device is made of a polyethylene shell, moulded at 170°C, coated inside with a 5 mm pad of plastazote and works applying a constant gentle pressure on the hips. PMID:20857296

  19. 75 FR 44296 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... Exchange Act Release No. 61793 (March 26, 2010), 75 FR 16878 (April 2, 2010) (File No. SR-MSRB-2010-02). \\4... on Municipal Auction Rate Securities and Variable Rate Demand Obligations July 22, 2010. On March 10...'') and Variable Rate Demand Obligations (``VRDOs''). The proposed rule change was published for...

  20. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    PubMed

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions. PMID:15152854

  1. A Bayesian formulation for auction-based task allocation in heterogeneous multi-agent teams

    NASA Astrophysics Data System (ADS)

    Pippin, Charles E.; Christensen, Henrik

    2011-06-01

    In distributed, heterogeneous, multi-agent teams, agents may have different capabilities and types of sensors. Agents in dynamic environments will need to cooperate in real-time to perform tasks with minimal costs. Some example scenarios include dynamic allocation of UAV and UGV robot teams to possible hurricane survivor locations, search and rescue and target detection. Auction based algorithms scale well because agents generally only need to communicate bid information. In addition, the agents are able to perform their computations in parallel and can operate on local information. Furthermore, it is easy to integrate humans and other vehicle types and sensor combinations into an auction framework. However, standard auction mechanisms do not explicitly consider sensors with varying reliability. The agents sensor qualities should be explicitly accounted. Consider a scenario with multiple agents, each carrying a single sensor. The tasks in this case are to simply visit a location and detect a target. The sensors are of varying quality, with some having a higher probability of target detection. The agents themselves may have different capabilities, as well. The agents use knowledge of their environment to submit cost-based bids for performing each task and an auction is used to perform the task allocation. This paper discusses techniques for including a Bayesian formulation of target detection likelihood into this auction based framework for performing task allocation across multi-agent heterogeneous teams. Analysis and results of experiments with multiple air systems performing distributed target detection are also included.

  2. Competitive bidding for health insurance contracts: lessons from the online HMO auctions.

    PubMed

    Gupta, Alok; Parente, Stephen T; Sanyal, Pallab

    2012-12-01

    Healthcare is an important social and economic component of modern society, and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise, competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly, government agencies. In this paper, we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year, i.e., 1999, they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment, effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge, and data from the auctions, we point out several shortcomings of the auction design that, we believe, led to the discontinuation of the market after three years. Based on our analysis, we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance. PMID:23224233

  3. 76 FR 76174 - Request for Information on the State of the Offshore Renewable Energy Industry-Auction Format...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-06

    ...BOEM invites public comment on a proposed set of auction formats which may be used to issue commercial renewable energy leases on the Outer Continental Shelf (OCS). BOEM is examining several auction formats, each designed to efficiently issue renewable energy leases to those who value them most and are best positioned to develop them, while also ensuring that the government receives a fair......

  4. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Display of burley tobacco on auction warehouse floors... COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each...

  5. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Display of burley tobacco on auction warehouse floors... COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each...

  6. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Display of baled flue-cured tobacco on auction... AGRICULTURE COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated...

  7. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Display of baled flue-cured tobacco on auction... AGRICULTURE COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated...

  8. 77 FR 60690 - Auction of FM Broadcast Construction Permits Scheduled for March 26, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... Competitive Bidding Procedures for Auction 94 AGENCY: Federal Communications Commission. ACTION: Notice... commence on March 26, 2013. This document also seeks comment on competitive bidding procedures for Auction... that FM allotment will be awarded by competitive bidding procedures. Once mutual exclusivity exists...

  9. 76 FR 1158 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ... COMMISSION Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive... comment on competitive bidding procedures for Auction 92. DATES: Comments are due on or before January 12... the fair and efficient conduct of competitive bidding. In such cases, the Bureau, in its...

  10. 78 FR 11179 - Auction of Lower and Upper Paging Bands Licenses Scheduled for July 16, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... Competitive Bidding Procedures for Auction 95 AGENCY: Federal Communications Commission. ACTION: Notice... July 16, 2013. This document also seeks comment on competitive bidding procedures for Auction 95. DATES... any other reason that affects the fair and efficient conduct of competitive bidding. The Bureau...

  11. 75 FR 61752 - Auction of FM Broadcast Construction Permits Scheduled for March 29, 2011; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Competitive Bidding Procedures for Auction 91 AGENCY: Federal Communications Commission. ACTION: Notice... March 29, 2011 (Auction 91). This document also seeks comment on competitive bidding procedures for... the construction permit for that FM allotment will be awarded by competitive bidding procedures....

  12. 78 FR 21355 - Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ..., 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28, 2011. Auction 902 will award one-time... Mobility Fund Phase I, 77 FR 14012. Petitions for designation as an ETC should be filed in WC Docket No. 09... COMMISSION Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

  13. 77 FR 11115 - Mobility Fund Phase I Auction Limited Extension of Deadlines for Comments and Reply Comments on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... released the Auction 901 Comment Public Notice, 77 FR 7152, February 10, 2012, which seeks comment on... Commission in the USF/ICC Transformation Order, 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28... COMMISSION Mobility Fund Phase I Auction Limited Extension of Deadlines for Comments and Reply Comments...

  14. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... authorizations awarded in the Commission BRS auctions commencing prior to January 1, 2004. (f)...

  15. Electronic Reverse Auctions: Integrating an E-Sourcing Tool into a Sales and Purchasing Cross-Course Negotiation Project

    ERIC Educational Resources Information Center

    Williams, Jacqueline A.; Dobie, Kathryn

    2011-01-01

    Electronic reverse auctions are increasingly being used by firms to improve firm financial and operational performance. The described teaching innovation serves as a model for introducing electronic reverse auctions as a central element in a comprehensive negotiation exercise involving sales management and purchasing management students. Results…

  16. 75 FR 56533 - Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... COMMISSION Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz... document announces the postponement of Auction 89. FOR FURTHER INFORMATION CONTACT: Wireless... related documents are also available on the Internet at the Commission's Web site:...

  17. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... warehouse floors in designated markets. 29.75b Section 29.75b Agriculture Regulations of the Department of... Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated markets. Each lot of baled flue-cured tobacco displayed for sale on auction warehouse floors shall have...

  18. Physical contact influences how much people pay at celebrity auctions.

    PubMed

    Newman, George E; Bloom, Paul

    2014-03-11

    Contagion is a form of magical thinking in which people believe that a person's immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people's expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  19. Physical contact influences how much people pay at celebrity auctions

    PubMed Central

    Newman, George E.; Bloom, Paul

    2014-01-01

    Contagion is a form of magical thinking in which people believe that a person’s immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people’s expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  20. Bidding process in online auctions and winning strategy: Rate equation approach

    NASA Astrophysics Data System (ADS)

    Yang, I.; Kahng, B.

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the t th bidding progresses, called the k -frequent bidder, seems to scale as nk(t)˜tk-2.4 . The successfully transmitted bidding rate by the k -frequent bidder is likely to scale as qk(t)˜k-1.4 , independent of t for large t . This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction.

  1. The value of victory: social origins of the winner's curse in common value auctions

    PubMed Central

    van den Bos, Wouter; Li, Jian; Lau, Tatiana; Maskin, Eric; Cohen, Jonathan D.; Montague, P. Read; McClure, Samuel M.

    2009-01-01

    Auctions, normally considered as devices facilitating trade, also provide a way to probe mechanisms governing one's valuation of some good or action. One of the most intriguing phenomena in auction behavior is the winner's curse — the strong tendency of participants to bid more than rational agent theory prescribes, often at a significant loss. The prevailing explanation suggests that humans have limited cognitive abilities that make estimating the correct bid difficult, if not impossible. Using a series of auction structures, we found that bidding approaches rational agent predictions when participants compete against a computer. However, the winner's curse appears when participants compete against other humans, even when cognitive demands for the correct bidding strategy are removed. These results suggest the humans assign significant future value to victories over human but not over computer opponents even though such victories may incur immediate losses, and that this valuation anomaly is the origin of apparently irrational behavior. PMID:20305741

  2. Bidding process in online auctions and winning strategy: Rate equation approach.

    PubMed

    Yang, I; Kahng, B

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the tth bidding progresses, called the k-frequent bidder, seems to scale as n(k)(t) approximately tk(-2.4). The successfully transmitted bidding rate by the k-frequent bidder is likely to scale as q(k)(t) approximately k(-1.4), independent of t for large t. This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction. PMID:16907028

  3. Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets

    NASA Astrophysics Data System (ADS)

    Deng, Xiaotie; Sun, Yang; Yin, Ming; Zhou, Yunhong

    In this paper, we study pricing models for multi-slot advertisements, where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage, called the multi-slot AD auction problem. We develop and analyze several important mechanisms, including the VCG mechanism for multi-slot ads auction, the optimal social welfare solution, as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore, we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.

  4. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Does the Treasury have any discretion... CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) Miscellaneous Provisions § 356.33 Does the Treasury have any discretion in the auction process? (a) We have the discretion to: (1) Accept, reject, or refuse to...

  5. See Art History in a New Light: Have an Art Auction

    ERIC Educational Resources Information Center

    Benter, Doris J.

    2008-01-01

    At Portledge School in Locust Valley, New York, ninth graders in their upper school study art history for one semester. The visual arts department has created a vigorous new syllabus culminating in an hour-long mock art auction. The department selects several art movements (e.g., Post-Impressionism, Cubism, Abstract Expressionism, Social Realism,…

  6. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  7. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  8. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  9. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  10. Teaching Undergraduate Money and Banking: T-Bill Auctions and Stock Market Models

    ERIC Educational Resources Information Center

    Saros, Daniel E.

    2009-01-01

    The author offers innovative approaches to 3 topics that are typically only briefly mentioned (if at all) in money and banking courses. The first topic is a Treasury bill auction experiment in which students have an opportunity to participate directly. The results from a class of 14 money and banking students are used to explain how an instructor…

  11. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 2 2012-07-01 2012-07-01 false What auction format may BOEM use in a lease sale? 585.220 Section 585.220 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy...

  12. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    NASA Astrophysics Data System (ADS)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  13. 40 CFR 97.421 - Recordation of TR NOX Annual allowance allocations and auction results.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Recordation of TR NOX Annual allowance... TRADING PROGRAMS TR NOX Annual Trading Program § 97.421 Recordation of TR NOX Annual allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR NOX...

  14. 40 CFR 97.421 - Recordation of TR NOX Annual allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR NOX Annual allowance... TRADING PROGRAMS TR NOX Annual Trading Program § 97.421 Recordation of TR NOX Annual allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR NOX...

  15. 40 CFR 97.421 - Recordation of TR NOX Annual allowance allocations and auction results.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Recordation of TR NOX Annual allowance... TRADING PROGRAMS TR NOX Annual Trading Program § 97.421 Recordation of TR NOX Annual allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR NOX...

