Uschi Backes-Gellner, J Baumert, U Becker, A Börsch-Supan, J Ehmer, K M Einhäupl, O Höffe, R F Hüttl, U Keil, K Kochsiek, J Kocka, M Kohli, U Lindenberger, B Müller, J Nehmer, J Schnitzer-Ungefug, U M Staudinger, E Steinhagen-Thiessen, G G Wagner, G Wick, More Years, More Life: Recommendations of the Joint Academy Initiative on Aging, Wissenschaftliche Verlagsgesellschaft mbH, Stuttgart, 2010. (Book/Research Monograph)
|
|
Sybille Sachs, Edwin Rühli, Christoph Meier, Stakeholder Governance as a Response to Wicked Issues, Journal of Business Ethics, Vol. 96, 2010. (Journal Article)
|
|
Christopher Wickert, Was hat mein Sparbuch eigentlich mit Kinderarbeit zu tun?, 2010. (Other Publication)
|
|
Seraina N Grünewald, Alexander Wagner, Rolf H Weber, Short selling regulation after the financial crisis - first principles revisited, International Journal of Disclosure and Governance, Vol. 7 (2), 2010. (Journal Article)
This article examines the recent regulatory developments with regard to short selling. Short selling regulation is an important factor in firm governance because it affects the way in which firms are subject to market discipline. As the financial crisis has attracted regulators’ notice to short selling once again, it is important to understand the fundamental legal and economic arguments regarding short selling. These arguments have at their core the question of whether there exists a market failure. The available evidence on balance suggests that short selling restrictions hamper the price discovery process. Also, while regulations against market abuse are required, it is often an ineffective detour to pursue the goal of fair markets through the regulation of short selling. On the basis of these arguments, the article evaluates the approaches taken by the US and UK regulators, who play a leading part in the current movement towards more comprehensive short selling regulation. The US Securities and Exchange Commission's (SEC's) recently adopted rules do not seem to bring much added value and will presumably affect market efficiency in the negative. First principles suggest a somewhat more positive stance on the SEC's proposal for a circuit breaker rule and the UK. Financial Services Authority's proposed disclosure approach, though both are subject to caveats. We also highlight some central questions for future research. |
|
Scott Rick, Roberto A. Weber, Meaningful learning and transfer of learning in games played repeatedly without feedback, Games and Economic Behavior, Vol. 68 (2), 2010. (Journal Article)
Psychologists have long recognized two kinds of learning: one that is relatively shallow and domain-specific; and another that is deeper, producing generalizable insights that transfer across domains. The game theory literature has only recently considered this distinction, and the conditions that stimulate the latter kind of “meaningful” learning in games are still unclear. Three experiments demonstrate that one kind of meaningful learning — acquisition of iterated dominance — occurs in the absence of any feedback. We demonstrate that such feedback-free meaningful learning transfers to new strategically similar games, and that such transfer does not typically occur when initial games are played with feedback. The effects of withholding feedback are similar to, and substitutable with, those produced by requiring players to explain their behavior, a method commonly employed in psychology to increase deliberation. This similarity suggests that withholding feedback encourages deeper thinking about the game in a manner similar to such self-explanation. |
|
Emily C. Haisley, Roberto A. Weber, Self-serving interpretations of ambiguity in other-regarding behavior, Games and Economic Behavior, Vol. 68 (2), 2010. (Journal Article)
We demonstrate that people can adopt a favorable view of ambiguous risks relative to ones with known probabilities, contrary to the usual attitude of ambiguity aversion, when doing so permits justification for unfair behavior. We use binary dictator games involving a choice between a relatively equitable allocation and an “unfair” allocation that is both less generous and makes the recipient's payment dependent on a p=0.5 lottery. Dictators choose the unfair option more frequently when the recipient's allocation depends on an ambiguous lottery than on a lottery with a known probability — even though the objective distributions of outcomes are identical under the two kinds of lotteries. Dictators' estimates of the expected value of the recipients' allocations are inflated under ambiguity, indicating that dictators form self-serving beliefs about ambiguity. Finally, increased unfair behavior under ambiguity is extinguished when dictators are constrained by their own initial unmotivated, and negative, attitudes towards ambiguity. |
|
