Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Physical Sciences and Mathematics

Would Position Limits Have Made Any Difference To The 'Flash Crash' On May 6, 2010, Wing Bernard Lee, Shih-Fen Cheng, Annie Koh Nov 2010

Would Position Limits Have Made Any Difference To The 'Flash Crash' On May 6, 2010, Wing Bernard Lee, Shih-Fen Cheng, Annie Koh

Research Collection School Of Computing and Information Systems

On May 6, 2010, the US equity markets experienced a brief but highly unusual drop in prices across a number of stocks and indices. The Dow Jones Industrial Average (DJIA) fell by approximately 9% in a matter of minutes, and several stocks were traded down sharply before recovering a short time later. Earlier research by Lee, Cheng and Koh (2010) identified the conditions under which a “flash crash” can be triggered by systematic traders running highly similar trading strategies, especially when they are “crowding out” other liquidity providers in the market. The authors contend that the events of May 6, …


Business Network-Based Value Creation In Electronic Commerce, Robert John Kauffman, Ting Li, Eric Van Heck Oct 2010

Business Network-Based Value Creation In Electronic Commerce, Robert John Kauffman, Ting Li, Eric Van Heck

Research Collection School Of Computing and Information Systems

Information technologies (IT) have affected economic activities within and beyond the boundaries of the firm, changing the face of e-commerce. This article explores the circumstances under which value is created in business networks made possible by IT. Business networks combine the capabilities of multiple firms to produce and deliver products and services that none of them could more economically produce on its own and for which there is demand in the market. We call this business network-based value creation. We apply economic theory to explain the conditions under which business networks will exist and are able to sustain their value-producing …


Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng Sep 2010

Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely important for agent-based simulations, but unfortunately, so far there is no one universal method that would work in all domains. The primary contribution of this paper is a novel combination of event-centric simulation design and event study approach for market dynamics generation and validation. In our event-centric design, the simulation is progressed by announcing news events that affect market prices. Upon receiving these events, event-aware software agents would adjust their views on the market …


Do Online Reviews Reflect A Product’S True Perceived Quality? An Investigation Of Online Movie Reviews Across Cultures, Noi Sian Koh, Nan Hu, Eric K. Clemons Sep 2010

Do Online Reviews Reflect A Product’S True Perceived Quality? An Investigation Of Online Movie Reviews Across Cultures, Noi Sian Koh, Nan Hu, Eric K. Clemons

Research Collection School Of Computing and Information Systems

This paper investigates when the reported average of online ratings matches the perceived average assessment of the population as a whole, including the average assessments of both raters and non-raters. We apply behavioral theory to capture intentions in rating online movie reviews in two dissimilar countries – China and the United States. We argue that consumers’ rating behaviors are affected by cultural influences and that they are influenced in predictable ways. Based on data collected from IMDB.com and Douban.com, we found significant differences across raters from these two different cultures. Additionally, we examined how cultural elements influence rating behavior for …


Cloud Services From A Consumer Perspective, Philip Koehler, Arun Anandasivam, Dan Ma Aug 2010

Cloud Services From A Consumer Perspective, Philip Koehler, Arun Anandasivam, Dan Ma

Research Collection School Of Computing and Information Systems

Although there is an increased attention on Cloud Computing in the academic literature in the recent years, most research work focus on technical aspects of cloud computing. Research on consumers’ preferences for cloud services is limited to studies from consulting and industry companies. This paper fills the gap by empirically identifying consumer preferences for cloud service attributes. Using conjoint methods we reveal the relative importance of different attributes of cloud services. The results help both practitioners and academic researchers to better understand the prerequisites of a successful market introduction of cloud services and to design appropriate services. Moreover, the derived …


A Decision Theoretic Approach To Data Leakage Prevention, Janusz Marecki, Mudhakar Srivastava, Pradeep Reddy Varakantham Aug 2010

A Decision Theoretic Approach To Data Leakage Prevention, Janusz Marecki, Mudhakar Srivastava, Pradeep Reddy Varakantham

Research Collection School Of Computing and Information Systems

In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of information leakage that often accompanies such information flows. We focus on domains with one information source (sender) and many information sinks (recipients) where: (i) sharing is mutually beneficial for the sender and the recipients, (ii) leaking a shared information is beneficial to the recipients but undesirable to the sender, and (iii) information sharing decisions of the sender are determined using imperfect monitoring of the (un)intended information leakage by the recipients.We make two key …