  16. On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values

    NASA Astrophysics Data System (ADS)

    Constantin, Florin; Parkes, David C.

    In a dynamic market, being able to update one's value based on information available to other bidders currently in the market can be critical to having profitable transactions. This is nicely captured by the model of interdependent values (IDV): a bidder's value can explicitly depend on the private information of other bidders. In this paper we present preliminary results about the revenue properties of dynamic auctions for IDV bidders. We adopt a computational approach to design single-item revenue-optimal dynamic auctions with known arrivals and departures but (private) signals that arrive online. In leveraging a characterization of truthful auctions, we present a mixed-integer programming formulation of the design problem. Although a discretization is imposed on bidder signals the solution is a mechanism applicable to continuous signals. The formulation size grows exponentially in the dependence of bidders' values on other bidders' signals. We highlight general properties of revenue-optimal dynamic auctions in a simple parametrized example and study the sensitivity of prices and revenue to model parameters.

  17. 47 CFR 27.604 - Limitation on licenses won at auction.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Limitation on licenses won at auction. 27.604 Section 27.604 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Guard Band A and B Blocks (757-758/787-788 MHz and...

  18. Design Implications of Real-Time Feedback in Continuous Combinatorial Auctions: An Experimental Investigation

    ERIC Educational Resources Information Center

    Sanyal, Pallab

    2009-01-01

    Information Technology (IT) has spawned the growth of novel and innovative market mechanisms (such as online auctions) and associated businesses (such as eBay and Priceline) that were not feasible without the capabilities and reach of these modern information technologies. Previous studies on designing trading mechanisms for online markets…

  19. 49 CFR Appendix F to Part 599 - Salvage Auction Cerification Form

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Salvage Auction Cerification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  20. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  1. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  2. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Direct, you may submit bids by using one of our approved methods, e.g., computer, automated telephone... telephone call to designated Treasury employees if you submit them prior to the relevant bidding deadline... was mailed prior to the auction date. (3) If you are submitting a bid by computer or...

  3. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Direct, you may submit bids by using one of our approved methods, e.g., computer, automated telephone... telephone call to designated Treasury employees if you submit them prior to the relevant bidding deadline... was mailed prior to the auction date. (3) If you are submitting a bid by computer or...

  4. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Direct, you may submit bids by using one of our approved methods, e.g., computer, automated telephone... telephone call to designated Treasury employees if you submit them prior to the relevant bidding deadline... it was mailed prior to the auction date. (3) If you are submitting a bid by computer or...

  5. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  6. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  7. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  8. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  9. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION...

  10. 77 FR 9655 - Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ..., 77 FR 7152, February 10, 2012, comments are due on or before February 24, 2012. Reply comments are... Public Notice, 77 FR 7152, February 10, 2012, all filings in response to the notice must refer to AU... program requirements in the Auction 901 (Mobility Fund Phase I) Comment Public Notice, 77 FR...

  11. Reciprocity in Online Markets: Empirical Studies of Auction and Barter Markets

    ERIC Educational Resources Information Center

    Ye, Shun

    2013-01-01

    My dissertation seeks to understand how reciprocity affects transaction outcomes and mechanism design in online markets. The first essay examines negative reciprocity illustrated as feedback-revoking behavior in the eBay auction market, focusing on its impact and implications for reputation system design. I utilize the biggest policy change of…

  12. Comparisons of auction mechanisms in a multiple unit setting: A consideration for restructuring electric power markets

    NASA Astrophysics Data System (ADS)

    Bernard, John Charles

    The objective of this study was to compare the performance of five single sided auctions that could be used in restructured electric power markets across different market sizes in a multiple unit setting. Auction selection would profoundly influence an industry over $200 billion in size in the United States, and the consequences of implementing an inappropriate mechanism would be great. Experimental methods were selected to analyze the auctions. Two rounds of experiments were conducted, the first testing the sealed offer last accepted offer (LAO) and first rejected offer (FRO), and the clock English (ENG) and sealed offer English (SOE) in markets of sizes two and six. The FRO, SOE, and ENG used the same pricing rule. Second round testing was on the LAO, FRO, and the nonuniform price multiple unit Vickrey (MUV) in markets of sizes two, four, and six. Experiments lasted 23 and 75 periods for rounds 1 and 2 respectively. Analysis of variance and contrast analysis were used to examine the data. The four performance measures used were price, efficiency, profits per unit, and supply revelation. Five basic principles were also assessed: no sales at losses, all low cost capacity should be offered and sold, no high cost capacity should sell, and the market should clear. It was expected group size and auction type would affect performance. For all performance measures, group size was a significant variable, with smaller groups showing poorer performance. Auction type was significant only for the efficiency performance measure, where clock auctions outperformed the others. Clock auctions also proved superior for the first four principles. The FRO performed poorly in almost all situations, and should not be a preferred mechanism in any market. The ENG was highly efficient, but expensive for the buyer. The SOE appeared superior to the FRO and ENG. The clock improves efficiency over the FRO while less information kept prices under the ENG. The MUV was superior in revealing costs

  13. A Highly Secure Mobile Agent System Architecture

    NASA Astrophysics Data System (ADS)

    Okataku, Yasukuni; Okutomi, Hidetoshi; Yoshioka, Nobukazu; Ohgishi, Nobuyuki; Honiden, Shinichi

    We propose a system architecture for mobile agents to improve their security in the environments of insecure networks and non-sophisticated terminals such as PDAs. As mobile agents freely migrate onto their favorite terminals through insecure networks or terminals, it is not appropriate for them to store some secret information for authentication and encryption/decryption. We introduce one and more secure nodes(OASIS NODE) for securely generating and verifying authentication codes. The each agent’s data are encrypted by a pseudo-chaos cipher mechanism which doesn’t need any floating processing co-processor. We’ve constructed a prototype system on a Java mobile agent framework, “Bee-gent" which implements the proposed authentication and cipher mechanisms, and evaluated their performances and their applicability to business fields such as an auction system by mobile agents.

  14. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction.

    PubMed

    Nezarat, Amin; Dastghaibifard, G H

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer's utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider. PMID:26431035

  15. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    PubMed

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided. PMID:21332721

  16. 78 FR 72081 - Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS... Competitive Bidding Procedures for Auction 84 AGENCY: Federal Communications Commission. ACTION: Notice... the instructions for submitting comments. Federal Communications Commission's Web site:...

  17. 9 CFR 3.113 - Primary enclosures used to transport marine mammals.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... marine mammals. 3.113 Section 3.113 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION..., Treatment, and Transportation of Marine Mammals Transportation Standards § 3.113 Primary enclosures used to transport marine mammals. No dealer, research facility, exhibitor, or operator of an auction sale...

  18. 9 CFR 3.113 - Primary enclosures used to transport marine mammals.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... marine mammals. 3.113 Section 3.113 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION..., Treatment, and Transportation of Marine Mammals Transportation Standards § 3.113 Primary enclosures used to transport marine mammals. No dealer, research facility, exhibitor, or operator of an auction sale...

  19. 9 CFR 3.113 - Primary enclosures used to transport marine mammals.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... marine mammals. 3.113 Section 3.113 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION..., Treatment, and Transportation of Marine Mammals Transportation Standards § 3.113 Primary enclosures used to transport marine mammals. No dealer, research facility, exhibitor, or operator of an auction sale...

  20. 9 CFR 3.113 - Primary enclosures used to transport marine mammals.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... marine mammals. 3.113 Section 3.113 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION..., Treatment, and Transportation of Marine Mammals Transportation Standards § 3.113 Primary enclosures used to transport marine mammals. No dealer, research facility, exhibitor, or operator of an auction sale...

  1. 9 CFR 3.113 - Primary enclosures used to transport marine mammals.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... marine mammals. 3.113 Section 3.113 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION..., Treatment, and Transportation of Marine Mammals Transportation Standards § 3.113 Primary enclosures used to transport marine mammals. No dealer, research facility, exhibitor, or operator of an auction sale...

  2. A Supplier Bidding Strategy Through Q-Learning Algorithm in Electricity Auction Markets

    NASA Astrophysics Data System (ADS)

    Xiong, Gaofeng; Hashiyama, Tomonori; Okuma, Shigeru

    One of the most important issues for power suppliers in the deregulated electric industry is how to bid into the electricity auction market to satisfy their profit-maximizing goals. Based on the Q-Learning algorithm, this paper presents a novel supplier bidding strategy to maximize supplier’s profit in the long run. In this approach, the supplier bidding strategy is viewed as a kind of stochastic optimal control problem and each supplier can learn from experience. A competitive day-ahead electricity auction market with hourly bids is assumed here, where no supplier possesses the market power. The dynamics and the incomplete information of the market are considered. The impacts of suppliers’ strategic bidding on the market price are analyzed under uniform pricing rule and discriminatory pricing rule. Agent-based simulations are presented. The simulation results show the feasibility of the proposed bidding strategy.

  3. A Q-Learning-Based Supplier Bidding Strategy in Electricity Auction Market

    NASA Astrophysics Data System (ADS)

    Xiong, Gaofeng; Hashiyama, Tomonori; Okuma, Shigeru

    One of the most important issues for power suppliers in the deregulated electric industry is how to bid into the electricity auction market to satisfy their profit-maximizing goals. Based on the Q-Learning algorithm, this paper presents a novel supplier bidding strategy to maximize supplier’s profit in the long run. In this approach, the supplier bidding strategy is viewed as one kind of stochastic optimal control problem and each supplier can learn from experience. A competitive day-ahead electricity auction market with hourly bids is assumed here, where no supplier possesses the market power and all suppliers winning the market are paid based on their own bid prices. The dynamics and the incomplete information of the market are considered. The impact of suppliers’ strategic bidding on the market price is analyzed. Agent-based simulations are presented. The simulation results show the feasibility of the proposed bidding strategy.

  4. Using Priced Options to Solve the Exposure Problem in Sequential Auctions

    NASA Astrophysics Data System (ADS)

    Mous, Lonneke; Robu, Valentin; La Poutré, Han

    This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face when participating in multiple, sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers, who have the choice of either selling their good directly or through a priced option, after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show, for a setting where the competition is formed by local bidders, that using options can increase the expected profit for both buyers and sellers. Furthermore, we derive the equations that provide minimum and maximum bounds between which a synergy buyer's bids should fall in order for both sides to have an incentive to use the options mechanism. Next, we perform an experimental analysis of a market in which multiple synergy bidders are active simultaneously.

  5. Equilibrium Strategy and Population-Size Effects in Lowest Unique Bid Auctions

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Bernhardsson, Sebastian; Juul, Jeppe; Galster, Gorm; Vivo, Pierpaolo

    2012-02-01

    In lowest unique bid auctions, N players bid for an item. The winner is whoever places the lowest bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large data set of internet auctions. The theory agrees with the data with striking accuracy for small population-size N, while for larger N a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.

  6. Collective induction without cooperation? Learning and knowledge transfer in cooperative groups and competitive auctions.

