text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Can you notate a function as an argument of another function?. <p>So I'm writing a research paper. It's a computer science paper and I have written the following expression for calculating the average similarity of a set of images: <span class="math-container">\begin{equation} \alpha(X) = \sum_{\{x_1,x_2\} \in [X]^2} \frac{f(x_1,x_2)}{\vert[X]^2\vert} \end{equation}</span></p> <p>where <span class="math-container">$\alpha(X)$</span> iterates through all pairs within set of images <span class="math-container">$X$</span>, and <span class="math-container">$f(x_1,x_2)$</span> is a measure of similarity between the pairs.</p> <p>I'm trying to demonstrate that <span class="math-container">$f(x_1,x_2)$</span> can be either a computational measure of similarity (using some computer vision technique for example), or a human inputted one.</p> <p>Would it be appropriate to demonstrate this with the following notation <span class="math-container">\begin{align} \alpha(X,f) &amp;= \sum_{\{x_1,x_2\} \in [X]^2} \frac{f(x_1,x_2)}{\vert[X]^2\vert} \\ \end{align}</span></p> <p>so that when I refer to the computational or human version I can write <span class="math-container">$\alpha(X,f^\mathit{comp})$</span> or <span class="math-container">$\alpha(X,f^\mathit{hum})$</span> respectively?</p>
0non-cybersec
Stackexchange
[WP] To the best of your knowledge, you have been the last person alive for the past 6 years. Your iPhone, however, has somehow regularly received updates this entire time. You have dedicated the rest of your life to finding out the cause and reason of these updates..
0non-cybersec
Reddit
Meddler on XP and leveling to 30 - "What we're going to do instead, probably in the next patch, is lower the total amount of XP needed to get to 30 by around half...".
0non-cybersec
Reddit
Evaluate: $ \int_0^1 \int_y^1 e^{x^2 }dxdy$. <blockquote> <p>Evaluate: $$ \int_0^1 \int_y^1 e^{x^2 }dxdy=?$$</p> </blockquote> <p>MyTry :</p> <p>$$\begin{align} \int_0^1 \big(\int_y^1 e^{x^2 }dx\big)dy=?\end{align}$$</p> <p>Now what ? </p> <p>$$I=\big(\int_y^1 e^{x^2 }dx\big)=?$$</p>
0non-cybersec
Stackexchange
Trigonometric Ratios Of Multiple Angles. <p>If $2\tan A=3\tan B$ then prove that $$\tan(A-B)=\frac{\sin2B}{5-\cos 2B}.$$</p> <p>I found that $\tan A=\frac{3}{2} \tan B$ and after that used the formula of $\tan (A-B)=\frac{\tan A-\tan B}{1+\tan A\tan B}$ but could not reach to the required answer.</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Probability based on partially ordered sets. <p>Is there any alternative study of "probability" where random variables are defined as maps between a sample space and a <a href="https://en.wikipedia.org/wiki/Partially_ordered_set" rel="noreferrer">partially ordered set</a>, rather than a sample space and the real interval $[0,1]$? If it exists, what is this theory called and what are some good references?</p> <p>In such a setting, one could talk about one event being more likely than another, but perhaps not about the absolute probabilty of an event occurring.</p> <p>I googled around, but what I found were different concepts involving partially ordered sets and probability (e.g., defining stochastic processes on partially ordered sets to generalize the concept of "time"), but not what I'm talking about.</p>
0non-cybersec
Stackexchange
Is it possible to mount a partition only for some users?. <p>This thread comes from <a href="https://android.stackexchange.com/questions/123615/external-ext4-card-mounted-only-for-root-on-android-5-1-64-bits">here</a>. Even when it is an Android question, I think the theoretical command line part should better be asked here.</p> <p>In short: I have achieved to mount a Ext4 file system, but this mount only <strong>exists for root</strong> user.</p> <p><strong>Details</strong>:</p> <pre><code>root@unknown:/ # mount | grep "sdcard" -i /dev/block/mmcblk1p1 /storage/sdcard1 ext4 rw,seclabel,relatime,data=ordered 0 0 root@unknown:/ # exit u0_a98@unknown:/ $ mount | grep "sdcard" u0_a98@unknown:/ $ mount | grep "mmcblk" </code></pre> <p>As can be seen, the <strong>normal user can not see</strong> the device as mounted. This is, obviously, very different from having <em>no permissions</em> to access it.<br> This could be some sort of bug, by the way.</p> <p>Or <strong>is it possible</strong> to do this on Linux?</p>
0non-cybersec
Stackexchange
Looks like fun.....
0non-cybersec
Reddit
My main hard drive on ubuntu has no free space left. <p>I have a hard drive that keeps filling up with data, but I'm unable to figure out what is causing it. I tried moving files, but the system just replaces that data with more useless data. This made it tough for me to install anything on my drive. </p> <p>As soon as I restart my computer after removing files, the info box says:</p> <blockquote> <p>Free space: 0 bytes</p> </blockquote> <p>I've even freed a gig of data on my hard drive but it still goes back to reducing my free space down to zero. I've looked all over the place, but I couldn't find anything useful that I could use to help me. Disks is telling me that File Partition 6 74 GB Ext 4 is completely full. File Partition 6 Ext 4 is my Root and Home partition. Unfortunately I'm unable to send a screen shot of the program because I can't open my web browser at the moment, so I'm using my Windows laptop to report the problem. My current Linux system is Xubuntu 16.04 LTS.</p>
0non-cybersec
Stackexchange
[Singapore] Red light running van hits little car.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Are these two functors same (isomorphic)?. <p>Let <span class="math-container">$\mathscr{C}$</span> be the category of schemes (that is the category of schemes over <span class="math-container">$\mathrm{Spec}(\mathbb{Z})$</span>), <span class="math-container">$X,Y$</span> be two schemes. Then we can have two functors: <span class="math-container">$\mathscr{C}^{op}\to \{\mathrm{Sets}\}$</span>, one is <span class="math-container">$h_{X\coprod Y}$</span> (<span class="math-container">$X\coprod Y$</span> is the disjoint union (or coproduct) of <span class="math-container">$X,Y$</span>), where <span class="math-container">$h_{X\coprod Y}(T)$</span> is the <span class="math-container">$Mor(T, X\coprod Y)$</span> for all scheme <span class="math-container">$T$</span>. The other is <span class="math-container">$h_{X}\coprod h_{Y}$</span> defined by <span class="math-container">$(h_{X}\coprod h_{Y})(T)=Mor(T,X)\coprod Mor(T,Y)$</span>. I think these two functors are not isomorphic.</p> <p>For example, if <span class="math-container">$T=X\coprod Y$</span>, then we have <span class="math-container">$\mathrm{id}: T\to X\coprod Y$</span> which belongs to <span class="math-container">$h_{X\coprod Y}(T)$</span>,but we could not find an element in <span class="math-container">$(h_{X}\coprod h_{Y})(T)$</span> which corresponds it. Hence there is no canonical isomorphism between <span class="math-container">$h_{X\coprod Y}(T)$</span> and <span class="math-container">$(h_{X}\coprod h_{Y})(T)$</span>. Thus these two functors are not isomorphic. Am I right?</p>
0non-cybersec
Stackexchange
IBM MobileFirst certificate pinning best practices. <p>We are developing an IBM MobileFirst 7.1 Hybrid mobile application, and planning to use the certificate pinning feature.</p> <p>We can find information on IBM website about the SSL certificate pinning on IBM MobileFirst website : <a href="https://www.ibm.com/support/knowledgecenter/SSHS8R_7.1.0/com.ibm.worklight.dev.doc/monitor/c_cert_pinning_intro.html" rel="noreferrer">Here is a post in the IBM Knowledge Center</a> and <a href="https://mobilefirstplatform.ibmcloud.com/blog/2015/08/14/certificate-pinning-in-ibm-mobilefirst-platform-foundation-7-1/" rel="noreferrer">Here is a tutorial</a> and <a href="https://github.com/IdanAdar/CertificatePinningProject" rel="noreferrer">its sample project/code</a></p> <p>All these resources are great, but I have some questions :</p> <ul> <li>Are there any advantages to use native certificate pinning implementation for Android and iOS when my application is a hybrid application ? </li> <li>If I use the hybrid environment code, will the SSL certificate be included in the wlapp, and then can be updated using direct update ?</li> <li>Does the hybrid implementation of certificate pinning work on WindowsPhone 8 (Hybrid app for Silverlight environment) ?</li> <li>In the tutorial video, I have seen that when SSL pinning is ON, and we call a URL outside our server (google for example) it will fail. Does this mean google maps will fail loading if I enable certificate pinning ? </li> <li>What happen when the SSL certificate is revoked ?</li> <li>What happen when the SSL certificate is expired ?</li> <li>What is the best SSL renewal strategy to keep certificate pinning working and the application up while updating our server SSL certificate ?</li> </ul> <p>Please advice</p>
0non-cybersec
Stackexchange
Vector bundle with flat connection over simply connected manifold is trivial. <p>I am trying to finish a proof of the statement in the title. Let <span class="math-container">$M$</span> be a simply connected smooth manifold and <span class="math-container">$E \twoheadrightarrow M$</span> be a vector bundle with a flat connection. Since the bundle is flat we can choose a local trivialization at every point such that the connection is trivial in all trivializations (with null 1-form matrix). Because of this, and because of the transition formula between the connection matrices of 1-forms, the transition functions between such trivializations are constant. I would like to use this fact, together with the simple connectedness of <span class="math-container">$M$</span> to either reduce the structure group to the trivial group or to build a basis of global sections, but I am a bit rusty with these proofs and I cannot come up with an intelligent idea to do this. Any hint?</p>
0non-cybersec
Stackexchange
How to anonymize the programs from the terminal?. <p>How to anonymize the programs from your terminal (such as <code>wget</code>, <code>curl</code>, etc.)?</p>
0non-cybersec
Stackexchange
New York files suit against Trump, alleging his charity engaged in ‘illegal conduct’.