John R. Hamman, George Loewenstein, Roberto A. Weber, Self-interest through delegation: An additional rationale for the principal-agent relationship, The American Economic Review, Vol. 100 (4), 2010. (Journal Article)
Principal-agent relationships are typically assumed to be motivated by efficiency gains from comparative advantage. However, principals may also delegate tasks to avoid taking direct responsibility for selfish or unethical behavior. We report three laboratory experiments in which principals repeatedly either decide how much money to share with a recipient or hire agents to make sharing decisions on their behalf. Across several experimental treatments, recipients receive significantly less, and in many cases close to nothing, when allocation decisions are made by agents. |
|
Owen Holland, Hugo Gravato Marques, Functional Embodied Imagination and Episodic Memory, International Journal of Machine Consciousness, Vol. 2 (2), 2010. (Journal Article)
|
|
Johannes Christian Remy, A Pattern Language for Interactive Tabletops in Collaborative Workspaces, RWTH Aachen University, Department of Informatics, 2010. (Master's Thesis)
|
|
Christoph Sturm, Dezentral koordinierte Zugriffskontrolle in Peer-to-Peer Datenbanken, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2010. (Dissertation)
|
|
Giacomo Ghezzi, H C Gall, Distributed and collaborative software analysis, In: Collaborative software engineering, Springer, Heidelberg, Germany, p. 241 - 263, 2010-01. (Book Chapter)
Throughout the years software engineers have come up with a myriad of specialized tools and techniques that focus on a certain type of software analysis such as source code analysis, duplication analysis, co-change analysis, bug prediction, or detection of bug fixing patterns. However, easy and straight forward synergies between these analyses and tools rarely exist because of their stand-alone nature, their platform dependence, their different input and output formats and the variety of data to analyze. As a consequence, distributed and collaborative software analysis scenarios and in particular interoperability are severely limited. We describe a distributed and collaborative software analysis platform that allows for a seamless interoperability of software analysis tools across platform, geographical and organizational boundaries. We realize software analysis tools as services that can be accessed and composed over the Internet. These distributed analysis services shall be widely accessible in our incrementally augmented Software Analysis Broker where organizations and tool providers can register and share their tools. To allow (semi)-automatic use and composition of these tools, they are classified and mapped into a software analysis taxonomy and adhere to specific meta-models and ontologies for their category of analysis. |
|
4th International Workshop on Software Product Management (IWSPM 2010), Edited by: S Fricker, A Aurum, Washington D.C., US, 2010. (Edited Scientific Work)
Product success depends on skilled and competent product management. In essence, a product manager decides what functionality and quality a product should offer, to which customers, and when in time, while assuring a winning business case. Software product management is particularly important when the product is envisioned, developed, and deployed in a global environment. Geographical distance and cultural differences need to be addressed when collaborating along the requirements value chain, while robust and effective integration need to be achieved when composing products along the supply chain. The 4th International Workshop on Software Product Management (IWSPM 2010) was held in conjunction with the 18th IEEE International Requirements Engineering Conference (RE'10) in Sydney, Australia. The workshop included a keynote from senior product managers, paper presentations, and discussions on state of knowledge and development of software product management. |
|
T Gorschek, S Fricker, K Palmer, S Kunsman, A lightweight innovation process for software-intensive product development, IEEE Software, Vol. 27, 2010. (Journal Article)
|
|
Thomas Hübner, A real-time vision-based mobile robot system, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2010. (Dissertation)
A large body of empirical evidence documents that people systematically violate the key axioms of the standard economic theories of choice over time and choice under risk. In response to the evidence, new models have been developed, incorporating hyperbolic time preferences or nonlinear probability weights. These models constitute pronounced departures from standard theory, and, as a consequence, are associated with several practical issues. They often fail at predicting more than one important empirical regularity and, hence, are not able to provide a unifying explanation for anomalous behavior in intertemporal and risky choice.