    PubMed

    Maciejovsky, Boris; Budescu, David V

    2007-05-01

    There is strong evidence that groups perform better than individuals do on intellective tasks with demonstrably correct solutions. Typically, these studies assume that group members share common goals. The authors extend this line of research by replacing standard face-to-face group interactions with competitive auctions, allowing for conflicting individual incentives. In a series of studies involving the well-known Wason selection task, they demonstrate that competitive auctions induce learning effects equally impressive as those of standard group interactions, and they uncover specific and general knowledge transfers from these institutions to new reasoning problems. The authors identify payoff feedback and information pooling as the driving factors underlying these findings, and they explain these factors within the theoretical framework of collective induction. PMID:17484609

  7. Biased Random-Key Genetic Algorithms for the Winner Determination Problem in Combinatorial Auctions.

    PubMed

    de Andrade, Carlos Eduardo; Toso, Rodrigo Franco; Resende, Mauricio G C; Miyazawa, Flávio Keidi

    2015-01-01

    In this paper we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions. PMID:25299242

  8. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction

    PubMed Central

    Nezarat, Amin; Dastghaibifard, GH

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer’s utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider. PMID:26431035

  9. A Centralized Auction Mechanism for the Disability and Survivors Insurance in Chile

    NASA Astrophysics Data System (ADS)

    Reyes H., Gonzalo

    As part of the pension reform recently approved in Chile, the government introduced a centralized auction mechanism to provide the Disability and Survivors (D&S) Insurance that covers recent contributors among the more than 8 million participants in the mandatory private pension system. This paper is intended as a case study presenting the main distortions found in the decentralized operation of the system that led to this reform and the challenges faced when designing a competitive auction mechanism to be implemented jointly by the Pension Fund Managers (AFP). In a typical bilateral contract the AFP retained much of the risk and the Insurance Company acted in practice as a reinsurer. The process to hire this contract was not competitive and colligated companies ended up providing the service. Several distortions affected competition in the market through incentives to cream-skim members by AFPs (since they bear most of the risk) or efforts to block disability claims. Since the price of this insurance is hidden in the fees charged by AFPs for the administration of individual accounts and pension funds there was lack of price transparency. Since new AFPs have no history of members’ disability and mortality profile the insurance contract acted as a barrier to entry in the market of AFP services, especially when D&S insurance costs reached 50% of total costs. Cross-subsidies between members of the same AFP, inefficient risk pooling (due to pooling occurring at the AFP rather than at the system level) and regulatory arbitrage, since AFPs provided insurance not being regulated as an insurance company, were also present. A centralized auction mechanism solves these market failures, but also gives raise to new challenges, such as how to design a competitive auction that attracts participation and deters collusion. Design features that were incorporated in the regulation to tackle these issues, such as dividing coverage into predefined percentage blocks, are presented

  10. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How are bids submitted in an auction? 356.11 Section 356.11 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS...

  11. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  12. 78 FR 45524 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    .... SUMMARY: This document announces the intention to hold an auction of H Block licenses in the 1915-1920 and...) announces its intention to hold an auction of licenses in the 1915-1920 MHz (Lower H Block) and 1995-2000... with the bidders' need to study round results and adjust their bidding strategies. Under this...

  13. 75 FR 32773 - Auction of 218-219 MHz Service and Phase II 220 MHz Service Licenses Scheduled for December 7...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... certain portions of the electromagnetic spectrum or provide service to certain areas in their geographic..., Auctions and Spectrum Access Division: For auction legal questions: Sayuri Rajapakse at (202) 418-0660; for... 89 will include a total of 1,868 licenses. These include licenses for spectrum not previously...

  14. The impact of product information and trials on demand for smokeless tobacco and cigarettes: Evidence from experimental auctions

    PubMed Central

    Rousu, Matthew C.; O'Connor, Richard; Thrasher, James F; June, Kristie; Bansal-Travers, Maansi; Pitcavage, James

    2014-01-01

    Introduction Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. Methods In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers’ preferences. Auctions were conducted between November 2010-November 2011. Results We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with Pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. Conclusions These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. PMID:24321456

  15. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  16. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  17. A Winner Determination Algorithm for Combinatorial Auctions Based on Hybrid Artificial Fish Swarm Algorithm

    NASA Astrophysics Data System (ADS)

    Zheng, Genrang; Lin, ZhengChun

    The problem of winner determination in combinatorial auctions is a hotspot electronic business, and a NP hard problem. A Hybrid Artificial Fish Swarm Algorithm(HAFSA), which is combined with First Suite Heuristic Algorithm (FSHA) and Artificial Fish Swarm Algorithm (AFSA), is proposed to solve the problem after probing it base on the theories of AFSA. Experiment results show that the HAFSA is a rapidly and efficient algorithm for The problem of winner determining. Compared with Ant colony Optimization Algorithm, it has a good performance with broad and prosperous application.

  18. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  19. Bidding Heuristics for Simultaneous Auctions: Lessons from TAC Travel

    NASA Astrophysics Data System (ADS)

    Greenwald, Amy; Naroditskiy, Victor; Lee, Seong Jae

    We undertake an experimental study of heuristics designed for the Travel division of the Trading Agent Competition. Our primary goal is to analyze the performance of the sample average approximation (SAA) heuristic, which is approximately optimal in the decision-theoretic (DT) setting, in this game-theoretic (GT) setting. To this end, we conduct experiments in four settings, three DT and one GT. The relevant distinction between the DT and the GT settings is: in the DT settings, agents' strategies do not affect the distribution of prices. Because of this distinction, the DT experiments are easier to analyze than the GT experiments. Moreover, settings with normally distributed prices, and controlled noise, are easier to analyze than those with competitive equilibrium prices. In the studied domain, analysis of the DT settings with possibly noisy normally distributed prices informs our analysis of the richer DT and GT settings with competitive equilibrium prices. In future work, we plan to investigate whether this experimental methodology - namely, transferring knowledge gained in a DT setting with noisy signals to a GT setting - can be applied to analyze heuristics for playing other complex games.

  20. Secure Sensor Platform

    Energy Science and Technology Software Center (ESTSC)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  1. 78 FR 2260 - Auction of FM Broadcast Construction Permits Rescheduled for April 23, 2013; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-10

    ... parties submitted seven comments in response to the Auction 94 Comment Public Notice, 77 FR 60690, October... interest is non- voting. 53. In the Diversity Order, 73 FR 28400, May 16, 2008, the Commission relaxed the... From the Federal Register Online via the Government Publishing Office FEDERAL...

  2. 75 FR 28278 - Notice of amendment to Notice of Realty Action: Competitive Online Auction of Public Lands in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ..., 2009 (74 FR 46790), to add additional terms and conditions to the sale process. DATES: Interested... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR...: 14X5232] Notice of amendment to Notice of Realty Action: Competitive Online Auction of Public Lands...

  3. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS...

  4. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS...

  5. 75 FR 38545 - Notice of Realty Action: Competitive Auction of Public Lands in White Pine County, NV

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...: 14X5232] Notice of Realty Action: Competitive Auction of Public Lands in White Pine County, NV AGENCY... Management (BLM) proposes to offer one parcel of public land of approximately 2.5 acres in White Pine County... proposed sale of public lands until August 16, 2010. If the BLM decision is to proceed with the sale,...

  6. 40 CFR 97.721 - Recordation of TR SO2 Group 2 allowance allocations and auction results.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Recordation of TR SO2 Group 2... SO2 TRADING PROGRAMS TR SO2 Group 2 Trading Program § 97.721 Recordation of TR SO2 Group 2 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  7. 40 CFR 97.621 - Recordation of TR SO2 Group 1 allowance allocations and auction results.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Recordation of TR SO2 Group 1... SO2 TRADING PROGRAMS TR SO2 Group 1 Trading Program § 97.621 Recordation of TR SO2 Group 1 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  8. 40 CFR 97.721 - Recordation of TR SO2 Group 2 allowance allocations and auction results.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Recordation of TR SO2 Group 2... SO2 TRADING PROGRAMS TR SO2 Group 2 Trading Program § 97.721 Recordation of TR SO2 Group 2 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  9. 40 CFR 97.621 - Recordation of TR SO2 Group 1 allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR SO2 Group 1... SO2 TRADING PROGRAMS TR SO2 Group 1 Trading Program § 97.621 Recordation of TR SO2 Group 1 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  10. 40 CFR 97.621 - Recordation of TR SO2 Group 1 allowance allocations and auction results.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 22 2012-07-01 2012-07-01 false Recordation of TR SO2 Group 1... SO2 TRADING PROGRAMS TR SO2 Group 1 Trading Program § 97.621 Recordation of TR SO2 Group 1 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  11. 40 CFR 97.721 - Recordation of TR SO2 Group 2 allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR SO2 Group 2... SO2 TRADING PROGRAMS TR SO2 Group 2 Trading Program § 97.721 Recordation of TR SO2 Group 2 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  12. 76 FR 60830 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... Competitive Bidding Procedures for Auction 93 AGENCY: Federal Communications Commission. ACTION: Notice... commence on March 27, 2012. This document also seeks comment on competitive bidding procedures for this... that FM allotment will be awarded by competitive bidding procedures. Once mutual exclusivity exists...

  13. 78 FR 50086 - Notice of Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... Bureau of Land Management Notice of Competitive Auction for Solar Energy Development on Public Lands in... applicant to submit a right-of-way (ROW) application and a plan of development for solar energy projects on... solicitations of interest and ROW applications within two designated Solar Energy Zones (SEZ): Los Mogotes...

  14. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... areas in installments over a ten (10) year period running from the date that their BTA...

  15. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... areas in installments over a ten (10) year period running from the date that their BTA...

  16. 75 FR 22792 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-30

    ... comments and one reply comment in response to the Auction 88 Comment Public Notice, 75 FR 8070, Feb. 23... are also reminded that, by the New Entrant Bidding Credit Reconsideration Order, 64 FR 44856, Aug. 18..., even if such an interest is non-voting. 40. In the Diversity Order, 73 FR 28361, May 16, 2008,...

  17. 76 FR 21350 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Notice and Filing Requirements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ..., 2011, 76 FR 1158. One party submitted comments in response to the Auction 92 Comment Public Notice, and... agreements with any individual entity for the lease or resale (including under a wholesale agreement) of, on... assignments, transfers of control, spectrum leases, or other reportable eligibility events. Rather, in...

  18. 78 FR 56875 - Tribal Mobility Fund Phase I Auction Rescheduled for December 19, 2013; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... service support through reverse competitive bidding. The USF/ICC Transformation Order, 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28, 2011, established the Mobility Fund as a universal service... program details. On March 29, 2013, the Bureaus released the Auction 902 Comment Public Notice, 78...

  19. 76 FR 3892 - Auction of FM Broadcast Construction Permits Rescheduled for April 27, 2011; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Notice, 75 FR 61752, October 6, 2010, and two entities submitted filings by the reply comment deadline. i... auctions. J. Noncommercial Educational Status Election 66. In the NCE Second Report and Order, 68 FR 26220... From the Federal Register Online via the Government Publishing Office FEDERAL...