0non-cybersec
Reddit
Koran art exhibit pulled in France after near riot - The Local.
0non-cybersec
Reddit
Laravel / Eloquent Model Attribute Visibility. <p>Previously ORM's i've used have mapped database columns directly to class properties which allowed you to specific property visibility, just as you normally would to restrict access to certain properties e.g. passwords.</p> <p>With Eloquent i can't seem to replicate this because database columns are mapped to the internal attributes array which contain no visibility.</p> <p>My desire is to restrict the scope of access to a user password to only the object i.e. private.</p> <p>Setting a class property with visibility doesn't work because this property is then outside the scope of the Eloquent model attributes and thus the property is not mapped to the column.</p> <p>Eloquent $hidden and $guarded properties do not work as these deal with mass output (toArray, toJSON) and mass assignment rather than direct assignment.</p> <p>I have attempted to use the accessors/mutators (getters/setters) in order to achieve this with mixed results.</p> <p>Specifying the visibility on the accessor doesn't work because the accessor method called (e.g. getPasswordAttribute) is called from Eloquent\Model->getAttribute method and as such public/protected will always work and private will always fail regardless of where the attribute it accessed from.</p> <p>What does work however is to stop the Eloquent accessor returning the attribute altogether so any request to $user->password or $user->getAttribute ('password') fails, and then having a separate method with visibility defined in order to return the attribute directly from the Eloquent attributes array only in the scope allowed e.g.</p> <pre><code>/** * Return password string only for private scope * @return string */ private function getPassword () { return $this-&gt;attributes['password']; } /** * Don't return password with accessor * @param string $password Password * @return void * @throws Exception */ public function getPasswordAttribute ($password) { throw new Exception ('Password access denied'); } </code></pre> <p>This same approach also works for mutators (setters) for anyone wanting setter method visibility.</p> <p>Does this seem correct or is there a better "Laravel-Approved" way of dealing with this? :)</p>
0non-cybersec
Stackexchange
How to easily scan a website for destructive malware..
0non-cybersec
Reddit
Misty day near the peak of El Yunque rainforest in Puerto Rico, incredibly beautiful.
0non-cybersec
Reddit
[Season 1/AGoT Spoilers] Joffery gets internet access..
0non-cybersec
Reddit
mocking a singleton class. <p>I recently read that making a class singleton makes it impossible to mock the objects of the class, which makes it difficult to test its clients. I could not immediately understand the underlying reason. Can someone please explain what makes it impossible to mock a singleton class? Also, are there any more problems associated with making a class singleton?</p>
0non-cybersec
Stackexchange
Concerning: presentations of rational numbers into sums. <p>Problem: Prove that all positive rational numbers can be expressed as the finite sum of different numbers $\displaystyle \frac {1} {n}$ ($n$ is a natural number).</p> <p>Example: $\displaystyle \frac {19}{16}=1+ \frac {1}{8} + \frac {1}{16}.$</p> <p>*We cant sum numbers as $\displaystyle \frac {3}{16}$ (denominator > 1) but we can sum $\displaystyle \frac {1}{8}+ \frac {1}{16}.$</p> <p>Any solutions? Suggestions?</p>
0non-cybersec
Stackexchange
[WDYWT] My outfit to go to the grocery store and pick up oat milk.
0non-cybersec
Reddit
Artwork i had commissioned of my puppy Oni and her namesake Onyxia..
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Finding the Sum of a series $\frac{1}{1!} + \frac{1+2}{2!} +\frac{1+2+3}{3!}+...$. <p>I need to find the sum of this series $$\dfrac{1}{1!} + \dfrac{1+2}{2!} + \dfrac{1+2+3}{3!}+\ldots$$ But somehow I am not even convinced this converges. I tried writing it as $\sum \dfrac{n(n+1)}{2(n!)}$. I also tried to rewrite it as a telescoping series. But I seem to be stuck. Some hints on where I am going wrong would help. I am supposed to get the answer as $\dfrac{3e}{2}$.</p>
0non-cybersec
Stackexchange
Is it well-defined behavior to return a vector of const char*, filled inside a function. <p>I am currently learning vulkan. In one of the tutorials I saw a function which roughly does the following:</p> <pre><code>#define SOMESTRING "Hello World!" std::vector&lt;const char*&gt; buildVector() { std::vector&lt;const char*&gt; vec; vec.push_back(SOMESTRING); return vec; } </code></pre> <p>When I saw this, I was wondering: is this defined behavior? Isn't the content of the string <code>"Hello World!"</code> located on the stack and thus is invalid once the function returns? If this is undefined behavior, what would be the correct way to do this? Unfortunately, using <code>std::string</code> is not an option because of the vulkan API.</p>
0non-cybersec
Stackexchange
On a certain sphere-packing problem. <p>Suppose we have a closed ball <span class="math-container">$S$</span> of radius <span class="math-container">$r$</span> centered at the origin <span class="math-container">$O$</span> of <span class="math-container">$\mathbb{R}^3$</span>. Suppose further that we are given a point <span class="math-container">$v$</span> on the ball's boundary (i.e., <span class="math-container">$\|v\|=r$</span>), and a point <span class="math-container">$u$</span> in the ball's interior (i.e., <span class="math-container">$\|u\|&lt;r$</span>). We assume that <span class="math-container">$v$</span> and <span class="math-container">$u$</span> are not too far from each other, so <span class="math-container">$\|v-u\| \leq r$</span>. Let <span class="math-container">$\theta$</span> denote the angle between the vectors <span class="math-container">$\overrightarrow{vO}$</span> and <span class="math-container">$\overrightarrow{vu}$</span>. </p> <blockquote> <p>Is it true that the ball <span class="math-container">$S'$</span> of radius <span class="math-container">$\|v-u\| \cos \theta$</span> centered at <span class="math-container">$u$</span> is contained in <span class="math-container">$S$</span>? </p> </blockquote> <p>And if not, is there any (interesting) radius of the form <span class="math-container">$\|v-u\|f(\theta)$</span> which works?</p> <p>This arose in the context of an (elementary) differential geometry problem. We're asked to prove that the osculating circles of a curve <span class="math-container">$\mathbf{r}(t)$</span> (with certain hypotheses on the curve) on some sphere <span class="math-container">$S$</span> centered at the origin must be contained within sphere. The above claim is one avenue of attack I'm attempting, but it also makes for an interesting geometric problem in and of itself. </p> <p>The intuition seems fairly clear. If the angle <span class="math-container">$\theta$</span> is large, there is much little wiggle room for the ball containing <span class="math-container">$u$</span>, and <span class="math-container">$\cos \theta$</span> comes off as a natural factor. Also, the extreme cases <span class="math-container">$\theta=0$</span> or <span class="math-container">$\theta=\frac{\pi}{2}$</span> seem to be okay.</p>
0non-cybersec
Stackexchange
Parallels Virtuozzo under Windows. <p>Here the logic chain:</p> <ol> <li>Virtuozzo is a commercial version of OpenVZ</li> <li>OpenVZ works by modifying the core of hosting OS, so it doesn't support Windows</li> <li>Virtuozzo supports Windows</li> </ol> <p>I do not understand how we can come to the fact that Virtuozzo supports Windows (but it really does). Have they modified Windows core some way? Or may be there are some other way?</p>
0non-cybersec
Stackexchange
Not sure how I stumbled on this but WHAT THE *UCK?.
0non-cybersec
Reddit
My Ciri from The Witcher 3 cosplay.