Hybrid Time-Frequency Domain Analysis For Inverter-Fed Induction Motor Fault Detection, T. W. Chua, W. W. Tan, Zhaoxia Wang, C. S. Chang Jul 2010

Hybrid Time-Frequency Domain Analysis For Inverter-Fed Induction Motor Fault Detection, T. W. Chua, W. W. Tan, Zhaoxia Wang, C. S. Chang

Research Collection School Of Computing and Information Systems

The detection of faults in an induction motor is important as a part of preventive maintenance. Stator current is one of the most popular signals used for utility-supplied induction motor fault detection as a current sensor can be installed nonintrusively. In variable speeds operation, the use of an inverter to drive the induction motor introduces noise into the stator current so stator current based fault detection techniques become less reliable. This paper presents a hybrid algorithm, which combines time and frequency domain analysis, for broken rotor bar and bearing fault detection. Cluster information obtained by using Independent Component Analysis (ICA) …


Income, Endogenous Market Structure And Innovation, Mei Lin, Shaojin Li, Andrew B. Whinston Jun 2010

Income, Endogenous Market Structure And Innovation, Mei Lin, Shaojin Li, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

We investigate the effect of income distribution on R&D in a dynamic framework. Our model captures both the infinite R&D race among heterogeneous innovators and a market where successful innovators generate revenues. The market structure of successful innovations is endogenous – firms produce vertically differentiated substitute goods and compete in price. Based on firms' equilibrium market revenues, we derive numerical solutions of the Markov perfect equilibrium innovation rate of the dynamic problem. A key insight in our results is that explicitly modeling price competition and the market structure plays an important role in evaluating the impact of rising income inequality …


A Hybrid Method To Detect Deflation Fraud In Cost-Per-Action Online Advertising, Xuhua Ding Jun 2010

A Hybrid Method To Detect Deflation Fraud In Cost-Per-Action Online Advertising, Xuhua Ding

Research Collection School Of Computing and Information Systems

Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather than the volume of advertisement clicks. The main obstacle for a wide deployment of this model is the deflation fraud. Namely, a dishonest advertiser under-reports the transaction count in order to discharge less. In this paper, we present a mechanism to detect such a fraud using a hybrid of cryptography and probability tools. With the assistance from a small number of users, the publisher can detect deflation fraud with a success probability growing exponentially with the fraud …


Designing The Dynamics Of Service Innovations, Arcot Desai Narasimhalu Jun 2010

Designing The Dynamics Of Service Innovations, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

There is no serious tool available to design service innovations even as it is gaining in important attention from the academic and industrial worlds. This paper presents a method that is specifically developed to help service innovators plan and design their innovations. The method recognizes the dependencies that exist across a service provider, customers and suppliers and help identify potential inconsistencies in the design of service innovations.


Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu May 2010

Innovative Entrepreneurs Workbook, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

The workbook provides a step by step approach to identifying innovation opportunities and the key aspects of Innovation development


Open Innovation In Platform Competition, Mei Lin May 2010

Open Innovation In Platform Competition, Mei Lin

Research Collection School Of Computing and Information Systems

We examine the competition between a proprietary platform and an open platform,where each platform holds a two-sided market consisted of app developers and users.The open platform cultivates an innovative environment by inviting public efforts todevelop the platform itself and permitting distribution of apps outside of its own appmarket; the proprietary platform restricts apps sales solely within its app market. Weuse a game theoretic model to capture this competitive phenomenon and analyze theimpact of growth of the open source community on the platform competition. We foundthat growth of the open community mitigates the platform rivalry, and balances the developernetwork sizes on …


Do You Trust To Get Trust? A Study Of Trust Reciprocity Behaviors And Reciprocal Trust Prediction, Viet-An Nguyen, Ee Peng Lim, Hwee Hoon Tan, Jing Jiang, Aixin Sun Apr 2010

Do You Trust To Get Trust? A Study Of Trust Reciprocity Behaviors And Reciprocal Trust Prediction, Viet-An Nguyen, Ee Peng Lim, Hwee Hoon Tan, Jing Jiang, Aixin Sun

Research Collection School Of Computing and Information Systems

Trust reciprocity, a special form of link reciprocity, exists in many networks of trust among users. In this paper, we seek to determine the extent to which reciprocity exists in a trust network and develop quantitative models for measuring reciprocity and reciprocity related behaviors. We identify several reciprocity behaviors and their respective measures. These behavior measures can be employed for predicting if a trustee will return trust to her trustor given that the latter initiates a trust link earlier. We develop for this reciprocal trust prediction task a number of ranking method and classification methods, and evaluated them on an …


