B Pleger, Christian Ruff, F Blankenburg, S Klöppel, J Driver, R J Dolan, Influence of dopaminergically mediated reward on somatosensory decision-making, PLoS Biology, Vol. 7 (7), 2009. (Journal Article)
Reward-related dopaminergic influences on learning and overt behaviour are well established, but any influence on sensory decision-making is largely unknown. We used functional magnetic resonance imaging (fMRI) while participants judged electric somatosensory stimuli on one hand or other, before being rewarded for correct performance at trial end via a visual signal, at one of four anticipated financial levels. Prior to the procedure, participants received either placebo (saline), a dopamine agonist (levodopa), or an antagonist (haloperidol). Principal findings: higher anticipated reward improved tactile decisions. Visually signalled reward reactivated primary somatosensory cortex for the judged hand, more strongly for higher reward. After receiving a higher reward on one trial, somatosensory activations and decisions were enhanced on the next trial. These behavioural and neural effects were all enhanced by levodopa and attenuated by haloperidol, indicating dopaminergic dependency. Dopaminergic reward-related influences extend even to early somatosensory cortex and sensory decision-making. |
|
Dennis L Gärtner, Armin Schmutzler, Merger negotiations and ex-post regret, Journal of Economic Theory, Vol. 144 (4), 2009. (Journal Article)
We consider a setting in which two potential merger partners each possess private information pertaining
both to the profitability of the merged entity and to stand-alone profits, and we investigate the extent to
which this private information makes ex-post regret an unavoidable phenomenon in merger negotiations.
To this end, we consider ex-post incentive compatible mechanisms, which use both players’ reports to determine whether or not a merger will take place and what each player will earn in each case. When the outside option of at least one player is known, the efficient merger decision can be implemented by such a mechanism under plausible budget-balance requirements. When neither outside option is known, we show that the potential for regret-free implementation is much more limited, unless the budget balance condition is relaxed to permit money-burning in the case of false reports. |
|
Stefan J Kiebel, Jean Daunizeau, Karl J Friston, Perception and hierarchical dynamics, Frontiers in Neuroinformatics, Vol. 3, 2009. (Journal Article)
|
|
Anil Kandrical, Graphical Weaving of Aspects in Product Line Requirements Engineering, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2009. (Master's Thesis)
Software development becomes expensive, when more than three similar products are developed
independently, without exploiting the commonality among these products. Requirements Engineering
and Software Product Line Engineering help to reduce this costs. An advanced requirements
engineering language and tool is needed, which is capable of handling requirements for product
lines. ADORA is a requirements engineering tool, which is developed at the University of Zurich,
which is capable of modeling product lines. The problem is, that ADORA needs to enable requirement
negotiation. This allows the modeler to derive products from the product line. Otherwise
much manual, time-intensive work is needed and no real-time requirements negotiations can be
performed on that model. The dynamic weaving of single variants allows a quick instantiation
of possible application requirements from the product line. Before this thesis was worked out,
ADORA could not weave dynamically, which are now handled in a dedicated decision table.
Another difficulty is the resulting layout of the weaving. Layout must be human friendly and
organized in a proper fashion to support usability of this approach in product derivation with
dynamic weaving. For the solution of this problem, we present our approach in this master thesis. First we
enable dynamic weaving of single aspects, by deciding on variability decision items in a decision
table. Second we improve the layout by automatically providing human friendly graphical layout
for the woven models. As a validation we demonstrate our new concepts with two requirements examples: One more
detailed specification example and one real-world industrial requirements exemplar. The validation
measures aesthetic graphical layout criteria such as less bendings in the edges, less crossing
of the edges, smaller difference among node size, avoidance of empty space and mental map
preservance. |
|
Christian Landolt, Lohnt sich IT-Governance auch für KMU?, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2009. (Master's Thesis)
The present thesis is concerned with the question of whether it is efficient for small and
medium-sized enterprises to implement selected elements of IT Governance in order to achieve a
reduction of problems and risks resulting from the use of information technology.