0non-cybersec
Reddit
I want to Automate saving all characters of a font in Photoshop. <p>So I have a square Photoshop document, containing 1-character text from a font I like, and with special effects (drop shadow, emboss, etc...).</p> <p>The manual way is I type a character, then save a PNG. I have to repeat this for the other characters.</p> <p>How can I automate saving the letters A-Z, a-z, and 0-9 using actions?</p>
0non-cybersec
Stackexchange
Find the amplitude of the steady state solution. <p>Heave motion of a point energy absorber in the form of a buoy due t incident wave of frequency $w$ and amplitude $a$ is described by</p> <p>$(m+m_a)y'' + (c_h + c_e)y' +ky = F_i(t)$</p> <p>$F_i(t)=aF(w)\cos(wt)$ is the hydrodynamic force acting on the buoy due to incident wave.</p> <p>When the waves first arrive at the buoy there are transient parts to the solution which die down as time progresses until a steady state oscillation is established. The steady state oscillation of the buoy is described</p> <p>$y(t)=Y\cos(wt+d)$</p> <p>(i)Find the amplitude Y of the steady state solution.</p> <p>So i have differentiated $y(t)=Y\cos(wt+d)$ to find $y''$ and $y'$ and I have substituted this into the given equation but I am not really sure what I need to do next nothing seems to cancel. Is this right? Do I need to substitute $F_i(t)$ for $aF(w)\cos(wt)$?</p> <p>Thanks</p>
0non-cybersec
Stackexchange
Help with graph search problem. <p>For the next problem I can not think of how to find a solution with graph searches (I thought it was backtracking but my college professor told me that I should use graph searches, which I do not know much about, to solve it).</p> <p>As input we obtain a matrix (3x4) of connections ("|" or "-") which we must decode in the least amount of movements, to avoid that the bomb explodes. As an output inform one of the possible solutions.</p> <p>The decoding consists in that the matrix must contain only characters "-". To achieve this they tell us that if we move an element of the matrix, both the values ​​of the column and row of the matrix change. For example if I move the element (0,0) of the matrix in this case the "-" change to "|" and vice versa in the column 0 and row 0. In the image (where (1) represents the input matrix and (2) the decoded matrix) a solution to inform would be:</p> <p><code>move (0,3) and then (2,1)</code></p> <p><a href="https://i.stack.imgur.com/sxQEZ.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/sxQEZ.png" alt="enter image description here"></a></p> <p>How to design an algorithm that solves this problem without using backtracking directly?</p>
0non-cybersec
Stackexchange
Invoke-command specify scriptblock on the same line. <p>I was wondering is it possible to pass a tiny script into the ScriptBlock parameter but do it all in one line?</p> <p>For instance, I want to run the following 2 commands:</p> <p>import-module lync get-csuser</p> <p>I can do this if I have a powershell script file and call that file explicitly. The contents of the script look like this</p> <pre><code>invoke-command -ComputerName mycomputer.mylab.com -ScriptBlock { import-module lync get-csuser } </code></pre> <p>I want to be able to do the above without putting this into a temporary script file and do it on one lime. Is this possible?</p> <p>Thanks</p>
0non-cybersec
Stackexchange
Implementing GraphQL (GraphQL for .Net) in ASP.NET Core, why is my Query:ObjectGraphType class not being registered by dependency injection?. <p>I've setup a basic Web Api demonstrate the use of GraphQL using ASP.Net Core. I've Followed a tutorial, what feels like exactly but am getting an error I don't understand.</p> <p>I'm using GraphQL for .NET v2.4.0</p> <p>This is the error:</p> <pre><code>System.InvalidOperationException: No service for type 'Land.GraphQL.Queries.LandQuery' has been registered. at at Microsoft.Extensions.DependencyInjection.ServiceProviderServiceExtensions.GetRequiredService(IServiceProvider provider, Type serviceType) at at GraphQL.FuncDependencyResolver.Resolve(Type type) at at GraphQL.FuncDependencyResolver.Resolve[T]() at Land.GraphQL.LandSchema..ctor(IDependencyResolver resolver) in .../LandSchema.cs:11 </code></pre> <p>I'd be grateful for any light shed :)</p> <p>Here's the code:</p> <p>I created a LandType:ObjectGraphType to define the Type:</p> <pre><code> public class LandType : ObjectGraphType&lt;Entities.Land&gt; { public LandType(ILandDataAccess landDataAccess) { Name = "Land"; Field(land =&gt; land.Id, type: typeof(IdGraphType)).Description("Land Id in LandApi context"); Field(land =&gt; land.Apn) .Description( "Assessor's Parcel Number (APN) is a unique number that is assigned to each tract of land in a county by the Tax Assessor."); Field(land =&gt; land.Address).Description(""); Field(land =&gt; land.ZipCode).Description(""); Field(land =&gt; land.City).Description(""); Field(land =&gt; land.County).Description(""); Field(land =&gt; land.State).Description(""); Field(land =&gt; land.Country).Description(""); Field(land =&gt; land.GisNumber).Description(""); Field(land =&gt; land.AssessedValue).Description(""); Field(land =&gt; land.LegalDescription).Description(""); Field(land =&gt; land.Acreage, type: typeof(FloatGraphType)).Description("Acreage of Land"); } } </code></pre> <p>I created a LandQuery:ObjectGraphType to define the Query:</p> <pre><code>public class LandQuery : ObjectGraphType { public LandQuery(ILandDataAccess dataAccess) { Field&lt;ListGraphType&lt;LandType&gt;&gt;( "Land", resolve: context =&gt; dataAccess.GetLandsAsync()); } } </code></pre> <p>I created a LandSchema:Schema to define the Schema:</p> <pre><code>public class LandSchema : Schema { public LandSchema(IDependencyResolver resolver) : base(resolver) { Query = resolver.Resolve&lt;LandQuery&gt;(); } } </code></pre> <p>I added the service and middleware to the Startup file:</p> <pre><code>public void ConfigureServices(IServiceCollection services) { services.AddScoped&lt;IDependencyResolver&gt;(s =&gt; new FuncDependencyResolver( s.GetRequiredService)); services.AddScoped&lt;LandSchema&gt;(); services.AddGraphQL(o =&gt; { o.ExposeExceptions = true; }) .AddGraphTypes(ServiceLifetime.Scoped); } public void Configure(IApplicationBuilder app, IHostingEnvironment env) { app.UseGraphQL&lt;LandSchema&gt;(); } </code></pre> <hr> <p>Edit:</p> <p>Thanks to the commenters @NateBarbettini and @TonyNgo inspired me to find the answer. Turns out <code>.AddGraphTypes</code> only searches the calling assembly. My GraphTypes are stored in a referenced Assembly. passing the referenced assembly fixed the problem: <code>.AddGraphTypes(typeof(LandSchema).Assembly, ServiceLifetime.Scoped);</code></p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Ramleh - Bite The Bolster [Power Electronics].
0non-cybersec
Reddit
Female Air France crew can opt out of Iran flights over headscarf, official says.
0non-cybersec
Reddit
Green riding the original, single horned, Charizard! One of my favorites by Ken Sugimori!.
0non-cybersec
Reddit
Metro station.
0non-cybersec
Reddit
Batman walks into a room which alfred is ìn, late at night.. "Alfred could you fill up the bathtub please" batman said after entering the room. Alfred replied with, "what's a htub sir?"
0non-cybersec
Reddit
Floor.
0non-cybersec
Reddit
ELI5: Why do Americans write the date differently to everyone else?. While I'm not certain it's the rest of the world, in Europe the date is written day/month/year, which - to me - seems entirely logical. So how did it come to be that Americans write the date month/day/year?
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Sharing remote folder in subdir. <p>I want to use a remote shared folder use in a subdirectory. For example the share \somePC\folder => x:\folder\somePCsRemoteFolder </p> <p>is there an easy way to do this ?</p> <p>endo</p>
0non-cybersec
Stackexchange
Mobile Augmented Reality Latest Trend.
0non-cybersec
Reddit
End-extension in G&#246;del&#39;s constructible universe. <p>Given two ordinals <span class="math-container">$\alpha &lt; \beta$</span>, considering the subsets of Gödel's constructible universe, one say that <span class="math-container">$L_\beta$</span> is a <span class="math-container">$\Sigma_n$</span> end-extension of <span class="math-container">$L_\alpha$</span> (and <span class="math-container">$L_\alpha$</span> is an <span class="math-container">$\Sigma_n$</span> elementary submodel of <span class="math-container">$L_\beta$</span>), written <span class="math-container">$L_\alpha \prec_{\Sigma_n} L_\beta$</span>, when for all <span class="math-container">$\Sigma_n$</span> formulas <span class="math-container">$\varphi$</span>, <span class="math-container">\begin{align} L_\beta \models \varphi \iff L_\alpha \models \varphi \end{align}</span></p> <p>Given such sets <span class="math-container">$L_\beta$</span> there exists results, showed by Jensen and others using Skolem functions, that helps us constructing elementary submodels <span class="math-container">$L_\alpha \subset L_\beta$</span>. However I have had a hard time finding results that lets us do the converse, that is constructing end-extensions <span class="math-container">$L_\delta \supset L_\beta$</span>. </p> <blockquote> <p>Does there exists such general results about end-extension of Gödel's constructible sets ?</p> </blockquote> <p>And more particulary, let (<span class="math-container">$\zeta$</span>, <span class="math-container">$\Sigma$</span>) be the least ordered-pair such that <span class="math-container">$L_\zeta \prec_{\Sigma_2} L_\Sigma$</span>, as characterized by Welch using infinite time Turing machines or by Harrington using <span class="math-container">$\Sigma_2$</span> truth sets :</p> <blockquote> <p>Can we find an ordinal <span class="math-container">$\kappa &gt; \Sigma$</span> such that <span class="math-container">$L_\Sigma \prec_{\Sigma_2} L_\kappa$</span> ? And if so, can we continue this sequence of end-extensions <span class="math-container">$\zeta, \Sigma, \kappa \ldots$</span> ?</p> </blockquote>
0non-cybersec
Stackexchange
I'm a DJ, and I play a knock-off version of 'Everybody' by a group called Bachelor Party, instead of the original Backstreet Boys version.. Nobody has ever noticed.