  20. 76 FR 78645 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-19

    ... (collectively, the Bureaus) released the Auction 93 Comment Public Notice, 76 FR 60830, September 30, 2011... applicant, even if such an interest is non-voting. 54. In the Diversity Order, 73 FR 28400, May 16, 2008... From the Federal Register Online via the Government Publishing Office ] FEDERAL...

  1. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY...

  2. Reputation mechanism: From resolution for truthful online auctions to the model of optimal one-gambler problem

    SciTech Connect

    Bradonjic, Milan

    2009-01-01

    In this paper we study reputation mechanisms, and show how the notion of reputation can help us in building truthful online auction mechanisms. From the mechanism design prospective, we derive the conditions on and design a truthful online auction mechanism. Moreover, in the case when some agents may lay or cannot have the real knowledge about the other agents reputations, we derive the resolution of the auction, such that the mechanism is truthful. Consequently, we move forward to the optimal one-gambler/one-seller problem, and explain how that problem is refinement of the previously discussed online auction design in the presence of reputation mechanism. In the setting of the optimal one-gambler problem, we naturally rise and solve the specific question: What is an agent's optimal strategy, in order to maximize his revenue? We would like to stress that our analysis goes beyond the scope, which game theory usually discusses under the notion of reputation. We model one-player games, by introducing a new parameter (reputation), which helps us in predicting the agent's behavior, in real-world situations, such as, behavior of a gambler, real-estate dealer, etc.

  3. 77 FR 22575 - The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-16

    ... From the Federal Register Online via the Government Publishing Office FEDERAL MARITIME COMMISSION The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation and Its Port of Homer; Notice of Filing of Complaint and Assignment Notice is given that a complaint has been filed with the Federal Maritime Commission...

  4. Human remains sold to the highest bidder! A snapshot of the buying and selling of human skeletal remains on eBay, an Internet auction site.

    PubMed

    Huxley, Angie K; Finnegan, Michael

    2004-01-01

    Internet auction sites have become increasingly popular, with diverse items up for sale to the public worldwide. The purposes of this paper are to inform the forensic community that human skeletal remains, old and new, are for sale on the eBay internet auction site, and to advise forensic scientists that eBay does not use a forensic anthropologist to assess photographs of these materials. Over the last few years, this website was "surfed," with numerous auctions during this period. After contacting eBay by email, representatives responded that they adhere to Native American Grave Protection and Repatriation Act (NAGPRA) and that their website indicates that auctions must state that sale of human remains is for instructional purposes only. Based on the photographs, the remains appear to be of prehistoric and modern origin. An unfortunate consequence of such sale may generate interest in stealing remains from graves, mortuaries, hospitals, or county morgues worldwide. PMID:14979339

  5. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    PubMed

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology. PMID:24735210

  6. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  7. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  8. The remote security station (RSS)

    SciTech Connect

    Pletta, J.B. )

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform.

  9. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  10. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  11. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  12. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  13. Reverse Auction: A Potential Strategy for Reduction of Pharmacological Therapy Cost

    PubMed Central

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-01-01

    Background Polypharmacy is a significant economic burden. Objective We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. Methods We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. Results The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. Conclusion RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment. PMID:26200898

  14. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets

    PubMed Central

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  15. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    PubMed Central

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  16. Learning Based Bidding Strategy for HVAC Systems in Double Auction Retail Energy Markets

    SciTech Connect

    Sun, Yannan; Somani, Abhishek; Carroll, Thomas E.

    2015-07-01

    In this paper, a bidding strategy is proposed using reinforcement learning for HVAC systems in a double auction market. The bidding strategy does not require a specific model-based representation of behavior, i.e., a functional form to translate indoor house temperatures into bid prices. The results from reinforcement learning based approach are compared with the HVAC bidding approach used in the AEP gridSMART® smart grid demonstration project and it is shown that the model-free (learning based) approach tracks well the results from the model-based behavior. Successful use of model-free approaches to represent device-level economic behavior may help develop similar approaches to represent behavior of more complex devices or groups of diverse devices, such as in a building. Distributed control requires an understanding of decision making processes of intelligent agents so that appropriate mechanisms may be developed to control and coordinate their responses, and model-free approaches to represent behavior will be extremely useful in that quest.

  17. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores.

    PubMed

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  18. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets.

    PubMed

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  19. Estimating the impact of different cigarette package warning label policies: the auction method.

    PubMed

    Thrasher, James F; Rousu, Matthew C; Anaya-Ocampo, Rafael; Reynales-Shigematsu, Luz Myriam; Arillo-Santillán, Edna; Hernández-Avila, Mauricio

    2007-12-01

    The study estimated the reduction in demand associated with implementing cigarette package warning labels that contain imagery illustrating the consequences of smoking. The experimental auction method was used, wherein adult smokers in Mexico (n=89) placed separate bids on two packs of cigarettes: one with a text-only warning label and the other with a warning label that included text and a graphic image. Differences in the values attributed to each pack were assessed using t-tests and multivariate regression. The pack with the graphic image had a mean attributed value which was 17% lower ($3.21 pesos) than the pack with the text-only warning, and this difference remained statistically significant within subgroups defined by sociodemographics, amount of smoking, number of quit attempts, and levels of perceived smoking risks. In the multivariate model, the difference in attributed values was greater among females than males, but no such differences were found for other sociodemographic or smoking-related variables. The consistently lower value that smokers attributed to cigarette packages with the graphic warning label indicates that these labels are likely to reduce cigarette demand. PMID:17630221

  20. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  1. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  2. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  3. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  4. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  5. Factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions in 2005.

    PubMed

    Barham, B L; Troxel, T R

    2007-12-01

    Data were collected from 15 Arkansas livestock auctions to determine factors affecting selling price. Data included how calves were sold (single or groups), sex, breed or breed type, color, muscle thickness, horn status, frame score, fill, body condition, age, health, BW, and price. Data were randomly collected on 52,401 lots consisting of 105,542 calves. Selling prices for steers ($124.20 +/- 0.07), bulls ($117.93 +/- 0.12), and heifers ($112.81 +/- 0.07) were different from each other (P <0.001). Hereford x Charolais feeder calves sold for the highest price ($122.66 +/- 0.14) and Longhorns sold for the lowest price ($74.52 +/- 0.46). Yellow feeder cattle received the highest selling price ($96.47 +/- 0.12), and spotted or striped feeder cattle received the lowest price ($83.84 +/- 0.23). The selling price of singles was lower than the price for calves sold in groups of 6 or more ($117.26 +/- 0.06 vs. $122.61 +/- 0.21; P <0.001). For cattle classified as having muscle scores of 1, 2, 3, and 4, selling prices were $120.45 +/- 0.05, $111.31 +/- 0.09, $96.28 +/- 0.44, and $82.21 +/- 1.87, respectively. Polled feeder cattle sold for $118.57 +/- 0.05, and horned feeder cattle sold for $114.87 +/- 0.14 (P <0.001). Interactions (P <0.001) were detected between frame score and BW groups, and muscle score and BW groups on the selling price of cattle. A number of management and genetic factors affected the selling price of feeder cattle. PMID:17709785

  6. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  7. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  8. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  9. A revealed preference approach to estimating supply curves for ecosystem services: use of auctions to set payments for soil erosion control in Indonesia.

    PubMed

    Jack, B Kelsey; Leimona, Beria; Ferraro, Paul J

    2009-04-01

    To supply ecosystem services, private landholders incur costs. Knowledge of these costs is critical for the design of conservation-payment programs. Estimating these costs accurately is difficult because the minimum acceptable payment to a potential supplier is private information. We describe how an auction of payment contracts can be designed to elicit this information during the design phase of a conservation-payment program. With an estimate of the ecosystem-service supply curve from a pilot auction, conservation planners can explore the financial, ecological, and socioeconomic consequences of alternative scaled-up programs. We demonstrate the potential of our approach in Indonesia, where soil erosion on coffee farms generates downstream ecological and economic costs. Bid data from a small-scale, uniform-price auction for soil-conservation contracts allowed estimates of the costs of a scaled-up program, the gain from integrating biophysical and economic data to target contracts, and the trade-offs between poverty alleviation and supply of ecosystem services. Our study illustrates an auction-based approach to revealing private information about the costs of supplying ecosystem services. Such information can improve the design of programs devised to protect and enhance ecosystem services. PMID:18983597

  10. 78 FR 65982 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands Rescheduled for January...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... Comment Public Notice, 78 FR 45524, July 29, 2013. B. Description of Licenses To Be Offered in Auction 96 4. In the H Block Report and Order, 78 FR 50213, August 16, 2013, the Commission concluded that... From the Federal Register Online via the Government Publishing Office FEDERAL...

  11. A Virtual Field Trip to the Real World of Cap and Trade: Environmental Economics and the EPA SO[subscript 2] Allowance Auction

    ERIC Educational Resources Information Center

    Lewis, Lynne Y.

    2011-01-01

    In the spring of 2001, Bates College Environmental Economics classes bought their first sulfur dioxide emissions allowance at U.S. Environmental Protection Agency's annual auction, then conducted by the Chicago Board of Trade. In the spring of 2010, they bought their 22nd through 34th allowances. This article describes a three-part method for…

  12. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  13. Nuclear security

    SciTech Connect

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  14. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  15. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration When I fly can I bring my... ... to know if you could bring through the security checkpoint. Main menu Administrator Travel Security Screening Special ...

  17. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts. PMID:22592944

  18. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  19. Responses to the advanced notice of proposed rulemaking EPA published on June 6, 1996 regarding changes to the EPA allowance auctions and elimination of the direct sale

    SciTech Connect

    Critchfield, L.R.

    1997-12-31

    On June 6, 1996, EPA`s Acid Rain Program published an advance notice of proposed rulemaking (ANPRM) in the Federal Register seeking comment on: (1) whether to change the design of the annual sulfur dioxide (SO{sub 2}) allowance auctions; (2) whether to change the timing of the allowance auctions; (3) whether to change the requirement that the minimum price of offered allowances must be in whole dollars, and (4) whether EPA should propose the ability to submit allowance transfers electronically. EPA also published on that day a proposed and direct final rule on whether to eliminate the direct sale. This paper documents the issues addressed in the ANPRM, the comments EPA received, and EPA`s responses to those comments. EPA received comments from 14 separate commenters.

  20. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    PubMed

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p < 0.05). Significantly more parents in the 4 menu conditions providing calories were able to correctly identify the Happy Meal with the highest calories (p < 0.0001) and significantly more parents in the 2 conditions providing sodium information were able to correctly identify the Happy Meal with the highest sodium content (p < 0.0001). Menus disclosing both calories and sodium information may reduce demand for fast-food kids' meals and better support parents in making more informed and healthier food choices for their children. PMID:27317971

  1. Encouraging stormwater management using a reverse auction: potential to restore stream ecosystems

    EPA Science Inventory

    Stormwater runoff is the primary mechanism by which urbanizing landscapes disrupt natural, stream ecosystems. Source control management has been demonstrated as an effective and cost-efficient method for reducing stormwater runoff; however, sufficiently widespread implementation...

