skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Matching with Incomplete Information
We review the nascent field of matching with incomplete information and its connections to other areas of research. We also discuss open questions and argue that cooperative solution concepts offer new perspectives for applications.  more » « less
Award ID(s):
1824328
PAR ID:
10482397
Author(s) / Creator(s):
Publisher / Repository:
SSRN
Date Published:
Journal Name:
SSRN Electronic Journal
ISSN:
1556-5068
Subject(s) / Keyword(s):
Matching, Incomplete Information, Cooperative Games
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over the guidelines of the CA Forum, root management programs, and other PKI requirements. Examining PKI from the perspective of business practices, we identify a taxonomy of failures and identify systemic vulnerabilities in the governance and practices in PKI. Notorious cases include the “backdating” of digital certificates, the issuance of these for MITM attempts, the lack of verification of a requester’s identity, and the unscrupulous issuance of rogue certificates. We performed a detailed study of 379 of these 1300 incidents. Using this sample, we developed a taxonomy of the different types of incidents and their causes. For each incident, we determined if the incident was disclosed by the problematic CA. We also noted the Root CA and the year of the incident. We identify the failures in terms of business practices, geography, and outcomes from CAs. We analyzed the role of Root Program Owners (RPOs) and differentiated their policies. We identified serial and chronic offenders in the PKI trusted root programs. Some of these were distrusted by RPOs, while others remain being trusted despite failures. We also identified cases where the concentration of power of RPOs was arguably a contributing factor in the incident. We identify these cases where there is a risk of concentration of power and the resulting conflict of interests. Our research is the first comprehensive academic study addressing all verified reported incidents. We approach this not from a machine learning or statistical perspective but, rather, we identify each reported public incident with a focus on identifying patterns of individual lapses. Here we also have a specific focus on the role of CAs and RPOs. Building on this study, we identify the issues in incentive structures that are contributors to the problems. 
    more » « less
  2. null (Ed.)
    We discuss computational and qualitative aspects of the fractional Plateau and the prescribed fractional mean curvature problems on bounded domains subject to exterior data being a subgraph. We recast these problems in terms of energy minimization, and we discretize the latter with piecewise linear finite elements. For the computation of the discrete solutions, we propose and study a gradient flow and a Newton scheme, and we quantify the effect of Dirichlet data truncation. We also present a wide variety of numerical experiments that illustrate qualitative and quantitative features of fractional minimal graphs and the associated discrete problems. 
    more » « less
  3. As requirements for swift and sustainable data sharing are growing, questions of where and how researchers are sharing data are becoming increasingly important for institutions to answer. One of the goals of the Reality of Academic Data Sharing (RADS) Initiative, comprised of six academic institutions from the Data Curation Network (DCN), was to answer this question. This presentation will discuss the process of how RADS determined where data from our researchers are shared. To do this, we programmatically pulled DOIs from DataCite, making the naive assumption that the information we were collecting, the metadata fields we were utilizing, and the platforms we were using would present us with a neutral and unbiased view of where data from our affiliated researchers were shared. However, as we dug into the data, we found inconsistencies in the use and completeness of the necessary metadata fields for our questions, as well as differences in how DOIs were assigned across repositories. While we expected some differences, we did not anticipate these subtle differences would dramatically affect how we interpret the answer to the question of where data are shared. Our presentation will highlight examples in our work that show how these subtleties in the data are systematic and challenge our assumptions of neutrality of not just the data, but of our platforms and practices as well. By examining these biases, we are forced to reexamine the decisions behind how we practice and, as we move forward as information and repository managers, how to reduce bias or assumption of neutrality. As a community, we often rely on data-driven decisions and decision makers need to be aware of these biases, especially as we are likely to see increased investments due to the evolving data policies and practices. 
    more » « less
  4. In this article, we reflect on our experience applying a framework for evaluating systems change to an evaluation of a statewide West Virginia alliance funded by the National Science Foundation (NSF) to improve the early persistence of rural, first-generation, and other underrepresented minority science, technology, engineering, and mathematics (STEM) students in their programs of study. We begin with a description of the project and then discuss the two pillars around which we have built our evaluation of this project. Next, we present the challenge we confronted (despite the utility of our two pillars) in identifying and analyzing systems change, as well as the literature we consulted as we considered how to address this difficulty. Finally, we describe the framework we applied and examine how it helped us and where we still faced quandaries. Ultimately, this reflection serves two key purposes: (1) to consider a few of the challenges of measuring changes in systems, and (2) to discuss our experience applying one framework to address these issues. 
    more » « less
  5. Cornejo, C; Felmer, P; Gómez, D_M; Dartnell, P; Araya, P; Peri, A; Randolph, V (Ed.)
    In this theoretical essay we propose the adoption of a single definition for Opportunities to Learn (OtL), and we theorize how OtL provides a basis for inclusive mathematics education. We begin by providing our theoretical framework in which we apply a critical perspective that serves to shift attention toward educational and societal systems, structures, resources and power dynamics and away from individuals, their families and communities as the drivers of educational achievement. We describe numerous common ways that OtL has been used, and we propose the adoption of a single robust definition of OtL. We then theorize how this specific definition supports a precise conceptualization of inclusive mathematics education. 
    more » « less