0non-cybersec
Reddit
So Sorry - Tolerate or Die EP [Saturday Night Original progressive Alt rock/punk].
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Fresh strawberries with orange, lemongrass and Thai-basil dressing.
0non-cybersec
Reddit
Why not have many edges instead of one edge connecting to many nodes (in hypergraphs). <p>As a follow-up to <a href="https://mathoverflow.net/questions/13750/what-are-the-applications-of-hypergraphs">What are the Applications of Hypergraphs</a>, the linked article:</p> <p><a href="https://www.microsoft.com/en-us/research/publication/learning-hypergraphs-clustering-classification-embedding/?from=http%3A%2F%2Fresearch.microsoft.com%2Fen-us%2Fum%2Fpeople%2Fdenzho%2Fpapers%2Fhyper.pdf" rel="nofollow noreferrer">Learning with Hypergraphs: Clustering, Classification, and Embedding</a></p> <p>Mentions this:</p> <blockquote> <p>Let us consider a problem of grouping a collection of articles into different topics. Given an article, assume the only information that we have is who wrote this article. One may construct an undirected graph in which <strong>two vertices are joined together by an edge if there is at least one common author of their corresponding articles</strong>...</p> <p>A natural way of remedying the information loss issue occurring in the above methodology is to represent the data as a hypergraph instead. A hypergraph is a graph in which an edge can connect more than two vertices [2]. In other words, <strong>an edge is a subset of vertices</strong>. In what follows, we shall unifiedly refer to the usual undirected or directed graphs as simple graphs. Moreover, without special mentioning, the referred simple graphs are undirected. It is obvious that a simple graph is a special kind of hypergraph with each edge containing two vertices only. In the problem of clustering articles stated before, it is quite straightforward to construct a hypergraph with the vertices representing the articles, and the edges the authors (Figure 1). <strong>Each edge contains all articles by its corresponding author</strong>.</p> </blockquote> <p>What I'm wondering is, instead of using <em>1 edge with many vertices</em>, why not use <em>many edges</em>. That way it's just like a normal graph, not a hypergraph.</p> <p>I don't yet understand the value in making 1 edge become essentially like a new type of node, if you could do the same thing by creating many edges. In hypergraphs they even call these new things "tentacles" or "attachments", connecting the edge to many things. Then it's like an edge is just another node. Hoping for some clarification on why this is necessary or what advantage this provides that multiple edges can't accomplish.</p>
0non-cybersec
Stackexchange
Nier: Automata'a Uplifting Existentialism (Story Discussion) - Super Bunnyhop.
0non-cybersec
Reddit
Puppies being total jerks.
0non-cybersec
Reddit
Something light brown..
0non-cybersec
Reddit
First network in hyperledger. <p>I am trying to work on my first network in Hyperledger Fabric. Using the following documentation <a href="http://hyperledger-fabric.readthedocs.io/en/latest/build_network.html" rel="nofollow noreferrer">http://hyperledger-fabric.readthedocs.io/en/latest/build_network.html</a></p> <p>I have completed the setup till <a href="http://hyperledger-fabric.readthedocs.io/en/latest/build_network.html#create-join-channel" rel="nofollow noreferrer">http://hyperledger-fabric.readthedocs.io/en/latest/build_network.html#create-join-channel</a></p> <p>but when I run the </p> <pre><code>peer channel create -o orderer.example.com:7050 -c $CHANNEL_NAME -f ./channel-artifacts/channel.tx --tls $CORE_PEER_TLS_ENABLED --cafile /opt/gopath/src/github.com/hyperledger/fabric/peer/crypto/ordererOrganizations/example.com/orderers/orderer.example.com/msp/tlscacerts/tlsca.example.com-cert.pem </code></pre> <p>I got error as </p> <blockquote> <p><strong>Error: Got unexpected status: BAD_REQUEST</strong></p> </blockquote> <p>Searching for the issue i came across <a href="http://hyperledgerdocs.readthedocs.io/en/latest/asset_trouble.html" rel="nofollow noreferrer">http://hyperledgerdocs.readthedocs.io/en/latest/asset_trouble.html</a></p> <p>Hence I've tried to use a new channel name as given(old channel name=mychannel), I've tried below cmds</p> <p><code>CORE_PEER_COMMITTER_LEDGER_ORDERER=orderer:7050 peer channel create -c myc1</code></p> <p><code>CORE_PEER_COMMITTER_LEDGER_ORDERER=orderer.example.com:7050 peer channel create -c myc1</code></p> <p><code>CORE_PEER_COMMITTER_LEDGER_ORDERER=172.18.0.2:7050 peer channel create -c myc1</code></p> <p>For all the three I am getting error</p> <blockquote> <p><strong>Error: Ordering service endpoint is not valid or missing Usage: peer channel create [flags]</strong></p> </blockquote> <p>Also I've tried to skip it assuming the channel is already created. hence ran</p> <pre><code>peer channel join -b ./mychannel.block </code></pre> <p>But got </p> <blockquote> <p><strong>Error: proposal failed (err: rpc error: code = Unknown desc = chaincode error (status: 500, message: Cannot create ledger from genesis block, due to LedgerID already exists))</strong></p> </blockquote> <p>My OS is Ubuntu 16.04</p> <p>docker ps <a href="https://i.stack.imgur.com/E25Gh.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/E25Gh.png" alt="Docker ps output"></a> Kindly help</p>
0non-cybersec
Stackexchange
Generate graph in Grafana from API. <p>I'm looking for a way to generate an arbitrary graph from the Grafana API, ideally by just feeding it a query. After looking in the doc I don't see anything to do it directly, so the only way I can see would be to :</p> <ul> <li>Generate a dashboard json with just the graph I want</li> <li>Create the dashboard through the API by sending that json</li> <li>Export that graph as jpg</li> <li>Delete this darshboard</li> </ul> <p>That seems a bit silly, isn't there a way to just generate a graph from a specific query directly ? The goal here is to add a graph in our monitoring alerts, that way if we get a high load alert on a server for example I could generate a query to get that server's load graph, and include that in the alert e-mail. Nothing life changing, but it would be a nice feature to have I think.</p>
0non-cybersec
Stackexchange
Fields of characteristic $p$ and $p$-torsion. <p>Let $X$ be an affine variety over a field $k$ of characteristic $p$. Let $A$ be the set of morphisms $X\to \mathbb A_1$. Let $B\subset A$ be a sub-algebra. Suppose $f\in A$ is such that </p> <p>$$ \bigcap_{g\in B} \ker g \subset \ker f.$$</p> <p>Then if $A/B$ has no $p$-torsion, we have that $f\in B$. My proof goes as follow: For any $h\in A$, let $\bar h$ be the image of $h$ in $A/B$. Then,</p> <p>$$ X = \bigcap_{g\in B} \ker\bar{g} \subset \ker\bar{f}.$$</p> <p>Thus $X = \ker\bar f$, which implies that $\bar f = 0$, so $f\in B$. I did not use $p$-torsion. Can you please tell me what is wrong with this proof and why $p$-torsion is so important? </p>
0non-cybersec
Stackexchange
CIFS VFS: Server X has not responded in 120 seconds. Reconnecting. <pre><code>CIFS VFS: Server X has not responded in 120 seconds. Reconnecting... ... </code></pre> <p>This message is spamming my <code>dmesg</code> output. The warning is caused by the following mount of a windows share:</p> <pre><code># CIFS shares //X/share/folder /mnt/some_folder cifs vers=2.1,credentials,uid=some_user,gid=some_user,file_mode=0764,dir_mode=0765,nosetuids,noserverino 0 0 </code></pre> <p>The share works. From various posts I consulted, it seems this warning is normal. Any way to suppress it (if it's normal after all), or adjust the parameters so it doesn't show?</p>
0non-cybersec
Stackexchange
$(BDE) \cap (CDF) = P \not\equiv D$. Prove that $PD$ passes through the excenter of $\triangle ABC$ in $\angle A$.. <blockquote> <p><span class="math-container">$D$</span>, <span class="math-container">$E$</span> and <span class="math-container">$F$</span> are points respectively on sides <span class="math-container">$BC$</span>, <span class="math-container">$AB$</span> and <span class="math-container">$AC$</span> such that <span class="math-container">$AE = CD$</span> and <span class="math-container">$AF = BD$</span>. <span class="math-container">$(BDE) \cap (CDF) = P \not\equiv D$</span>. Prove that <span class="math-container">$PD$</span> passes through the excenter of <span class="math-container">$\triangle ABC$</span> in <span class="math-container">$\angle A$</span>.</p> </blockquote> <p><a href="https://i.stack.imgur.com/62fhB.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/62fhB.png" alt="enter image description here"></a></p> <p>I have noticed that if <span class="math-container">$K$</span> is the midpoint of arc <span class="math-container">$BC$</span> not containing point <span class="math-container">$A$</span> and <span class="math-container">$EF \cap KD = H$</span> then <span class="math-container">$B, E, H, K$</span> and <span class="math-container">$C, F, H, K$</span> are concyclic.</p> <p><span class="math-container">$\implies \angle AEF = \angle BKD$</span> and <span class="math-container">$\angle AFE = \angle CKD$</span>.</p> <p>Not sure what is next though.</p> <p><a href="https://i.stack.imgur.com/qKKL2.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/qKKL2.png" alt="enter image description here"></a></p>
0non-cybersec
Stackexchange