  2. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  3. Examining the relationship between psychosocial and behavioral proxies for future consumption behavior: self-reported impact and bidding behavior in an experimental auction study on cigarette labeling

    PubMed Central

    Rousu, Matthew C.; Thrasher, James F.

    2014-01-01

    Experimental and observational research often involves asking consumers to self-report the impact of some proposed option. Because self-reported responses involve no consequence to the respondent for falsely revealing how he or she feels about an issue, self-reports may be subject to social desirability and other influences that bias responses in important ways. In this article, we analyzed data from an experiment on the impact of cigarette packaging and pack warnings, comparing smokers’ self-reported impact (four-item scale) and the bids they placed in experimental auctions to estimate differences in demand. The results were consistent across methods; however, the estimated effect size associated with different warning labels was two times greater for the four-item self-reported response scale when compared to the change in demand as indicated by auction bids. Our study provides evidence that self-reported psychosocial responses provide a valid proxy for behavioral change as reflected by experimental auction bidding behavior. More research is needed to better understand the advantages and disadvantages of behavioral economic methods and traditional self-report approaches to evaluating health behavior change interventions. PMID:24399267

  4. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. Syphilis - primary

    MedlinePlus

    Primary syphilis; Secondary syphilis; Late syphilis; Tertiary syphilis ... Syphilis is a sexually transmitted, infectious disease caused by the spirochete bacterium Treponema pallidum . This bacterium causes ...

  6. Computer security engineering management

    SciTech Connect

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system.

  7. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  10. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area....

  12. Poisson-process generalization for the trading waiting-time distribution in a double-auction mechanism

    NASA Astrophysics Data System (ADS)

    Cincotti, Silvano; Ponta, Linda; Raberto, Marco; Scalas, Enrico

    2005-05-01

    In this paper, empirical analyses and computational experiments are presented on high-frequency data for a double-auction (book) market. Main objective of the paper is to generalize the order waiting time process in order to properly model such empirical evidences. The empirical study is performed on the best bid and best ask data of 7 U.S. financial markets, for 30-stock time series. In particular, statistical properties of trading waiting times have been analyzed and quality of fits is evaluated by suitable statistical tests, i.e., comparing empirical distributions with theoretical models. Starting from the statistical studies on real data, attention has been focused on the reproducibility of such results in an artificial market. The computational experiments have been performed within the Genoa Artificial Stock Market. In the market model, heterogeneous agents trade one risky asset in exchange for cash. Agents have zero intelligence and issue random limit or market orders depending on their budget constraints. The price is cleared by means of a limit order book. The order generation is modelled with a renewal process. Based on empirical trading estimation, the distribution of waiting times between two consecutive orders is modelled by a mixture of exponential processes. Results show that the empirical waiting-time distribution can be considered as a generalization of a Poisson process. Moreover, the renewal process can approximate real data and implementation on the artificial stocks market can reproduce the trading activity in a realistic way.

  13. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  14. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  15. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  16. Primary thrombocythemia

    MedlinePlus

    ... in which the bone marrow produces too many platelets. Platelets are a part of the blood that aids ... Primary thrombocythemia is caused by the overproduction of platelets. If untreated, this condition gets worse over time. ...

  17. Healthcare is primary.

    PubMed

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2(nd) National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on "healthcare" in India. The theme of this conference was "Healthcare is Primary." The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the "general health system" instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, "family medicine" (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation. PMID:26985402

  18. SAS: A Secure Aglet Server

    SciTech Connect

    Jean, Evens; Jiao, Yu; Hurson, Ali R.; Potok, Thomas E

    2007-01-01

    Despite the fact that mobile agents have received increasing attention in various research efforts, the use of the paradigm in practical applications has yet to fully emerge. With the presence of infrastructure to support the development of mobile agent applications, security concerns act as the primary deterrent against such trends. Numerous studies have been conducted to address the security issues of mobile agents with a strong focus on the theoretical aspect of the problem. This work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We herein propose several mechanisms, stemming from theoretical advancements, intended to protect both agents and hosts in order to foster the development of business applications that fully exploit the benefits of agent technology. The proposed mechanisms lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. We demonstrate our contribution through application scenarios of a prototyped Information Retrieval system.

  19. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  20. Primary hyperparathyroidism

    PubMed Central

    Madkhali, Tarıq; Alhefdhi, Amal; Chen, Herbert; Elfenbein, Dawn

    2016-01-01

    Primary hyperparathyroidism is a common endocrine disorder caused by overactivation of parathyroid glands resulting in excessive release of parathyroid hormone. The resultant hypercalcemia leads to a myriad of symptoms. Primary hyperparathyroidism may increase a patient’s morbidity and even mortality if left untreated. During the last few decades, disease presentation has shifted from the classic presentation of severe bone and kidney manifestations to most patients now being diagnosed on routine labs. Although surgery is the only curative therapy, many advances have been made over the past decades in the diagnosis and the surgical management of primary hyperparathyroidism. The aim of this review is to summarize the characteristics of the disease, the work up, and the treatment options. PMID:26985167

  1. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders. PMID:17907609

  2. Department of Homeland Security

    MedlinePlus

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... Requested Pages TSA Pre✓® Active Shooter Preparedness Hometown Security Countering Violent Extremism Forms Combating Human Trafficking Taking ...

  3. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  4. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  5. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  6. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  7. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  8. Making Schools More Secure.

    ERIC Educational Resources Information Center

    Grealy, Joseph I.

    The president of the National Association of School Security Directors, citing many specific incidents of school vandalism and personal assault and battery, states that the safety and security of school personnel and facilities are necessary requirements for effective education. The author's approach to a school security program is to determine…

  9. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  10. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  11. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  12. Primary hyperparathyroidism

    PubMed Central

    Pallan, Shelley; Khan, Aliya

    2011-01-01

    Abstract Objective To discuss the presentation, diagnosis, and management of primary hyperparathyroidism (PHPT) in family medicine. Quality of evidence MEDLINE was searched from 2002 to 2009 using the terms presentation, diagnosis, and treatment of PHPT. Proceedings and guidelines from the Third International Workshop on Primary Hyperparathyroidism in May 2008 were reviewed in detail. Most studies offered level II and III evidence, although there were a number of single randomized controlled trials on PHPT (level I evidence). References from pertinent papers were also searched for relevant articles. Articles most relevant to family medicine and primary care practitioners are presented. Main message Primary hyperparathyroidism is the most common cause of hypercalcemia in outpatients. In the Western world, most patients with PHPT present with nonspecific symptoms such as fatigue, mood disturbances, and cognitive impairments. Diagnosis is established when intact parathyroid hormone levels are elevated or at the high end of the normal range in the setting of elevated total or ionized calcium levels (following exclusion of conditions that can mimic PHPT). Criteria for surgery have recently been modified. Surgery is always a suitable option in those with symptomatic PHPT and no contraindications. Those with contraindications or with asymptomatic PHPT not meeting the criteria for surgery can generally be safely monitored and considered for medical management. This might include treatment with bisphosphonates, hormone replacement therapy, raloxifene, or calcimimetic agents; however, there are currently no fracture data for any of these options. Conclusion The definitive therapy for symptomatic and asymptomatic PHPT is parathyroidectomy. In patients with asymptomatic PHPT not meeting the criteria for surgery, monitoring is safe and medical management designed to target skeletal protection or lower serum calcium is a suitable option. PMID:21321169

  13. 31 CFR 363.22 - Who has the right to conduct online transactions in book-entry securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transaction in a security held in the primary owner's TreasuryDirect account. (See § 363.20(e)). (ii) If the primary owner has given the secondary owner the right to conduct transactions in a security, and has not revoked that right, then the secondary owner can conduct transactions in the security. Transactions...

  14. 31 CFR 363.22 - Who has the right to conduct online transactions in book-entry securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... transaction in a security held in the primary owner's TreasuryDirect account. (See § 363.20(e)). (ii) If the primary owner has given the secondary owner the right to conduct transactions in a security, and has not revoked that right, then the secondary owner can conduct transactions in the security. Transactions...

  15. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  16. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  17. Balancing Security and Learning. School Security Supplement.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Discusses ways to provide vital safety to schools without inhibiting the learning environment for students. Describes security efforts at Orange County, Florida schools, such as using video cameras, school police officers, and access-control systems. (EV)

  18. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  19. Enhanced performance PIR security sensors

    NASA Astrophysics Data System (ADS)

    Liddiard, Kevin C.

    2008-04-01

    Previous presentations to this forum have described a new technology initiative for low cost passive IR security sensors based on novel microbolometer FPA design, low cost optics and simplified packaging. The primary objective of this initiative is to develop a smart (intelligent) security sensor having a number of improvements over current pyroelectric PIR sensors, including imaging. However the same core technology can also be employed for an enhanced performance PIR sensor in the form of a upgrade retrofit for current sensors. This paper addresses the latter initiative. The enhanced performance PIR upgrade sensor has two significant advantages over current technology: extended detection range and ability to detect developing fire or equipment failure. It may thus be seen as an IR fire detection device complementing other sensors whilst having an extended range for human detection. It does not have the full capability of the smart security sensor, but has the advantages of simplicity and low cost short term development. Performance is described for a 4 x 4 FPA designed specifically for this application.

  20. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. PACS image security server

    NASA Astrophysics Data System (ADS)

    Cao, Fei; Huang, H. K.

    2004-04-01

    Medical image security in a PACS environment has become a pressing issue as communications of images increasingly extends over open networks, and hospitals are currently hard-pushed by Health Insurance Portability and Accountability Act (HIPAA) to be HIPPA complaint for ensuring health data security. Other security-related guidelines and technical standards continue bringing to the public attention in healthcare. However, there is not an infrastructure or systematic method to implement and deploy these standards in a PACS. In this paper, we first review DICOM Part15 standard for secure communications of medical images and the HIPAA impacts on PACS security, as well as our previous works on image security. Then we outline a security infrastructure in a HIPAA mandated PACS environment using a dedicated PACS image security server. The server manages its own database of all image security information. It acts as an image Authority for checking and certificating the image origin and integrity upon request by a user, as a secure DICOM gateway to the outside connections and meanwhile also as a PACS operation monitor for HIPAA supporting information.

  2. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security. PMID:24707753

  3. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  4. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  5. The CSCE forum for security cooperation

    SciTech Connect

    Borawski, J.; George, B.

    1993-10-01

    What are the next steps for arms control in Europe, given the tectonic changes that have shaken the continent over the past four years? Negotiators in Europe, who labored for nearly two decades on the details of conventional force reductions and confidence-building measures, are grappling with that question. On September 22, 1992, a fresh, if perhaps belated, attempt to adapt to the new conditions of the post-Cold War era began in Vienna with the creation of the 54-member Forum for Security Cooperation (FSC). The FSC is the security component of the multifaceted Conference on Security and Cooperation in Europe (CSCEO), which deals with a range of issues, including human rights, in addition to the various items on the security agenda. The forum is facing a task unprecedented in the scope of the CSCE: it is simultaneously trying to address arms control negotiations, security enhancement and cooperation, and conflict prevention. The primary objective of the forum will be to adapt the traditional tools of arms control, including those applied to military activity, to the contemporary {open_quotes}security parlance{close_quotes} of preventive diplomacy, peacemaking, peacekeeping, peace enforcement and peace building.

