Articles with "private information" as a keyword



Private information conflict: Lasius niger ants prefer olfactory cues to route memory

Sign Up to like & get
recommendations!
Published in 2019 at "Animal Cognition"

DOI: 10.1007/s10071-019-01248-3

Abstract: Foraging animals use a variety of information sources to navigate, such as memorised views or odours associated with a goal. Animals frequently use different information sources concurrently, to increase navigation accuracy or reliability. While much… read more here.

Keywords: quality; information; niger ants; lasius niger ... See more keywords

Double learning or double blinding: an investigation of vendor private information acquisition and consumer learning via online reviews

Sign Up to like & get
recommendations!
Published in 2018 at "Annals of Operations Research"

DOI: 10.1007/s10479-016-2243-z

Abstract: In this paper, building upon information acquisition theory and using portfolio methods and system equations, we made an empirical investigation into how online vendors and consumers are learning from each other, and how online reviews,… read more here.

Keywords: information; online reviews; private information; consumer ... See more keywords

Voluntary public good provision with private information using order statistics

Sign Up to like & get
recommendations!
Published in 2017 at "Economics Letters"

DOI: 10.1016/j.econlet.2016.11.005

Abstract: We study the voluntary provision of a public good with private information when inputs are not perfectly substitutable. Modeling the production function as a mixture of order statistics of individual efforts, we bridge the extreme… read more here.

Keywords: provision; order statistics; good provision; private information ... See more keywords
Photo from wikipedia

Private information in trades, R2, and large stock price movements

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Banking and Finance"

DOI: 10.1016/j.jbankfin.2021.106194

Abstract: Abstract We investigate the relations between trading-conveyed private information and stock return distributions. Using high-frequency measures of private information, we find that private information in trades is associated with lower stock return synchronicity. We also… read more here.

Keywords: stock price; information trades; private information; information ... See more keywords

A comparison of some structural models of private information arrival

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Financial Economics"

DOI: 10.1016/j.jfineco.2019.08.005

Abstract: We show that the PIN and the Duarte and Young (2009) (APIN) models do not match the variability of noise trade in the data and that this limitation has severe implications for how these models… read more here.

Keywords: information arrival; comparison structural; private information; models private ... See more keywords

Information from Inaction: Vested Options Unexercised and Firm Performance

Sign Up to like & get
recommendations!
Published in 2025 at "Review of Asset Pricing Studies"

DOI: 10.1093/rapstu/raaf006

Abstract: We hypothesize that when managers do not exercise their options, they signal valuable private information. Accordingly, we construct a proxy to capture managers’ private information from their in-the-money vested options unexercised (VOU) and find that… read more here.

Keywords: information; options unexercised; information inaction; performance ... See more keywords

Search Engine Based Proper Privacy Protection Scheme

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2885073

Abstract: In the era of the “Internet of everything,” people and devices are interconnected and keep exchanging private information, including confidential data about personal identity, locations, payments, transactions, and so on. The privacy leakage problem also… read more here.

Keywords: protection scheme; protection; information; private data ... See more keywords

Shared-Private Information Bottleneck Method for Cross-Modal Clustering

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2904554

Abstract: Recently, the cross-modal analysis has drawn much attention due to the rapid growth and widespread emergence of multimodal data. It integrates multiple modalities to improve learning and generalization performance. However, most previous methods just focus… read more here.

Keywords: cross modal; private information; method; information bottleneck ... See more keywords

On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2022.3142363

Abstract: In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of… read more here.

Keywords: colluding servers; capacity; qpir; quantum private ... See more keywords

Private Information Retrieval From a Cellular Network With Caching at the Edge

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2019.2906229

Abstract: We consider the problem of downloading content from a cellular network that is cached at the wireless edge while achieving privacy. In particular, we consider private information retrieval (PIR) of content from a library of… read more here.

Keywords: private information; cellular network; edge; network ... See more keywords

Private Information Retrieval Schemes With Product-Matrix MBR Codes

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.3003572

Abstract: A private information retrieval (PIR) scheme allows a user to retrieve a file from a database without revealing any information on the file being requested. As of now, PIR schemes have been proposed for several… read more here.

Keywords: retrieval; private information; mbr codes; pir ... See more keywords