ar X iv :1 90 5. 08 23 4v 2 [ ec on .T H ] 1 3 Ju l 20 20 Empirical bias of extreme-price auctions: analysis∗ Rodrigo A. Velez† and Alexander L. Brown‡ Department of Economics, Texas A&M University, College Station, TX 77843 July 15, 2020 Abstract We advance empirical equilibrium analysis (Velez and Brown, 2020b) of the winner- bid and loser-bid auctions for the dissolution of a partnership. We show, in a complete information environment, that even though these auctions are essentially equivalent for the Nash equilibrium prediction, they can be expected to differ in fundamental ways when they are operated. Besides the direct policy implications, two general conse- quences follow. First, a mechanism designer who accounts for the empirical plausibility of equilibria may not be constrained by Maskin invariance. Second, a mechanism de- signer who does not account for the empirical plausibility of equilibria may inadvertently design biased mechanisms. JEL classification: C72, D47, D91. Keywords : equilibrium refinements; implementation theory; behavioral mechanism design; empirical equilibrium. 1 Introduction This paper studies the plausibility of Nash equilibria of two popular auctions for the dis- solution of a partnership. By using the recently introduced empirical equilibrium analysis (Velez and Brown, 2020b), we show that even though the Nash equilibria of the complete information games that ensue when these mechanisms are operated are essentially identical, these mechanisms can be expected to differ in fundamental ways. Two general conclusions ∗This paper benefited from comments of Dustin Beckett, Ernan Haruvy, Thomas Palfrey, and Anastasia Zervou as well as audiences at TETC17, U. Maryland, U. Virginia, Caltech, UC Santa Barbara, U. Rochester, Kellogg (MEDS), 2018 Naples Workshop on Equilibrium Analysis, SAET18, SCW18. The results in this paper circulated in a paper entitled Empirical Equilibrium, which is now dedicated to study the foundations of this refinement (Velez and Brown, 2020a). All errors are our own. †[email protected]; https://sites.google.com/site/rodrigoavelezswebpage/home ‡[email protected]; http://people.tamu.edu/∼alexbrown 1 http://arxiv.org/abs/1905.08234v2 mailto:[email protected] https://sites.google.com/site/rodrigoavelezswebpage/home mailto:[email protected] http://people.tamu.edu/%7Ealexbrown for the theory of full implementation follow. First, a mechanism designer who accounts for empirical plausibility of equilibria may not be constrained by usual invariance proper- ties. Second, a mechanism designer who does not account for the empirical plausibility of equilibria may design biased mechanisms. We consider a symmetric partnership dissolution problem in which two agents who collectively own an object need to decide who receives the object when monetary compen- sation, chosen out of a finite but fine greed, is possible. In the spirit of the implementation literature with complete information (see Jackson, 2001, for a survey) we assume that an arbitrator who makes a recommendation for this division knows that the agents know each other well but does not know the agents’ preferences on the possible divisions.1 This is a relevant benchmark for the dissolution of a marriage or a long standing partnership. We assume that agents are expected utility maximizers with quasi-linear utility indices. For concreteness, suppose that agents’ values for the object are vl ≤ vh, which for simplicity we assume to be even numbers. We study two prominent mechanisms that we refer to as the extreme-price auctions (EPs). These mechanisms operate as follows. First, the arbitrator asks the agents to bid for the object. Then assigns the object to a higher bidder, breaking ties uniformly at random. The transfer from the agent who receives the object to the other agent is determined as follows: the transfer is the winner bid, the winner-bid auction (WB); the transfer is the loser bid, the loser-bid auction (LB).2 Our first step to evaluate the performance of EPs is to characterize the Nash equilibrium outcomes of the games that ensue when these mechanisms are operated. We consider both pure and mixed strategy equilibria. When agents have equal types, both auctions give, in each Nash equilibrium, equal expected payoff to each agent (Lemma 1). When valuations are different, the set of efficient Nash equilibrium payoffs of both auctions coincide (Proposition 1).3 This common set can be placed in a one to one correspondence with the integers {vl/2, vl/2+1, ...., vh/2}. Each equilibrium has a unique payoff-determinant bid in this set and for each such integer there is an equilibrium with this payoff-determinant bid (Proposition 2). We refer to this set as the Nash range. Between two elements of the Nash 1The assumption of complete information in our partnership dissolution problem allows us to contrast empirical equilibrium analysis with the well-understood restrictions of Nash implementation in this en- vironment. Our approach to implementation theory, and in general mechanism design, does not impose restrictions on the information structure that the modeler believes is a reasonable description of reality. For instance, one can define and study empirical equilibria in general incomplete information environments, under a Bayesian information structure (Velez and Brown, 2020b). 2EPs belong to the family of α-auctions studied by Cramton et al. (1987) and McAfee (1992). Note that the partnership dissolution environment differs substantially from a buyer-seller environment in which the payoff of the loser of a first-price auction or a second-price auction does not depend on the price paid by the winner. 3The maximal aggregate loss in an inefficient equilibrium is one unit. The analysis of inefficient equilibria leads to the same conclusions we state here in the introduction for efficient equilibria (Sec. 4.2.1). 2 range, the higher valuation agent prefers the left one (paying less), and the lower valuation agent prefers the right one (being paid more). Not all Nash equilibria are plausible to be observed, even approximately, when a game takes place (c.f. van Damme, 1991). Thus, the equivalence of Nash equilibrium outcomes for EPs may not be realistic. If one refines the Nash equilibria of EPs by ruling out weakly dominated behavior, the associated equilibrium payoff-determinant bids collapse to extreme singleton sets: {vl/2} for WB and {vh/2} for LB. Experiments show that WB exhibits a bias in favor of the higher valuation agent and LB exhibits a bias in favor of the lower valuation agent (Brown and Velez, 2020). However, observed biases are not as extreme as those predicted by undominated equilibrium. Indeed, the best performance of these auctions, when behavior of both types clearly separates, involves persistent weakly dominated behavior (Sec. 6, Brown and Velez, 2020). This is consistent with the extensive literature that shows weakly dominated behavior in dominant strategy games is persistently observed (see Velez and Brown, 2020b). Thus, we are left with the question whether the bias observed in laboratory experiments with these mechanisms should be expected in general. That is, is there any reason why the weakly dominated behavior that sustains payoff-determinant bids close to vl/2 for WB is more plausible than the weakly dominated behavior that sustains payoff-determinant bids on the other extreme of the Nash range? Symmetrically, is there any reason why the weakly dominated behavior that sustains payoff-determinant bids close to vh/2 for LB is more plausible than the weakly dominated behavior that sustains payoff-determinant bids on the other extreme of the Nash range? To answer this question we advance empirical equilibrium analysis of these auctions. This theory was introduced by Velez and Brown (2020b) to discriminate among weakly dominated Nash equilibria of a normal form game based on their empirical plausibility.4 Empirical equilibrium is defined by means of the following thought experiment. Con- sider a researcher who samples behavior in normal-form games and constructs a theory that explains this behavior. The researcher determines the plausibility of Nash equilibria based on the empirical content of the theory by requiring that Nash equilibria be in its closure. That is, if a Nash equilibrium cannot be approximated to an arbitrary degree by the em- pirical content of the researcher’s theory, it is identified as implausible or unlikely to be observed. Empirical equilibrium is the refinement so defined based on the non-parametric theory that each agent chooses actions with higher probability only when they are better for her given what the other agents are doing. More precisely, an empirical equilibrium 4Traditional equilibrium refinements, implicitly of explicitly rule out all weakly dominated behavior (van Damme, 1991). Thus, these theories are silent about the nature of the phenomenon of our interest. 