  6. Primary hyperparathyroidism.

    PubMed

    Bilezikian, John P; Cusano, Natalie E; Khan, Aliya A; Liu, Jian-Min; Marcocci, Claudio; Bandeira, Francisco

    2016-01-01

    Primary hyperparathyroidism (PHPT) is a common disorder in which parathyroid hormone (PTH) is excessively secreted from one or more of the four parathyroid glands. A single benign parathyroid adenoma is the cause in most people. However, multiglandular disease is not rare and is typically seen in familial PHPT syndromes. The genetics of PHPT is usually monoclonal when a single gland is involved and polyclonal when multiglandular disease is present. The genes that have been implicated in PHPT include proto-oncogenes and tumour-suppressor genes. Hypercalcaemia is the biochemical hallmark of PHPT. Usually, the concentration of PTH is frankly increased but can remain within the normal range, which is abnormal in the setting of hypercalcaemia. Normocalcaemic PHPT, a variant in which the serum calcium level is persistently normal but PTH levels are increased in the absence of an obvious inciting stimulus, is now recognized. The clinical presentation of PHPT varies from asymptomatic disease (seen in countries where biochemical screening is routine) to classic symptomatic disease in which renal and/or skeletal complications are observed. Management guidelines have recently been revised to help the clinician to decide on the merits of a parathyroidectomy or a non-surgical course. This Primer covers these areas with particular attention to the epidemiology, clinical presentations, genetics, evaluation and guidelines for the management of PHPT. PMID:27194212

  7. Primary Hyperparathyroidism

    PubMed Central

    Bandeira, Leonardo; Bilezikian, John

    2016-01-01

    Over the past several generations, primary hyperparathyroidism (PHTP) has undergone a change in its clinical presentation in many countries from a symptomatic disease to an asymptomatic one. The reasons for this change in clinical presentation are related to the widespread use of biochemical screening tests, to the measurement of PTH more routinely in the evaluation of metabolic bone disease and to the status of vitamin D sufficiency in the population. Along with recognition of a broader clinical spectrum of disease, including a more recently recognized normocalcemic variant, has come an appreciation that the evaluation of classic target organs that can be affected in PHPT, such as the skeleton and the kidneys, require more advanced imaging technology for complete evaluation. It is clear that even in asymptomatic patients, evidence for microstructural disease in the skeleton and calcifications in the kidneys can be demonstrated often. Potential non-classical manifestations of PHPT related to neurocognition and the cardiovascular system continue to be of interest. As a result of these advances, revised guidelines for the management of asymptomatic PHPT have been recently published to help the clinician determine whether surgery is appropriate or whether a more conservative approach is acceptable.

  8. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  9. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  12. Center for computer security: Computer Security Group conference. Summary

    SciTech Connect

    Not Available

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  13. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  14. Attachment and culture. Security in the United States and Japan.

    PubMed

    Rothbaum, F; Weisz, J; Pott, M; Miyake, K; Morelli, G

    2000-10-01

    Attachment theorists maintain that cultural differences are relatively minor, and they focus on universals. Here the authors highlight evidence of cultural variations and note ways in which attachment theory is laden with Western values and meaning. Comparisons of the United States and Japan highlight the cultural relativity of 3 core hypotheses of attachment theory: that caregiver sensitivity leads to secure attachment, that secure attachment leads to later social competence, and that children who are securely attached use the primary caregiver as a secure base for exploring the external world. Attachment theorists use measures of sensitivity, competence, and secure base that are biased toward Western ways of thinking: The measures emphasize the child's autonomy, individuation, and exploration. In Japan, sensitivity, competence, and secure base are viewed very differently, calling into question the universality of fundamental tenets of attachment theory. The authors call for an indigenous approach to the psychology of attachment. PMID:11080829

  15. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  16. Public key infrastructure for DOE security research

    SciTech Connect

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  17. Comparing the 2000 and 2005 factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions.

    PubMed

    Troxel, T R; Barham, B L

    2007-12-01

    The objectives of the study were to determine how factors affecting the selling price of feeder calves changed from 2000 to 2005 and to examine the perception that discounts narrow or even disappear as calf supplies decrease and selling prices increase. Data from weekly Arkansas livestock auctions were collected from January 1 to December 31 in 2000 and 2005. Data included calf sex, breed type, color, muscle score, horn status, frame score, fill, condition, health, and BW. Mean selling prices for 2000 and 2005 were $92.91 +/- 15.05 and $118.32 +/- 15.13 (mean +/- SD; $/45.45 kg), respectively. Individual price observations were subtracted from the respective annual means and became the dependent variable. The selling prices for feeder calves sold in groups of 2 to 5 calves and in groups of >/= 6 calves were greater in 2005 than 2000 (P < 0.001). Steers received a greater premium ($6.48 +/- 0.09 vs. $6.02 +/- 0.08; mean +/- SE) and bull calves received greater discounts ($0.30 +/- 0.14 vs. $1.68 +/- 0.09) in 2005 than in 2000. Breeds types that increased in value from 2000 to 2005 were Angus x Hereford, Angus, Angus x Charolais, and Brahman (P < 0.001). Breed types that received a reduced selling price in 2005 compared with 2000 (P < 0.001) were one-fourth Brahman Cross, Charolais, Charolais x Limousin, Hereford x Limousin, Limousin, Limousin x one-fourth Brahman, Longhorn, Saler and Simmental. Yellow-white face, black-white face, black, and gray feeder calves received an increase in selling price from 2000 to 2005 (P < 0.001). Although fewer horned feeder calves were sold in 2005 (P < 0.01), they received greater discounts in 2005 than 2000 (-$2.86 +/- 0.16 and -$0.51 +/- 0.09; P < 0.001). In 2005, large-framed feeder calves did not receive the premium detected in 2000, but medium-framed feeder calves in 2005 received a greater selling price compared with 2000. Feeder calves with a muscle score of 1 received a greater premium in 2005 compared with 2000 ($2.58 +/- 0

  18. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  19. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  20. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  1. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  2. Water Security Toolkit

    Energy Science and Technology Software Center (ESTSC)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  3. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  4. School Security, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    This supplement, a collaboration of "American School & University" and "Access Control & Security Systems Integration" magazines, presents four articles examining equipment and management strategies to ensure school safety. "School Security by the Numbers" (Joe Agron; Larry Anderson) defines the parameters and quantifies the trend in the school…

  5. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  6. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  7. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  8. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  9. CIOs Uncensored: Security Smarts.

    SciTech Connect

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  10. Primary immunodeficiency

    PubMed Central

    2011-01-01

    Primary immunodeficiency disorder (PID) refers to a heterogeneous group of over 130 disorders that result from defects in immune system development and/or function. PIDs are broadly classified as disorders of adaptive immunity (i.e., T-cell, B-cell or combined immunodeficiencies) or of innate immunity (e.g., phagocyte and complement disorders). Although the clinical manifestations of PIDs are highly variable, most disorders involve at least an increased susceptibility to infection. Early diagnosis and treatment are imperative for preventing significant disease-associated morbidity and, therefore, consultation with a clinical immunologist is essential. PIDs should be suspected in patients with: recurrent sinus or ear infections or pneumonias within a 1 year period; failure to thrive; poor response to prolonged use of antibiotics; persistent thrush or skin abscesses; or a family history of PID. Patients with multiple autoimmune diseases should also be evaluated. Diagnostic testing often involves lymphocyte proliferation assays, flow cytometry, measurement of serum immunoglobulin (Ig) levels, assessment of serum specific antibody titers in response to vaccine antigens, neutrophil function assays, stimulation assays for cytokine responses, and complement studies. The treatment of PIDs is complex and generally requires both supportive and definitive strategies. Ig replacement therapy is the mainstay of therapy for B-cell disorders, and is also an important supportive treatment for many patients with combined immunodeficiency disorders. The heterogeneous group of disorders involving the T-cell arm of the adaptive system, such as severe combined immunodeficiency (SCID), require immune reconstitution as soon as possible. The treatment of innate immunodeficiency disorders varies depending on the type of defect, but may involve antifungal and antibiotic prophylaxis, cytokine replacement, vaccinations and bone marrow transplantation. This article provides a detailed overview

  11. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  12. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  13. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  15. "Objective" Science at Auction.

    ERIC Educational Resources Information Center

    Mokhiber, Russell

    1998-01-01

    Discusses a report published by the Center for Public Integrity (CPI) entitled Toxic Deception: How the Chemical Industry Manipulates Science, Bends the Law, and Endangers Your Health. Voices concerns that the federal regulatory system receives favors from the chemical industry that create bias. (PVD)

  16. 76 FR 39884 - Aviation Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... SECURITY Aviation Security Advisory Committee AGENCY: Transportation Security Administration, DHS. ACTION... Security Administration (TSA) announces the re-establishment of the Aviation Security Advisory Committee (ASAC). The Secretary of Homeland Security has determined that the re- establishment of ASAC...

  17. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  18. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented. PMID:12507263

  19. School feeding, school reform, and food security: connecting the dots.

    PubMed

    Levinger, Beryl

    2005-06-01

    Universal access to basic education is a prerequisite for long-term food security, which, in turn, is critical to achieving the Millennium Development goals. This paper examines how Food for Education interventions can contribute to improved food security, improved education outcomes, and a broader set of development goals. Food for Education entails the distribution of food commodities to children who attend school. The commodities may be locally grown and purchased or contributed by aid donors. The food may be consumed by students in school snack, breakfast, or lunch programs. Alternatively, it may be given as a take-home ration for consumption by a family that regularly sends "at-risk" children (usually girls) to school. Four interrelated ideas are discussed: (1) the universalization of primary school education is a prerequisite for food security (defined here as availability of, access to, and proper biologic utilization of food supplies); (2) Food for Education boosts primary school participation and, therefore, food security; (3) the effects of primary school education on food security are greatest wherever "quality standards" are met, although important effects are present even when education quality is modest; and (4) efforts to improve primary education participation (demand) and efforts to improve primary education quality (supply) are highly interrelated and mutually reinforcing. Food for Education is a versatile resource that can be used to address a broad range of issues related to both education supply and demand. To be effective, Food for Education interventions must reflect local education supply and demand realities. PMID:16075566

  20. Food security and population are interrelated.

    PubMed

    1996-01-01

    This paper presents the views of conference organizers and main speakers at an Asian conference on food security. The focus of this paper is on the views of Mr. Shin Sakurai, Chairman of the AFPPD. Mr. Sakurai highlighted three events that had occurred since the last conference in 1993. These events included the 1994 International Conference on Population and Development in Cairo, the 1995 World Summit on Social Development in Copenhagen, and the 1995 Fourth World Conference on Women in Beijing. The speaker believed that these events were important for the world community in terms of reaching a consensus on important issues of population and development and of social development and women. People had an opportunity at these events to move beyond their own special interests and conceptualize future human existence. The speaker reminded participants about the new directive of the AFPPD to organize an international meeting of parliamentarians on food security, population, and development. The conference would be held in Geneva in conjunction with the World Food Summit. The aim is to provide food security and prevent hunger. The Founders of the AFPPD were committed to the belief that "no child should be born just to die from hunger." A primary condition for food security is stabilization of population. Mr. Sakurai urged world leaders to approach the issue of food security from the perspective of population dynamics and environmental degradation. PMID:12292314

  1. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Astrophysics Data System (ADS)

    1985-07-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  2. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  3. 17 CFR 285.3 - Reports with respect to proposed distribution of primary obligations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports with respect to proposed distribution of primary obligations. 285.3 Section 285.3 Commodity and Securities Exchanges... WOODS AGREEMENTS ACT § 285.3 Reports with respect to proposed distribution of primary obligations....