Local Coordination Under Bounded Rationality: Coase Meets Simon, Finds Hayek, C. Jason Woodard Mar 2010

Local Coordination Under Bounded Rationality: Coase Meets Simon, Finds Hayek, C. Jason Woodard

Research Collection School Of Computing and Information Systems

This paper explores strategic behavior in a network of firms using an agent-based model. The model exhibits a tension between economic efficiency and the stability of the network in the face of incentives to change its configuration. This tension is to be expected because the conditions of the Coase theorem are violated: the boundedly rational firms in the model lack the ability to discover efficient network configurations or achieve them through collective action. In computational experiments, as predicted by theory, firms frequently became locked into inefficient outcomes or endless cycles of mutual frustration. However, simple institutional innovations such as property …


Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane Mar 2010

Differentiating Knowledge Processes In Organisational Learning: A Case Of “Two Solitudes”, Siu Loon Hoe, Steven Mcshane

Research Collection School Of Computing and Information Systems

The fields of organizational behavior (OB)/strategy and marketing have taken different paths over the past two decades to understanding organizational learning. OB/strategy has been pre-occupied with theory development and case study illustrations, whereas marketing has taken a highly quantitative path. Although relying on essentially the same foundation theory, the two disciplines have had minimal crossfertilization. Furthermore, both fields tend to blur or usually ignore the distinction between structural and informal knowledge processes. The purpose of the paper is to highlight the distinction between informal and structural knowledge acquisition and dissemination processes and propose new definitions to differentiate them. Future research …


An Analysis Of Extreme Price Shocks And Illiquidity Among Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh Feb 2010

An Analysis Of Extreme Price Shocks And Illiquidity Among Trend Followers, Bernard Lee, Shih-Fen Cheng, Annie Koh

Research Collection School Of Computing and Information Systems

We construct an agent-based model to study the interplay between extreme price shocks and illiquidity in the presence of systematic traders known as trend followers. The agent-based approach is particularly attractive in modeling commodity markets because the approach allows for the explicit modeling of production, capacities, and storage constraints. Our study begins by using the price stream from a market simulation involving human participants and studies the behavior of various trend-following strategies, assuming initially that their participation will not impact the market. We notice an incremental deterioration in strategy performance as and when strategies deviate further and further from the …


Information Technology Diffusion With Influentials, Imitators, And Opponents: Model And Preliminary Evidence, Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma Jan 2010

Information Technology Diffusion With Influentials, Imitators, And Opponents: Model And Preliminary Evidence, Hasan Cavusoglu, Nan Hu, Yingjiu Li, Dan Ma

Research Collection School Of Computing and Information Systems

Information technology (IT) innovations follow a diverse set of diffusion patterns. Early diffusion models explaining technology diffusion patterns assumed that there is a single homogeneous segment of potential adopters. It was later shown that a two-segment model considering two groups of adopters explains variations in diffusion patterns better than the existing one-segment models. While the two-segment model considers a group of adopters promoting adoption by exerting a positive influence on prospective adopters, it does not consider the members of society who aim to inhibit the adoption process by exerting a negative influence on prospective adopters. In fact, most IT innovations …


Does Co-Opetition Change The Game? A Bayesian Analysis Of Participation Strategy In An Industry Standard-Setting Organization, Robert J. Kauffman, Benjamin B. M. Shao, Juliana Y. Tsai Jan 2010

Does Co-Opetition Change The Game? A Bayesian Analysis Of Participation Strategy In An Industry Standard-Setting Organization, Robert J. Kauffman, Benjamin B. M. Shao, Juliana Y. Tsai

Research Collection School Of Computing and Information Systems

Across different industries, we observe the emergence of industry standard-setting organizations (SSO) that focus on the creation of industry-specific process standards. Firms adopt a strategy of co-opetition, the combination of cooperation and competition, during standards development. We propose that a firm's co-opetition strategy is revealed to some extent by when it elects to participate in an industry SSO. Bayesian information updating offers an effective empirical modeling perspective for studying firms' participation strategies when managers' beliefs and uncertainties are factored into their decision-making. We analyze a panel data set of 73 U.S. public firms over a 20-year period. These firms are …