Based on a survey conducted in Swiss industrial companies the thesis analyzes different elements
of IT Governance with regard to their effect. The treatise concludes by proposing a concrete growth
path for companies that wish to benefit from the high efficiency of the appropriate
implementation of IT Governance. |
|
Michael Keller, SmartTravel to Go, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2009. (Master's Thesis)
Staying competitive in the travel business means offering more services to the customers than just face-to-face travel consultation and booking. Based on an extensive requirement analysis this paper develops a product, which offers an added value to the customers by giving them access to a variety of information, digital travel documents and consultation while on the road. This product strongly improves the flexibility of traveling by enabling the customer to book during his journey. This way the traveler can use his or her well known contact in the travel agency to adjust travel plans anytime and anywhere. The results of the evaluation clearly show that such a service is a need and the presented implementation is easy to use and practical.s |
|
Dorian-Raphael Signer, Erweiterung des STIN-Ansatzes zur Erkennung von Konflikt-potential in IT-Projekten, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2009. (Bachelor's Thesis)
The critical influence of social factors on IT-projects does not find the required attention in he today technically oriented culture (Kling, 1999). This paper introduces a new approach called Extended Socio-Technical Interaction Network (XSTIN) which is based on prior research on Socio-Technical Interaction Networks (STIN), developed by Rob Kling et al. (2003). The extension under XSTIN integrates socio-technical approaches of the IT-Project Management literature with the goal of providing a tool of systematically researching for project critical conflicts in socio-technical systems such as IT-projects. The approach does not only offer help in structuring and analyzing the project relevant information but also provides advice on how to come to a graphical representation of the socio-technical relationships, both with the goal of identifying of critical conflicts within IT-projects in particular. |
|
Michele Bernasconi, Luca Corazzini, Sebastian Kube, Michel Maréchal, Two are better than one!: individuals' contributions to "unpacked" public goods, Economics Letters, Vol. 104 (1), 2009. (Journal Article)
We experimentally demonstrate how "unpacking" provides a possible approach for mitigating the dilemma of public goods provision through private contributions. Subjects' total contributions increase when a single public good is split into two identical public goods. |
|
Thomas Bocek, Incentives for Voting-based Quality Control and Document Storage in P2P Collaboration Systems, In: 5th Collaborative Peer-to-Peer Systems Workshop (COPS). 2009. (Conference Presentation)
|
|
David Hausheer, A Market-based Pricing Scheme for Grid Networks, In: 3rd ACM/IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009). 2009. (Conference Presentation)
|
|
Peng Gao, Xingyao Wu, Tao Liu, David Hausheer, A Market-Based Pricing Scheme for Grid Networks, In: 3rd ACM/IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), Springer, Heidelberg, Germany, 2009-06-30. (Conference or Workshop Paper published in Proceedings)
This paper presents a new market-based pricing scheme which aims to improve the link load balance in Grid networks. Simulation results show that the proposed scheme achieves a better link load balance and, thus, improves the network’s robustness and stability. At the same time, the scheme increases the network’s effective capacity as it enables to accommodate more new services. The results show that the proposed scheme leads indeed to a more efficient usage of network resources. |
|
Andrei Aurel Vancea, Burkhard Stiller, Answering Queries Using Cooperative Semantic Caching, In: 3rd International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), Elsevier, Heidelberg, Germany, 2009-06-30. (Conference or Workshop Paper published in Proceedings)
Traditional approaches to multipath routing ignore the economic incentives necessary in aligning both networks and users towards a common goal. While theory suggests congestion pricing can be used to maximize social welfare, even within such a framework we have no consistent method for evaluating, constructing and disseminating paths. Our research focuses on building on existing congestion pricing models to provide scalable and differentiated edge selectable routes. By redesigning traffic management to not only provide paths, but also price them accordingly, the resulting cost-aware multipath architecture could alleviate the tension between different stakeholders by evolving the Internet towards a fully functional market. |
|
Thomas Bocek, Burkhard Stiller, PeerCollaboration, In: 3rd International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), Springer, Heidelberg, Germany, 2009-06-30. (Conference or Workshop Paper published in Proceedings)
Increasing traffic due to increased bandwidth or the number of users calls for scalable systems, which can be built with peer-to-peer (P2P) mechanisms. Scalability is a key issue for systems that rely on many participants, such as large-scale collaboration system. This paper introduces PeerCollaboration, a fully decentralized P2P collaboration system for documents, which is robust against malicious behavior, provides an efficient content search, and offer mechanisms for distributed control. Typical tasks in PeerCollaboration are searching, retrieving, creating, changing, and maintaining documents in a collaborative manner. Three problem areas are investigated within this system. The first problem focuses on similarity search on top of existing P2P networks and highlights a novel algorithm, which outperforms compared approaches. The second problem deals with incentive schemes, which work with indirect reciprocity. Thus, the novel and robust incentive scheme finds more reciprocities than with compared approaches. The third problem focuses on user-based voting mechanisms. |
|
Thomas Bocek, D Peric, Fabio Victora Hecht, D Hausheer, Burkhard Stiller, PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems, In: 3rd ACM/IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), Springer, Heidelberg, Germany, 2009-06-30. (Conference or Workshop Paper published in Proceedings)
Peer-to-peer (P2P) systems achieve scalability, fault tolerance, and load balancing with a low-cost infrastructure, characteristics from which collaboration systems, such as Wikipedia, can benefit. A major challenge in P2P collaboration systems is to maintain article quality after each modification in the presence of malicious peers. A way of achieving this goal is to allow modifications to take effect only if a majority of previous editors approve the changes through voting. The absence of a central authority makes voting a challenge in P2P systems.