3 is a Nash equilibrium that is the limit of a sequence of behavior satisfying weak payoff monotonicity, i.e., between two alternative actions for an agent, say a and b, if the agent plays a with higher frequency than b, it is because given what the other agents are doing, a has higher expected utility than b. Remarkably, this property is a common factor in some of the most popular models that have been proposed to account for observed behavior in experiments.5 One can give empirical equilibrium a static or dynamic interpretation. First, its defini- tion simply articulates the logical implication of the hypothesis that the researcher’s theory is well specified, for this hypothesis is refuted by the observation of a Nash equilibrium that is not an empirical equilibrium. Alternatively, suppose that the researcher hypothesizes that behavior will converge to a Nash equilibrium through an unmodeled evolutionary process that produces a path of behavior that is consistent with her theory. Then, the researcher can also conclude that the only Nash equilibria that will be approximated by behavior are empirical equilibria. In our main results, we characterize the set of empirical equilibrium payoffs of EPs (Theorems 1 and 2). The highlights of these characterizations are the following. With a single exception among all type profiles, these sets are disjoint. The empirical equilibrium payoffs of WB belong to the left half of the Nash range. When vl is not too close to the minimal bid, i.e., at least 3vh/8, the empirical equilibrium payoffs of WB essentially (up to rounding) are the left fifth of the Nash range. Symmetrically, the empirical equilibrium payoffs of LB belong to the right half of the Nash range. When vh is not too close to the maximal bid, the empirical equilibrium payoffs of LB essentially are the right fifth of the Nash range. Thus, empirical equilibrium analysis reveals that the bias observed in experiments is indeed a characteristic of EPs. Under the testable hypotheses that observable behavior is weakly payoff monotone and that frequencies of play approach mutual best responses, WB necessarily benefits the higher valuation agent and LB necessarily benefits the lower valuation agent. This result has two policy relevant implications. First, a mechanism designer who accounts for the empirical plausibility of equilibria may not be constrained by Maskin invariance, a well-known necessary condition for implementation in pure strategy Nash equilibrium. Second, a mechanism designer who does not account for the empirical plausibility of equilibria may inadvertently design biased mechanisms. 5These models include the exchangeable randomly perturbed payoff models (Harsanyi, 1973; van Damme, 1991), the control cost model (van Damme, 1991), the structural QRE model (McKelvey and Palfrey, 1995), the regular QRE models (McKelvey and Palfrey, 1996; Goeree et al., 2005). The common characteristic of these models that make them suitable the purpose of equilibrium refinement is that their parametric forms are independent of the game in which they are applied, and have been successful in replicating comparative statics in a diversity of games (Goeree et al., 2005). 4 The remainder of the paper is organized as follows. Sec. 2 places our contribution in the context of the literature. Sec. 3 introduces the model. Section 4 presents our results, the intuition behind them, and their general implications for the theory of full implementation. Sec. 5 discusses the robustness of our results to violations of weak payoff monotonicity. Sec. 6 concludes. We present all proofs in the Appendix. 2 Related literature EPs are part of a family of mechanisms proposed for Cramton et al. (1987) for the dissolution of a partnership. If ownership is symmetric, in an independent private values environment, these mechanisms are efficient, individually rational, and incentive compatible. In a com- plete information environment, EPs are strategically equivalent to a mechanism that elicits agents valuations and then assigns an allocation in which no agent prefers the allotment of any other agent to her own (see Velez, 2018, for a survey). Our study shares some features with the literature on Nash implementation (Jackson, 2001), Bayesian implementation (Jackson, 1991), and undominated implementation (Palfrey and Srivastava, 1991; Jackson, 1992). Similar to these studies, we evaluate the performance of EPs based on the set of all equilibrium outcomes that cannot be ruled out when the mechanisms are operated. An obvious difference is that our equilibrium refinement is a compromise between these approaches. We acknowledge that not all Nash equilibria are plausible. We do not rule out all weakly dominated equilibria, which is not supported by data. At a technical level, our approach differs substantially with most of previous implementation literature because we consider all Nash equilibria including equilibria in mixed strategies. To our knowledge the only study that, like ours, also treats pure and mixed strategy equilibria symmetrically in the context of implementation is Mezzetti and Renou (2012). These authors show that complete information implementation in Nash equilibrium (in both pure and mixed strategies) is more permissive than implementation in pure strategy Nash equilibria. Interestingly, while a continuum of mixed strategy equilibria of EPs pass our equilibrium refinement, most of its pure strategy equilibria are wiped out by it (see Sec. 4.3). Thus, our work reinforces the view of these authors that mixed strategy equilibria and pure strategy equilibria should be treated symmetrically by the mechanism designer. At a technical level, even though we arrive to a similar conclusion by considering plausibility of equilibria, our results are independent. The reason Mezzetti and Renou (2012)’s implementation in pure and mixed Nash equilibria is not bound by Maskin invariance, is that a mixed strategy equilibrium may have multiple outcomes and Maskin invariance is a requirement centered at a particular outcome. More precisely, starting from 5 a profile of types in which a certain outcome results in a mixed strategy equilibrium, when this outcome does not drop in the ranking of any agent, the profile of strategies may not be a Nash equilibrium anymore depending on what happened to the ranking of the other outcomes in the equilibrium. Thus, the essential insight of Mezzetti and Renou (2012) is that one can avoid the restrictions of this property by designing mechanisms that obtain some desirable outcomes for some realizations of types only in mixed strategy equilibria with multiple outcomes. Our main insight is that a mechanism designer that accounts for plausibility of equilibria is not bound by Maskin invariance because starting from a profile of types in which a certain outcome results in an empirical equilibrium, when this outcome does not drop in the ranking of any agent, the alleged equilibrium may still be a Nash equilibrium, but may not pass our refinement anymore (see Sec. 4.3). To provide clarity about the significance of our results, we show that the normative objectives achieved by the empirical equilibrium correspondence of EPs are not achieved by the Nash equilibrium correspondence (including equilibria in mixed strategies) of any mechanism (Lemma 2). Empirical equilibrium refines Nash equilibrium by means of approximation by behavior that is observationally sub-optimal. In this sense our work can be related with the growing literature on mechanism design with (as if) boundedly rational agents. These studies gener- ally endorse a form of bounded rationality and aim at finding institutions that perform well when operated on agents who exhibit these particular patterns of behavior (c.f., Anderson et al., 1998, 2001; Eliaz, 2002; Healy, 2006; Cabrales and Serrano, 2012; Tumennasan, 2013; de Clippel, 2014; de Clippel et al., 2018; Kneeland, 2017). Empirical equilibrium analy- sis does not give up the regularity induced by expected utility maximization. It puts a reality check on it by requiring proximity by plausible boundedly rational behavior. Alter- natively, one can think of our analysis as the study of boundedly rational behavior when it is disciplined by proximity to a Nash equilibrium. The studies that are closest to ours consider forms of implementation that like empirical equilibrium are determined by conver- gence processes: Anderson et al. (1998, 2001) study limit behavior of logistic QRE models in all-pay auctions and minimum contribution games; Healy (2006); Cabrales and Serrano (2012) study implementation in the limits of some evolutionary processes; and Tumennasan (2013) studies implementation in the limits of logistic equilibria for increasingly sophisti- cated logistic quantal response functions. Anderson et al. (1998, 2001)’s approach is limited to the parametric logistic form and intensively uses the structure of the games it analyses in order to characterize logistic equilibria by means of tractable differential equations.6 Healy (2006), Cabrales and Serrano (2012), and Tumennasan (2013) concentrate only on pure 6The set of empirical equilibria may differ from the set of Nash equilibria that are limits of logistic equilibria (Velez and Brown, 2020a). 6 strategy equilibria and require strong conditions be satisfied for convergence, which limit the applicability of their results to general games. Finally, this paper makes part of a research agenda that reevaluates the applications of game theory based on the empirical equilibrium refinement. In Velez and Brown (2020a) we study the foundations of empirical equilibrium. In Velez and Brown (2020b) we advance empirical equilibrium analysis of strategy-proof mechanisms. In a companion paper, Brown and Velez (2020), we experimentally evaluate the predictions of empirical equilibrium for EPs. In experiments with different valuation structures these auctions exhibit the bias predicted by empirical equilibrium analysis. The data also supports the positive association of bids and their expected utility. 3 Model There are two agents N := {1, 2} who collectively own an object (indivisible good) and need to allocate it to one of them. Monetary compensation is possible. Each agent’s payoff type is characterized by the value that he or she assigns to the object. We assume these type spaces are Θ1 = Θ2 := {v, v + 2, ..., v}, where 2 < v ≤ v are even positive integers. 