  4. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006...

  5. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... 45—Tables of Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005...

  6. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006...

  7. Portable appliance security apparatus

    NASA Technical Reports Server (NTRS)

    Kerley, J. J. (Inventor)

    1981-01-01

    An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear portion of opposite walls of the case for receiving a back plate to cover the opening and thereby secure the computer within the case. An opening formed in the top wall of the case exposes the keyboard and display of the computer. The back plate is locked in the closed position by a key-operated plug type lock. The lock is attached to one end of a hold down cable, the opposite end thereof being secured to a desk top or other stationary object. Thus, the lock simultaneously secures the back plate to the case and retains the case to the stationary object.

  8. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  9. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Teaching Secure Programming

    SciTech Connect

    Bishop, Matt; Frincke, Deb A.

    2005-09-01

    This article discusses issues in teaching secure coding in the context of both academic institutions and training organizations. The emphasis is on the importance of assurance. There is also some discussion of the role of checklists.

  12. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  15. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Security vs. Safety.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  17. Requirements for security signalling

    SciTech Connect

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  18. Effect of time of year, weather, and the pattern of auction market sales on fatal fibrinous pneumonia (shipping fever) in calves in a large feedlot in Alberta (1985-1988).

    PubMed Central

    Ribble, C S; Meek, A H; Janzen, E D; Guichon, P T; Jim, G K

    1995-01-01

    A total of 58,885 spring-born calves entering a large commercial feedlot in southwestern Alberta were studied to examine the associations between shipping fever mortality and the pattern of calf sales at the auction markets, time of year, and weather. The observational study followed calves purchased from 42 auction markets in the 4 western provinces between September 1 and December 31 in each of the years from 1985 to 1988. Calf sales at the auction markets consistently peaked during the last week of October and the first week of November. Calves entering the feedlot in November had a risk of fatal shipping fever 2 to 8 times greater than calves entering in September or December. The pattern was the same for all 4 years, with maximum risk occurring 2 to 4 weeks after the peak time for calf sales at the markets. A number of factors could have contributed to this pattern, including changes in transport truck availability, changes in the density of calves at the markets, changes in population dynamics at the feedlot that affected feedlot crew efficiency, and weather. The finding that the risk of fatal shipping fever appears to increase significantly as the feedlot fills with calves in the fall deserves the attention of feedlot owners, so they can design their treatment strategies appropriately, and of researchers, who may gain useful knowledge about the natural history of the disease by investigating why this change in risk occurs. PMID:8521347

  19. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  20. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  1. Secure video communications systems

    SciTech Connect

    Smith, R.L.

    1991-10-08

    This patent describes a secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  2. Variable contour securing system

    NASA Technical Reports Server (NTRS)

    Zebus, P. P.; Packer, P. N.; Haynie, C. C. (Inventor)

    1978-01-01

    A variable contour securing system has a retaining structure for a member whose surface contains a variable contour. The retaining mechanism includes a spaced array of adjustable spindles mounted on a housing. Each spindle has a base member support cup at one end. A vacuum source is applied to the cups for seating the member adjacent to the cups. A locking mechanism sets the spindles in a predetermined position once the member has been secured to the spindle support cups.

  3. Data port security lock

    DOEpatents

    Quinby, Joseph D.; Hall, Clarence S.

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  4. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance. PMID:25649459

  5. Security extensions to DICOM

    NASA Astrophysics Data System (ADS)

    Thiel, Andreas; Bernarding, Johannes; Schaaf, Thorsten; Bellaire, Gunter; Tolxdorff, Thomas

    1999-07-01

    To ensure the acceptance of telemedical applications several obstacles must be overcome: the transfer of huge amounts of data over heterogeneous hard- and software platforms must be optimized; extended data post-processing is often required; and data security must be taken into consideration; post- processing based on secured data exchange must retain the relationship between original and post-processed images. To analyze and solve these problems, applications of distributed medical services were integrated. Data transfer and management was based on the Digital Imaging and Communications (DICOM) standard. To account for platform- independence of remote users, a novel DICOM server and viewer as implemented in JAVA. Different DICOM-conform data security concepts were analyzed. Encryption of the complete data stream using secure socket layers as well as a partial encryption concepts were tested. The best result was attained by a DICOM-conform encryption of patient-relevant data. The implementation medical services, which used newly develop techniques of magnetic resonance imaging, allowed a much earlier diagnosis of the human brain infarct. The integrated data security enabled remote segmentation within the unsecured internet, followed by storing the data back into the secured network.

  6. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  7. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  8. 20 CFR 404.260 - Special minimum primary insurance amounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Special minimum primary insurance amounts. 404.260 Section 404.260 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Special Minimum...

  9. Roadmap on optical security

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  10. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  11. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  12. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  14. Inherent security benefits of underground dry storage of nuclear materials

    SciTech Connect

    Moore, R.D.; Zahn, T.

    1997-07-01

    This paper, augmented by color slides and handouts, will examine the inherent security benefits of underground dry storage of nuclear materials. Specific items to be presented include: the successful implementation of this type of storage configuration at Argonne National Laboratory - West; facility design concepts with security as a primary consideration; physical barriers achieved by container design; detection, assessment, and monitoring capabilities; and {open_quotes}self protection{close_quotes} strategies. This is a report on the security features of such a facility. The technical operational aspects of the facility are beyond the scope of this paper.

  15. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  16. Secure provision of reactive power ancillary services in competitive electricity markets

    NASA Astrophysics Data System (ADS)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  17. A secure open system?

    NASA Astrophysics Data System (ADS)

    Crowe, James A.

    1993-08-01

    The notion of a large distributed computing system in support of a program like EOSDIS, carries with it the requirement that the system provide the user with guarantees about the integrity of the data and certain assurances about the security of the network of computing systems. This paper examines the challenges of providing a `secure' open system and how these challenges may be addressed from both an architectural as well as functional viewpoint. The role of discretionary access control, mandatory access control, and detection and control of computer viruses is discussed. It has often been observed that the role of the security engineer is one of restricting access to data, whereas the role of the system architect, of an open system that is encouraging research, should make data easy to obtain and utilize. This paradox is manifest in a system such a EOSDIS where to be useful, the systems data must be easy to obtain, but to ensure the integrity of the data it must exercise some level of security. This paper address the use and role of the Security Services of the OSF Distributed Computing Environment in support of networked applications, such as those that may be used in the implementation of the EOS Science Network. It further examines the role of mandatory access control mechanisms to provide data integrity guarantees. The paper further discusses how a system like EOSDIS may prevent computer viruses using a system of automated detection mechanisms and configuration control.

  18. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  19. Computer Security Risk Assessment

    Energy Science and Technology Software Center (ESTSC)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  20. Secure Information Sharing

    Energy Science and Technology Software Center (ESTSC)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  1. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  2. Biological and Chemical Security

    SciTech Connect

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  3. Maritime security laboratory for maritime security research

    NASA Astrophysics Data System (ADS)

    Bunin, Barry J.; Sutin, Alexander; Bruno, Michael S.

    2007-04-01

    Stevens Institute of Technology has established a new Maritime Security Laboratory (MSL) to facilitate advances in methods and technologies relevant to maritime security. MSL is designed to enable system-level experiments and data-driven modeling in the complex environment of an urban tidal estuary. The initial focus of the laboratory is on the threats posed by divers and small craft with hostile intent. The laboratory is, however, evolvable to future threats as yet unidentified. Initially, the laboratory utilizes acoustic, environmental, and video sensors deployed in and around the Hudson River estuary. Experimental data associated with boats and SCUBA divers are collected on a computer deployed on board a boat specifically designed and equipped for these experiments and are remotely transferred to a Visualization Center on campus. Early experiments utilizing this laboratory have gathered data to characterize the relevant parameters of the estuary, acoustic signals produced by divers, and water and air traffic. Hydrophones were deployed to collect data to enable the development of passive acoustic methodologies for maximizing SCUBA diver detection distance. Initial results involving characteristics of the estuary, acoustic signatures of divers, ambient acoustic noise in an urban estuary, and transmission loss of acoustic signals in a wide frequency band are presented. These results can also be used for the characterization of abnormal traffic and improvement of underwater communication in a shallow water estuary.

  4. Securities and Exchange Commission Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... [Securities and Exchange Commission Semiannual Regulatory Agenda ] Part XXIII Securities and Exchange Commission Semiannual Regulatory Agenda ] SECURITIES AND EXCHANGE COMMISSION (SEC) SECURITIES AND EXCHANGE COMMISSION 17 CFR Ch. II Regulatory Flexibility Agenda AGENCY: Securities and Exchange Commission. ACTION: Semiannual regulatory...

  5. Social Security's special minimum benefit.

    PubMed

    Olsen, K A; Hoffmeyer, D

    Social Security's special minimum primary insurance amount (PIA) provision was enacted in 1972 to increase the adequacy of benefits for regular long-term, low-earning covered workers and their dependents or survivors. At the time, Social Security also had a regular minimum benefit provision for persons with low lifetime average earnings and their families. Concerns were rising that the low lifetime average earnings of many regular minimum beneficiaries resulted from sporadic attachment to the covered workforce rather than from low wages. The special minimum benefit was seen as a way to reward regular, low-earning workers without providing the windfalls that would have resulted from raising the regular minimum benefit to a much higher level. The regular minimum benefit was subsequently eliminated for workers reaching age 62, becoming disabled, or dying after 1981. Under current law, the special minimum benefit will phase out over time, although it is not clear from the legislative history that this was Congress's explicit intent. The phaseout results from two factors: (1) special minimum benefits are paid only if they are higher than benefits payable under the regular PIA formula, and (2) the value of the regular PIA formula, which is indexed to wages before benefit eligibility, has increased faster than that of the special minimum PIA, which is indexed to inflation. Under the Social Security Trustees' 2000 intermediate assumptions, the special minimum benefit will cease to be payable to retired workers attaining eligibility in 2013 and later. Their benefits will always be larger under the regular benefit formula. As policymakers consider Social Security solvency initiatives--particularly proposals that would reduce benefits or introduce investment risk--interest may increase in restoring some type of special minimum benefit as a targeted protection for long-term low earners. Two of the three reform proposals offered by the President's Commission to Strengthen

  6. Port and Harbor Security

    SciTech Connect

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  7. Secure content objects

    DOEpatents

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  8. Double layer secure sketch

    NASA Astrophysics Data System (ADS)

    Li, Cai

    2012-09-01

    Secure sketch has been applied successfully in a wide variety of applications like cryptography, biometric authentication systems and so on. All of these secure sketches have properties in common namely error-tolerance and small entropy loss. The former ensures an input set w' can unlock the system if w' is substantially overlapped with a template set w while the latter means it is hard for an adversary to get the information of w even with the knowledge of s, which is produced by w and stored in the system publicly. In their constructions, they all consider w as a set of atomic elements. However, in the real word, it is very likely the elements in the template set are sets as well. In this paper, we propose a double layer secure sketch to address this issue.