The Monetary Value Of Virtual Goods: An Exploratory Study In Mmorpgs, Qiu-Hong Wang, Viktor Mayer-Schonberger Jan 2010

The Monetary Value Of Virtual Goods: An Exploratory Study In Mmorpgs, Qiu-Hong Wang, Viktor Mayer-Schonberger

Research Collection School Of Computing and Information Systems

This study investigates the monetary value of time spent in virtual worlds in the context of 24 most popular MMORPGs Building on classic economic theory, we approach this issue through a combination of theoretical modeling, experiment, and cross-sectional time series data analysis. Our findings suggest that intensive social networking and flatter social hierarchy structures are associated with lower monetary value of time spent in-game. Further, two opposite network effects on the monetary value of in-game time spent were observed. One is the positive network effect from the active user base, the other is the negative network effect from the intensity …


Periodic Resource Reallocation In Two-Echelon Repairable Item Inventory Systems, Hoong Chuin Lau, Jie Pan, Huawei Song Jan 2010

Periodic Resource Reallocation In Two-Echelon Repairable Item Inventory Systems, Hoong Chuin Lau, Jie Pan, Huawei Song

Research Collection School Of Computing and Information Systems

Given an existing stock allocation in an inventory system, it is often necessary to perform reallocation over multiple time points to address inventory imbalance and maximize availability. In this paper, we focus on the situation where there are two opportunities to perform reallocation within a replenishment cycle. We derive a mathematical model to determine when and how to perform reallocation. Furthermore, we consider the extension of this model to the situation allowing an arbitrary number of reallocations. Experimental results show that the two-reallocation approach achieves better performance compared with the single-reallocation approach found in the literature. We also illustrate how …


Introducing Communication In Dis-Pomdps With Locality Of Interaction, Makoto Tasaki, Yuichi Yabu, Yuki Iwanari, Makoto Yokoo, Janusz Marecki, Pradeep Reddy Varakantham, Milind Tambe Jan 2010

Introducing Communication In Dis-Pomdps With Locality Of Interaction, Makoto Tasaki, Yuichi Yabu, Yuki Iwanari, Makoto Yokoo, Janusz Marecki, Pradeep Reddy Varakantham, Milind Tambe

Research Collection School Of Computing and Information Systems

The Networked Distributed POMDPs (ND-POMDPs) can model multiagent systems in uncertain domains and has begun to scale-up the number of agents. However, prior work in ND-POMDPs has failed to address communication. Without communication, the size of a local policy at each agent within the ND-POMDPs grows exponentially in the time horizon. To overcome this problem, we extend existing algorithms so that agents periodically communicate their observation and action histories with each other. After communication, agents can start from new synchronized belief state. Thus, we can avoid the exponential growth in the size of local policies at agents. Furthermore, we introduce …


Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst Jan 2010

Applying Soft Cluster Analysis Techniques To Customer Interaction Information, Randall E. Duran, Li Zhang, Tom Hayhurst

Research Collection School Of Computing and Information Systems

The number of channels available for companies and customers to communicate with one another has increased dramatically over the past several decades. Although some market segmentation efforts utilize high-level customer interaction statistics, in-depth information regarding customers’ use of different communication channels is often ignored. Detailed customer interaction information can help companies improve the way that they market to customers by taking into consideration customers’ behaviour patterns and preferences. However, a key challenge of interpreting customer contact information is that many channels have only been in existence for a relatively short period of time, and thus, there is limited understanding and …


Do Online Reviews Reflect A Product's True Perceived Quality? An Investigation Of Online Movie Reviews Across Cultures, Noi Sian Koh, Nan Hu, Eric K. Clemons Jan 2010

Do Online Reviews Reflect A Product's True Perceived Quality? An Investigation Of Online Movie Reviews Across Cultures, Noi Sian Koh, Nan Hu, Eric K. Clemons

Research Collection School Of Computing and Information Systems

When does the reported average of online ratings match perceived average assessment? We apply behavioral theory to capture intentions in rating online movie reviews in two dissimilar countries - China and the United States. We argue that consumers' rating behaviors are affected by cultural influences. Based on data collected from imdb.com and douban.com, we found significant differences across raters from these two different cultures. Additionally, we examined how cultural elements influence rating behavior for a hybrid culture - Singapore. Under-reporting bias occurs when consumers with extreme opinions are more likely to report their opinions than consumers with moderate reviews, resulting …