Motivated by these deficiencies, this thesis shows that environmental factors, such as
liquidity constraints or inherent uncertainty, can bridge the gap between standard
economic theory and effectively observed behavior. Anomalously-looking behavior may not necessarily be caused by exotic preferences, but can naturally arise from decision makers' rational responses to their environments. The predictions made by this approach dovetail nicely with existing empirical findings. Experimental data further support the theory's main conjectures and illustrate that it indeed has significant explanatory power. The results
presented have important implications for the design of proper policy interventions and the state of standard economic theory in general. |
|
Mei Wang, Abraham Bernstein, Marc Chesney, An experimental study on real option strategies, In: 37th Annual Meeting of the European Finance Association, 2010. (Conference or Workshop Paper published in Proceedings)
We conduct a laboratory experiment to study whether people intuitively use real-option strategies in a dynamic investment setting. The participants were asked to play as an oil manager and make production decisions in response to a simulated mean-reverting oil price. Using cluster analysis, participants can be classified into four groups, which we label as "mean-reverting", "Brownian motion real-option", "Brownian motion myopic real-option", and "ambiguous". We find two behavioral biases in the strategies by our participants: ignoring the mean-reverting process, and myopic behavior. Both lead to too frequent switches when compared with the theoretical benchmark. We also find that the last group behaves as if they have learned to incorporating the true underlying process into their decisions, and improved their decisions during the later stage. |
|
A Sperotto, G Schaffrath, R Sadre, C Morariu, A Pras, Burkhard Stiller, An overview of IP flow-based intrusion detection, IEEE Communications Surverys and Tutorials, Vol. 12 (3), 2010. (Journal Article)
Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches, such as flow-based intrusion detection. In that approach the flow of data through the network is analyzed, instead of the contents of each individual packet. The goal of this paper is to provide a survey of current research in the area of flow-based intrusion detection. The survey starts with a motivation why flow-based intrusion detection is needed. The concept of flows is explained, and relevant standards are identified. The paper provides a classification of attacks and defense techniques and shows how flow-based techniques can be used to detect scans, worms, Botnets and {dos} (DoS) attacks. |
|
Ausgezeichnete Informatikdissertationen 2009, Edited by: Steffen Hölldobler, Abraham Bernstein, et al, Gesellschaft für Informatik, Bonn, 2010. (Edited Scientific Work)
|
|
Matej Hoffmann, Hugo Gravato Marques, Alejandro Hernandez Arieta, Hidenobu Sumioka, Max Lungarella, Rolf Pfeifer, Body schema in robotics: a review, Autonomous Mental Development, Vol. 2 (4), 2010. (Journal Article)
How is our body imprinted in our brain? This seemingly simple question is a subject of investigations of diverse disciplines, psychology, and philosophy originally complemented by neurosciences more recently. Despite substantial efforts, the mysteries of body representations are far from uncovered. The most widely used notions-body image and body schema-are still waiting to be clearly defined. The mechanisms that underlie body representations are coresponsible for the admiring capabilities that humans or many mammals can display: combining information from multiple sensory modalities, controlling their complex bodies, adapting to growth, failures, or using tools. These features are also desirable in robots. This paper surveys the body representations in biology from a functional or computational perspective to set ground for a review of the concept of body schema in robotics. First, we examine application-oriented research: how a robot can improve its capabilities by being able to automatically synthesize, extend, or adapt a model of its body. Second, we summarize the research area in which robots are used as tools to verify hypotheses on the mechanisms underlying biological body representations. We identify trends in these research areas and propose future research directions. |
|
T Reinhard, Complexity Management in Graphical Models, University of Zurich, Faculty of Economics, Business Administration and Information Technology, 2010. (Dissertation)
|
|
Controlled Natural Language, Edited by: N E Fuchs, Springer, Berlin, Germany, 2010. (Edited Scientific Work)
This book constitutes the thoroughly refereed post-workshop proceedings of the Workshop on Controlled Natural Language, CNL 2009, held in Marettimo Island, Italy, in June 2009. The 16 revised full papers presented together with 1 invited lecture were carefully reviewed and selected during two rounds of reviewing and improvement from 31 initial submissions. The papers are roughly divided into the two groups language aspects and tools and applications. Note that some papers fall actually into both groups: using a controlled natural language in an application domain often requires domain-specific language features. |
|