7 The generic type of agent i is vi ∈ Θi. Let Θ := Θ1 ×Θ2 with generic element v := (v1, v2). The lower and higher values at v are vl and vh respectively. We also assume that agents are expected utility maximizers. The expected utility index of agent i with type vi is vi− p if receiving the object and paying p to the other agent; p if being paid this amount by the other agent and receiving no object. Whenever we make statements in which the identity of the agents is not relevant, we conveniently use neutral notation i and −i. The set of possible allocations is that in which an agent receives the object and transfers an amount p ∈ {0, 1, ..., p} with p ≥ v/2+2, to the other agent. Let A be the space of these allocations. For an allocation a ∈ A the value of agent i’s utility index at the allotment assigned by a to this agent is ui(a|vi). A social choice correspondence (scc) selects a set of allocations for each possible profile of types. The generic scc is G : Θ ⇒ A. A mechanism is a pair (M,ϕ) where M := (Mi)i∈N is an unrestricted message space and ϕ : M → ∆(A) is an outcome function. Our main results concern the finite mechanisms we introduce next. For simplicity we complete the set up of the model assuming that mechanisms are finite. Lemma 2, our only result that refers to general mechanisms, can be generalized for appropriate extensions of strategies and Nash equilibrium. 7Our restrictions on valuations are only for simplicity in the presentation. The conclusions we draw from the analysis of this restricted model are general. 7 Definition 1. The winner-bid auction is the mechanism in which each agent selects a bid in the set {0, 1, 2, ..., p}. An agent with the highest bid receives the object. Ties are resolved uniformly at random. The agent who receives the object pays the winner bid to the other agent. The loser-bid auction is the mechanism defined similarly where the payment is the loser bid. We refer to these two auctions as the extreme-price auctions. Given a profile of types v ∈ Θ, mechanism (M,ϕ) determines a complete information game Γ := (M,ϕ, v). A (mixed) strategy for agent i is a probability measure on Mi. Agent i’s generic strategy is σi ∈ ∆(Mi). The profile of strategies is σ := (σi)i∈N . A pure strategy places probability one in a given action. We associate pure strategies with actions themselves. The expected utility of agent i with type vi in Γ from selecting action mi when the other agent selects an action as prescribed by σ−i is Uϕ(mi|σ−i; vi) := ∑ m−i∈M−i ui(ϕ(mi,m−i)|vi)σ−i(m−i). A profile of strategies σ is a Nash equilibrium of Γ if for each i ∈ N , each mi in the support of σi, and eachm ′ i ∈ Mi, Uϕ(m ′ i|σ−i; vi) ≤ Uϕ(mi|σ−i; vi). The set of Nash equilibria of Γ is N(Γ). The set of Nash equilibrium outcomes of Γ are those obtained with positive probability for some Nash equilibrium of Γ. Agent i’s expected payoff in equilibrium σ is πi(σ), where for simplicity in the notation we avoid conditioning these payoffs on the agent’s types, which can be always inferred from context. Definition 2 (Velez and Brown, 2020a). σ := (σi)i∈N is weakly payoff monotone for (M,ϕ, v) if for each i ∈ N and each pair {mi, ni} ⊆ Mi, σi(mi) > σi(ni) implies that Uϕ(mi|σ−i; vi) > Uϕ(ni|σ−i; vi). Definition 3 (Velez and Brown, 2020a). σ ∈ N(Γ) is an empirical equilibrium of Γ if there is a sequence of weakly payoff monotone distributions of Γ, {σλ}λ∈N, such that as λ → ∞, σλ → σ. 4 Results 4.1 Extreme-price auctions and Nash equilibrium We start by characterizing the Nash equilibrium outcomes of the games induced by the EPs. The theory of fair allocation has produced a series of principles that an arbitrator may want to adhere to when resolving a partnership dissolution dispute (see Thomson, 2010, for 8 a survey). Two of the most popular are the following: efficiency, i.e., a party who values the object the most should receive it, or equivalently, that expected payoffs add up to vh; and equity, i.e., no party should prefer the allotment of the other (Foley, 1967). Abstracting from incentives issues imagine that the arbitrator knows the agents’ valuations, v ∈ Θ. It is easy to see that if the arbitrator abides by the principles of efficiency and equity, agents’ payoffs should have the form:8 vl/2 + t for l and vh/2 + (|vh/2 − vl/2| − t) for h, where 0 ≤ t ≤ |vh/2 − vl/2|. In other words, if an arbitrator endorses these two principles, the only that is left for him or her is to determine a division between the agents of the “equity surplus,” i.e., ES(v) := |vh/2− vl/2| (Tadenuma and Thomson, 1995). The following lemma states that each extreme-price auction achieves, in each Nash equilibrium (including those in mixed strategies), the objectives of efficiency and equity when agents have equal valuations. We omit the straightforward proof. Lemma 1. Let (M,ϕ) be an extreme-price auction and v ∈ Θ such that v1 = v2. Then for each σ ∈ N(M,ϕ, v), π1(σ) = π2(σ) = v1/2 = v2/2. Moreover, for each deterministic allocation a ∈ A in which each agent receives this common payoff, there is a pure-strategy Nash equilibrium of (M,ϕ, v) whose outcome is this allocation. The following proposition states that each extreme-price auction essentially achieves, in each Nash equilibrium (including those in mixed strategies), the objectives of efficiency and equity for arbitrary valuation profiles. Proposition 1. Let (M,ϕ) be an extreme-price auction and v ∈ Θ such that vl < vh. Let σ be a Nash equilibrium of (M,ϕ, v). Then, there is p ∈ {vl/2, ..., vh/2} such that the support of σl belongs to {0, ..., p} and the support of σh belongs to {p, ..., p}. If σ is efficient, the higher value agent receives the object and pays p to the other agent. Moreover, 1. If (M,ϕ) is the winner-bid auction, then p is in the support of σh. If σ is inefficient, i.e., σl(p) > 0, then p = vl/2; πl(σ) + πh(σ) ≥ vh − 1; and πh(σ) ≥ vh/2 +ES(v)− 1. 2. If (M,ϕ) is the loser-bid auction, then p is in the support of σl. If σ is inefficient, i.e., σh(p) > 0, then p = vm/2; πl(σ) + πh(σ) ≥ vh − 1; and πl(σ) ≥ vl/2 + ES(v) − 1. Proposition 1 reveals that the Nash equilibria of the extreme-price auctions have a simple structure. In all equilibria, the payoff-determinant bid is in the set {vl/2, ..., vh/2}. Let us refer to this set of bids as the Nash range. In most of these equilibria agents’ bids are strictly separated. That is, there is a bid p in the Nash range such that one agent bids weakly on one side of p and the other agent bids strictly on the other side of p. In 8In our environment no-envy implies efficiency for deterministic allocations (Svensson, 1983). Our state- ment here refers also to random assignments. 9 these equilibria, which are strictly separated, outcomes are efficient and equitable. There are inefficient equilibria. For the winner-bid auction, it is possible that both agents bid vl/2. For the loser-bid auction it is possible that both agents bid vh/2. In both cases the aggregate welfare loss is at most one unit, i.e., the size of the minimal difference between bids. This means that if the minimal bid increment is one cent, the maximum that these auctions can lose in aggregate expected utility for any Nash equilibrium is one cent. Thus, one can say that these auctions essentially implement the principles of efficiency and equity in Nash equilibria.9 Proposition 1 allows us to characterize Nash equilibrium payoffs for extreme-price auc- tions. For efficient equilibria, these payoffs are exactly the integer divisions of the equity surplus. For simplicity in the presentation, in the remainder of the paper we omit the anal- ysis of inefficient equilibria. We know from Proposition 1 that the corresponding payoffs are extreme in the equilibrium set. Thus, all conclusions we obtain for efficient empirical equilibria extend to inefficient empirical equilibria. Proposition 2. Let (M,ϕ) be an extreme-price auction and v ∈ Θ such that vl < vh. The set of efficient Nash equilibrium payoffs of (M,ϕ, v), i.e., {(πl(σ), πh(σ)) : σ ∈ N(M,ϕ, v), πl(σ) + πh(σ) = vh}, is the set of integer divisions of the equity-surplus, i.e., {(vl/2 + ES(v) − t, vh/2 + t) : t ∈ {0, 1, ..., ES(v)}}. 4.2 Empirical equilibrium 4.2.1 Empirical equilibrium payoffs We characterize the set of empirical equilibrium payoffs of the extreme-price auctions. Re- call that by Lemma 1, when valuations are equal, the payoff of each agent is the same in each Nash equilibrium of each extreme-price auction. Thus, we only need to character- ize the payoffs of empirical equilibria when agents’ valuations differ. Since Proposition 2 characterizes Nash equilibrium payoffs for these auctions, it is convenient to describe em- pirical equilibrium payoffs by the set of conditions for which a Nash equilibrium payoff is an empirical equilibrium payoff. Theorem 1. Let (M,ϕ) be the winner-bid auction, v ∈ Θ such that vl < vh, and σ ∈ N(M,ϕ, v). If σ is efficient, π(σ) is the payoff of an empirical equilibrium of (M,ϕ, v) if and only if 1. πh(σ) = vh/2 + ES(v) when ES(v) ≤ 2; 9Our proof of Proposition 1 also reveals that the probability of an inefficient outcome is bounded above by the inverse of the equity surplus, measured in the minimal bid increment. 