  9. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  10. Strategy for IT Security

    NASA Technical Reports Server (NTRS)

    Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.

  11. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (ESTSC)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  12. Safety, Security and Multicore

    NASA Astrophysics Data System (ADS)

    Parkinson, Paul

    Historically many safety-related and security-critical systems have been developed and qualified using single-core processors. These platforms could easily meet their increases in system performance requirements through higher processor clock speeds. However, the industry is now approaching the limit of relatively simple upgrade path, and there is an increasing trend towards the adoption of multicore processor architectures in critical systems to address higher performance demands. In this paper, we will review the challenges involved in migration to multicore processor architectures and the specific challenges related to their use in safety-critical and security-sensitive systems.

  13. Security System Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  14. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  15. Social Security Polynomials.

    ERIC Educational Resources Information Center

    Gordon, Sheldon P.

    1992-01-01

    Demonstrates how the uniqueness and anonymity of a student's Social Security number can be utilized to create individualized polynomial equations that students can investigate using computers or graphing calculators. Students write reports of their efforts to find and classify all real roots of their equation. (MDH)

  16. Public eye security system

    NASA Astrophysics Data System (ADS)

    Aviv, David G.

    1999-01-01

    The recently patented system is a software engine that is connected to a television camera that is used for security applications. It will detect in near real time any physical criminal acts occurring within the field of view of the camera. It then instantaneously transmits an alarm to law enforcement and turns on a VCR and other crime deterrent systems, without human involvement.

  17. Today's School Security

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  18. Negligence in Visitor Security.

    ERIC Educational Resources Information Center

    Dwyer, William O.; Murrell, Dan S.

    1985-01-01

    The park administrator's responsibility in providing security for park visitors through prevention strategies and law enforcement is discussed. Types of negligence are indicated, practice recommendations are made, and evaluative criteria for personnel selection and training are offered. Reference is made to the General Accounting Office Report and…

  19. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  20. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  1. Reporters, Curators, Security Chiefs...

    ERIC Educational Resources Information Center

    Black Issues in Higher Education, 1996

    1996-01-01

    Opportunities for employment other than faculty positions in colleges and universities are explored, and the stories of a number of nonfaculty personnel in such areas as computer technology, security, public relations, admissions, sports information, museums, and glee club are recounted. These employees offer insights into how they obtained their…

  2. A network security monitor

    SciTech Connect

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. . Dept. of Electrical Engineering and Computer Science)

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  3. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  4. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  5. Transmission Line Security Monitor

    SciTech Connect

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. Application Security Automation

    ERIC Educational Resources Information Center

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  7. Mastering Mobile Security

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  8. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  9. Transmission Line Security Monitor

    ScienceCinema

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. Security: Step by Step

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2005-01-01

    This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…

  11. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  12. No Blanket Security Measures.

    ERIC Educational Resources Information Center

    Leisner, Hava

    2001-01-01

    Presents a discussion with Jefferson County, Colorado, Architect Jack Swanzy, who explains how security is implemented in his 148-school district in the aftermath of the Columbine tragedy. Discusses the use of key management, videotapes, on-site police, and staff emergency communications. (GR)

  13. Campus [in] Security

    ERIC Educational Resources Information Center

    Collett, Stacy

    2007-01-01

    Community colleges, while safe, are not immune to violence. In the wake of the Virginia Tech shootings, community colleges are committed to making campuses safer. From training first responders to understanding and identifying potential threats, the author describes what schools are doing to eradicate their so-called [in] securities and improve…

  14. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  15. Designing Secure Library Networks.

    ERIC Educational Resources Information Center

    Breeding, Michael

    1997-01-01

    Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…

  16. The Security Continuum.

    ERIC Educational Resources Information Center

    Thompson, Ian

    2002-01-01

    Discusses the creation of a comprehensive security strategy for schools, including the importance of tailoring it to a specific school's mission and culture. Describes three classes of tactics (natural, organized, and technical) which can be chosen to implement the strategy. Discusses access control as an example of how strategies and tactics…

  17. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  18. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  19. Securing Information Technology in Healthcare

    PubMed Central

    Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric

    2014-01-01

    Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030

  20. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  1. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  2. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  3. Cold Vacuum Dryer (CVD) Facility Security System Design Description (SYS 54)

    SciTech Connect

    WHITEHURST, R.

    2000-09-11

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas.

  4. Security message exchange interoperability scenarios

    SciTech Connect

    Tarman, Thomas

    1998-07-01

    This contribution describes three interoperability scenarios for the ATM Security Message Exchange (SME) protocol. These scenarios include network-wide signaling support for the Security Services Information Element, partial signaling support wherethe SSIE is only supported in private or workgroup ATM networks, and the case where the SSIE is nonsupported by any network elements (exceptthosethat implement security services). Explanatory text is proposed for inclusion infection 2.3 of the ATM Security Specification, Version 1.0.

  5. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  6. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  7. 76 FR 8946 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 RIN 3235-AK18 Security Ratings AGENCY... will be considering relating to the use of security ratings by credit rating agencies in our rules and... that rely on, or make special accommodations for, security ratings (for example, Forms S-3 and...

  8. 76 FR 46603 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 RIN 3235-AK18 Security Ratings AGENCY... for, security ratings (for example, Forms S-3 and F-3 eligibility criteria) with alternative...- worthiness of a security or money market instrument and any references to or requirements in such...

  9. National Security Series, User's Guide.

    ERIC Educational Resources Information Center

    Jones, Saundra L.

    This document is a guide to using the "National Security Series", which consists of seven books designed for teaching about national security issues in high school social studies classes. Five of the series books contain lessons designed to supplement specific courses by relating national security issues to U.S. government, U.S. history,…

  10. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  11. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  12. Less reality, more security

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Kay, Alastair; Pope, James

    2012-09-01

    The concept of nonlocality, whereby a local operation on one state can instantaneously affect the properties of another spatially-separated state, has been investigated through the violation of Bell inequalities. Realisations of such violations in the laboratory paved the way for not only experimental justification of quantum theory, but also one of the subject's first significant applications in cryptography. The violation of Bell inequalities can be used as an indicator for security in the task of key distribution. Furthermore, it has more recently been shown that such security is guaranteed by the violations alone, regardless of assumptions about the workings and trustworthiness of the devices provided for the task. We provide a brief history of Bell inequalities and their use in the development of device-independent key distribution, which is less reliant on the validity of quantum theory than previously thought.

  13. Osirak and international security

    SciTech Connect

    Fainberg, A.

    1981-10-01

    Mr. Fainberg states that no factual justification can be made for Israel's bombing of an Iraqi reactor under construction on the grounds that Iraq was diverting nuclear materials for weapons. Despite limitations to the International Atomic Energy Agency (IAEA) safeguards inspection procedure, he feels the raid was premature even if Iraq's long-range goal is to develop a nuclear capability and renounce the non-proliferation treaty it signed. The effect of the raid has not enhanced Israel's security, but a precedent has been set that weakens the safeguards structure and threatens world security. Steps need to be taken to strengthen international safeguards and make them more acceptable to developing countries since there is no way to ban nuclear-produced electricity. (DCK)

  14. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. PMID:27217574

  17. DIRAC distributed secure framework

    NASA Astrophysics Data System (ADS)

    Casajus, A.; Graciani, R.; LHCb DIRAC Team

    2010-04-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  18. Nuclear energy and security

    SciTech Connect

    BLEJWAS,THOMAS E.; SANDERS,THOMAS L.; EAGAN,ROBERT J.; BAKER,ARNOLD B.

    2000-01-01

    Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadership or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity.

  19. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  20. The cost of IT security.

    PubMed

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments. PMID:26665523

  1. Use of crossbreeding with beef bulls in dairy herds: effect on age, body weight, price, and market value of calves sold at livestock auctions.

    PubMed

    Dal Zotto, R; Penasa, M; De Marchi, M; Cassandro, M; López-Villalobos, N; Bittante, G

    2009-09-01

    The aim of this study was to investigate the effect of different breeds and breed crosses on age (AC, d), BW (kg), price (PR, $/kg), and market value (MV, $/calf) of purebred and crossbred calves sold for veal and beef production. The Kovieh wholesale cattle organization (Bolzano, Italy) grouped calves from several dairy herds located in the Trentino-Südtirol region in Italy and sold them by public auctions. Data on AC, BW, PR, and MV from 96,458 calves were recorded from January 2003 to December 2007 and consisted of 4 pure breeds [2 dairy, Brown Swiss (BS) and Holstein-Friesian (HF); and 2 dual-purpose, Simmental (SI) and Alpine Grey (AG)], and 8 crossbreds by crosses of Limousin (LI) and Belgian Blue (BB) with the 4 dam breeds. Least squares means for AC, BW, PR, and MV were calculated for breeds and breed crosses with a model that included fixed effects of herd of birth, age (except for AC), sex, and breed of the calf, year and season of auction, and interactions between the main effects. The coefficients of determination of the models were 0.41, 0.51, 0.84, and 0.82 for AC, BW, PR, and MV, respectively. Sex, age, and breed were the most relevant sources of variation for BW (P < 0.001), whereas breed and sex were the most important sources of variation for AC, PR, and MV (P < 0.001). Also, PR and MV were significantly influenced (P < 0.01) by all the effects included in the model, except for season x age interaction in the case of MV. Market value of male was greater (P < 0.001) than that of female calves, with the exception of BS (-$28.76/calf) and HF (-$20.70/calf) purebred males. Dual-purpose purebred calves presented greater (P < 0.001) PR and MV than dairy purebreds (MV of $426.97/calf and $307.96/calf for SI and AG, and $256.24/calf and $275.65/calf for BS and HF, respectively). Calves from SI and AG dams had greater (P < 0.001) BW, PR, and MV than calves from BS and HF dams. Calves from SI cows had greater (P < 0.001) BW, PR, and MV than calves from AG

  2. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  3. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  4. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  5. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  6. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  7. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  8. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  9. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  10. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  11. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  12. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  13. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.305 Facility Security Assessment (FSA)...

  14. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  15. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  16. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  17. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  18. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  19. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  20. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....