Nonlinear Monte Carlo Methods with Polynomial Runtime for Bellman Equations of Discrete Time High-Dimensional Stochastic Optimal Control Problems. [PDF]
Beck C, Jentzen A, Kleinberg K, Kruse T.
europepmc +1 more source
Asymmetric sanctions and corruption: Theory and practice in China
Abstract Asymmetric punishment of partners in crime, intended to incentivize whistle‐blowing, may increase detection and deterrence. The idea is age‐old but its use against corruption is not frequent. We study a 1997 Chinese reform that strengthened such asymmetries for some forms of bribery.
Maria Perrotta Berlin +3 more
wiley +1 more source
A Conditional Privacy-Preserving Identity-Authentication Scheme for Federated Learning in the Internet of Vehicles. [PDF]
Xu S, Liu R.
europepmc +1 more source
Competition Law and Public Interest: A Challenge for Adjudication
ABSTRACT This paper engages with the increasing concern that competition law can no longer concentrate exclusively on a narrow focus on price increases and output diminution. Within the context of growing global inequality and the exponential increase in economic power in the hands of a few, there is a need to develop a coherent jurisprudence capable ...
Dennis M. Davis
wiley +1 more source
Gradient Descent Provably Escapes Saddle Points in the Training of Shallow ReLU Networks. [PDF]
Cheridito P, Jentzen A, Rossmannek F.
europepmc +1 more source
When in Doubt, Tax More Progressively? Uncertainty and Progressive Income Taxation
ABSTRACT We study the optimal income tax problem under parameter uncertainty about household preferences and wage dynamics. We derive conditions characterizing how such uncertainty affects optimal tax policy. To quantify the effect, we estimate a life‐cycle model using US data and a Bayesian approach.
Minsu Chang, Chunzan Wu
wiley +1 more source
Threshold Successive Cancellation Flip Decoding Algorithm for Polar Codes: Design and Performance. [PDF]
Liu Z +5 more
europepmc +1 more source
Network Games With Triadic Interactions
ABSTRACT We propose a model for network‐mediated interactions incorporating higher‐order relationships such as triadic interactions. The marginal utility of an individual's action depends explicitly on endogenous actions of multiple units. Conditions ensuring a unique Nash equilibrium are derived using a variational inequality approach. We estimate the
Wei Shi, Chunchao Wang, Pei Yu
wiley +1 more source
Cross-market volatility spillovers between China and the United States: A DCC-EGARCH-t-Copula framework with out-of-sample forecasting. [PDF]
Zeng J, Wu J.
europepmc +1 more source
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source