This paper proposes the fully decentralized voting mechanism PeerVote, which enables users to vote on modifications in articles in a P2P collaboration system. Simulations and experiments show the scalability and robustness of PeerVote, even in the presence of malicious peers. |
|
David Seidl, Paul Sanderson , Bernhard Krieger, John Roberts, How flexible is flexible regulation? Applying the comply-or-explain principle in the UK and Germany, In: 7th International Conference on Corporate Governance on “Corporate Governance: Managing Risk in a Changing World”. 2009. (Conference Presentation)
|
|
Anselm Jakob Schneider, A model of corporate sustainability, In: 8th ESEE conference. 2009. (Conference Presentation)
|
|
Thomas Bocek, Fabio Victora Hecht, D Hausheer, D Peric, Burkhard Stiller, Incentives for Voting-based Quality Control and Document Storage in P2P Collaboration Systems, In: 18th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2009), IEEE Computer Society Press, Groningen, The Netherlands, 2009-06-29. (Conference or Workshop Paper published in Proceedings)
Peer-to-peer (P2P) systems achieve scalability, fault tolerance, and load balancing, while effectively reducing infrastructure cost compared to client/server systems. For large wiki-based collaboration systems these characteristics can be beneficial as well. However, a fully decentralized P2P-based collaboration system requires appropriate incentives for users to (a) contribute resources for storing and providing documents, and (b) to participate in collaborative control mechanisms for keeping content quality at a high level. Therefore, this position paper proposes a score-based incentive scheme for voting-based quality control and document storage in a P2P-based collaboration system. The approach is based on the PeerVote mechanism, which enables users to vote on content modifications. In order to encourage peers to store and vote on documents, each peer is assigned a score related to its contribution. Peers have an incentive to achieve a high score, as only this allows them to create and approve new documents. The proposed scheme is resistant to fraud, since the score of a peer can be verified by any other peer. |
|
B Glavic, G Alonso, The perm provenance management system in action, In: 35th SIGMOD international conference on Management of data, ACM Press, New York, 2009-06-29. (Conference or Workshop Paper published in Proceedings)
In this demonstration we present the Perm provenance management system (PMS). Perm is capable of computing, storing and querying provenance information for the relational data model. Provenance is computed by using query rewriting techniques to annotate tuples with provenance information. Thus, provenance data and provenance computations are represented as relational data and queries and, hence, can be queried, stored and optimized using standard relational database techniques. This demo shows the complete Perm system and lets attendants examine in detail the process of query rewriting and provenance retrieval in Perm, the most complete data provenance system available today. For example, Perm supports lazy and eager provenance computation, external provenance and various contribution semantics. |
|
Burkhard Stiller, Economic Traffic Management (ETM): The Support of New Network Management Functionality, In: Vrije Universiteit. 2009. (Conference Presentation)
|
|
Konstantinos Dermitzakis, Alejandro Hernandez Arieta, Anthropomimetic approach to the design of a prosthetic robot hand, In: Workshop on Understanding the Human Hand for Advancing Robotic Manipulation, Robotics Science and Systems Conference, Seattle, WA, 2009-06-28. (Conference or Workshop Paper)
|
|