10 2. πh(σ) ≥ vh/2 + ES(v)/2 + vl/4 − 1/2 when ES(v) > 2 and vl ≤ 3vh/8; 3. πh(σ) ≥ vh/2 + 4ES(v)/5− 4/5 when ES(v) > 2, vl > 3vh/8, and vl < 7vh/12− 7/6; 4. πh(σ) > vh/2 + 4ES(v)/5− 4/5 when ES(v) > 2, vl > 3vh/8, and vl ≥ 7vh/12− 7/6. Theorem 1 reveals a surprising characteristic of the empircal equilibria of the winner-bid auction. For simplicity fix vh at a certain value. Let vl ≤ vh. When vl is low, i.e., at most 3vh/8, the minimal share of the equity surplus that the higher value agent obtains in an empirical equilibrium is, essentially, at least 50% of the equity surplus (since we assumed vl is a positive even number, the exact share depends on rounding, but is never less than 50%). More precisely, for this range of vl, agent h receives a payoff that is at least vh/2 + ES(v)/2 + vl/4− 1/2 = vh/2 + vh/4− 1/2. This means that p is the winner bid in an empirical equilibrium of the winner-bid auction for such valuations if and only if p ≤ vh/4 + 1/2 (Fig. 1). Thus, while the maximal bid in an empirical equilibrium is the same for all valuations when vl ≤ 3vh/8, the minimal percentage of the equity surplus that is assigned to the higher value agent increases from essentially 50% when vl = 2 to essentially 80% when vl = 3vh/8. For higher values of vl, i.e., 3vh/8 < vl < vh, the higher value agent receives, essentially, at least 80% of the equity surplus (Fig. 1). In summary, Theorem 1 states that the minimal share of the equity surplus that the higher value agent obtains in an empirical equilibrium of the winner-bid auction depends on the number of possible bids that are to the left of the Nash range. In the extreme case in which there is only one bid to the left of the Nash range, the higher value agent essentially obtains at least 50% of the equity surplus. As the number of bids to the left of the Nash range increases, the minimal share of the equity surplus that is obtained by the higher value agent in an empirical equilibrium increases until it reaches essentially 80% when the number of possible bids to the left of the Nash range is 60% of the number of bids in the Nash range (equivalently, vl ≤ 3vh/8). When the number of possible bids to the left of the Nash range is higher than 60% of the number of bids in the Nash range (equivalently, vl > 3vh/8), the minimal share of the equity surplus that is obtained by the higher value agent in an empirical equilibrium remains essentially 80%. (For low values of the equity surplus, rounding has a significant effect; see Fig. 1). Theorem 2. Let (M,ϕ) be the loser-bid auction, v ∈ Θ such that vl < vh, and σ ∈ N(M,ϕ, v). If σ is efficient, π(σ) is the payoff of an empirical equilibrium of (M,ϕ, v) if and only if 11 1. πl(σ) ≥ vl/2 + ES(v) if ES(v) ≤ 2; 2. πl(σ) ≥ vl/2 + ES(v)/2 + (p − vh/2)/2 − 1/2 if ES(v) > 2 and vh/2 ≥ vl/2 + 5(p − vl/2)/8. 3. πl(σ) ≥ vl/2 + 4ES(v)/5 − 4/5 if ES(v) > 2, vh/2 < vl/2 + 5(p − vl/2)/8, and vh/2 > p− 7(p − vl/2)/24 − 7/12; 4. πl(σ) > vl/2 + 4ES(v)/5 − 4/5 if ES(v) > 2, vh/2 < vl/2 + 5(p − vl/2)/8, and vh/2 ≤ p− 7(p − vl/2)/24 − 7/12. The empirical equilibrium payoffs of the loser-bid auction are symmetric to those of the winner-bid auction. The minimal share of the equity surplus that the lower value agent obtains in an empirical equilibrium of the winner-bid auction depends on the number of possible bids that are to the right of the Nash range. In the extreme case in which there is only one bid to the right of the Nash range, the lower value agent essentially obtains at least 50% of the equity surplus. As the number of bids to the right of the Nash range increases, the minimal share of the equity surplus that is obtained by the lower value agent in an empirical equilibrium increases until it reaches essentially 80% when the number of possible bids to the right of the Nash range is 60% of the number of bids in the Nash range. When the number of possible bids to the right of the Nash range is higher than 60% of the number of bids in the Nash range, the minimal share of the equity surplus that is obtained by the lower value agent in an empirical equilibrium remains essentially 80%. (For low values of the equity surplus, rounding has a significant effect; see Fig. 1). 4.2.2 The intuition The characterization of empirical equilibrium payoffs of the extreme-price auctions reveals that empirical equilibrium makes a delicate selection of Nash equilibria, which is sensitive to the global structure of the game. An empirical equilibrium may involve an agent playing a weakly dominated strategy. However, not all Nash equilibria, in particular not all Nash equilibria in which an agent plays a weakly dominated strategy, are empirical equilibria. Thus, empirical equilibrium somehow discriminates among actions by assessing how likely they can be played based on how they compare with the other actions. A discussion of the proof of Theorem 1 informs us about this feature of empirical equilibrium. Let v ∈ Θ be such that vl < vh. Let (M,ϕ) be the winner-bid auction and consider σ ∈ N(M,ϕ, v). By Proposition 1 this equilibrium is characterized by a winner bid p ∈ {vl/2, ..., vh/2}. Suppose that p > vl/2 and let t := p−1−vl/2. Suppose for simplicity that t ≥ 1. One can easily see that agent l always regrets wining the auction when bidding p−1. 12 vh/2 vl/2 vh/4 1 | | | (3/8)vh/2 p ut ut ut ut ut ut rs rs rs rs rs rsb b b b b b b b b b b b ut ut ut ut ut rs rs rs rs rsb b b b b b b b b b b ut ut ut ut rs rs rs rsb b b b b b b b b b ut ut ut rs rs rsb b b b b b b b b ut ut ut rs rs rsb b b b b b b b ES(v)/5 + 4/5 ut ut ut rs rs rsb b b b b b b ut ut rs rsb b b b b b ut ut rs rsb b b b b ut ut rs rsb b b b ut rsb b b ut rsb b b Nash range ut winner-bid rs loser-bid qp p qp qp qp qp qp qp qp qp qp qp qp Figure 1: Payoff determinant bids in an empirical equilibrium of the extreme-price auctions. For a given v ∈ Θ such that vl < vh, the Nash range is the set {vl/2, ..., vh/2}. In this graph we show, for a fixed vh, the Nash range for each 2 < vl < vh and the bids that are winning bids for empirical equilibria of the winner-bid and loser-bid auction. In the vertical line we measure vl/2 and in the horizontal line we measure bids. For vl = 2, the Nash range is the set {1, 2, ..., vh/2}. In the graph this set is represented by the points (1, 1), (2, 1),...,(vh/2, 1) (black dots). In general, for vl, we represent the Nash range, i.e., {vl/2, ..., vh/2} by the set of points (vl/2, vl/2),...,(vh/2, vl/2). We represent the winner bids in an empirical equilibrium of the winner-bid auction for a given v ∈ Θ by triangles. We represent the winner bids in an empirical equilibrium of the loser’s-bid auction for a given v ∈ Θ such that vl/2 = p − vh/2 by squares. Notice that this choice of variable p as vl increases guarantees symmetry, i.e., there is the same number of possible bids on each side of the Nash range, and is chosen for easier interpretation of the graph. Indeed, bidding p−1 is weakly dominated for agent l by each bid in {vl/2−1, vl/2, ..., p−2}. Let σλ be any monotone quantal response equilibrium of (M,ϕ, v). It follows that for each b ∈ {vl/2 − 1, vl/2, ..., p − 2}, Uϕ(b|σ λ h ; vl) ≥ Uϕ(p− 1|σ λ h ; vl). This means that there are always at least t+ 2 bids that are at least as good as p− 1 for agent l. This imposes a cap on the probability that this agent can place on p− 1. More precisely, σλl (p− 1) ≤ 1/(t + 2). (1) Thus, if σ is an empirical equilibrium, by (1), σl(p− 1) needs to be the limit of a sequence of probabilities bounded above by 1/(t+ 2) and thus, σl(p− 1) ≤ 1/(t+ 2). (2) Now, in order for σ to be a Nash equilibrium it has to be the case that agent h has no 13 incentive to bid one unit less than p. This is simply, vh − p ≥ σl(p− 1) [ 1 2 (vh − (p− 1)) + 1 2 (p− 1) ] + (1− σl(p− 1))(vh − (p − 1)). Equivalently, σl(p− 1) ≥ 1/(vh/2− p+ 1). Together with (2) this implies that p ≤ (vl/2 + vh/2)/2, or equivalently πh(σ) ≥ vh/2 + ES(v)/2. Thus, the reason why empirical equilibrium predicts agent h gets at least half of the equity surplus for any possible valuation is that it is not plausible that agent l will consistently bid above half of the Nash range. These high bids are worse than too many bids to their left for agent l. If this agent’s actions are monotone with respect to utility, the maximum probability that he or she will end up placing in a bid on the right half of the Nash range will never be enough to contain the propensity of agent h to lower his or her bid. When there is more than one bid to the left of the Nash range, the analysis becomes subtler. Let y := vl/2−3t. The key to complete this analysis is to prove that in any quantal response equilibrium of (M,ϕ, v) that is close to σ, all bids b ∈ {max{0, y}, ..., p − 1} are weakly better than p − 1 for agent l. The subtlety here lies in that this is not implied directly by a weak domination relation as in our analysis above. In order to uncover this we need to recursively obtain estimates of agent h’s distribution of play, which in turn depend on agent l’s distribution of play. Remarkably, we prove that the set of restrictions that we uncover by means of our anal- ysis are the only ones that need to be satisfied by an empirical equilibrium payoff. Goeree et al. (2005) characterize the set of regular QRE of an asymmetric matching pennies game. At a conceptual level, this exercise is similar to the construction of empirical equilibria. However, the techniques developed by Goeree et al. (2005) are useful only in two-by-two games, where an agent’s distribution of play is described by a single real number. Thus, there is virtually no precedent in the construction of empirical equilibria that are not strict Nash equilibria for games with non-trivial action spaces. We do so as follows. First, we identify for each target payoff an appropriate Nash equilibrium that produces it, say σ. Then we take a convex combination of a perturbation of σ and a logistic quantal response. This defines a continuous operator whose fixed points are the basis of our construction. In a two-limit process we first get close enough to σ by placing a weight on it that is high enough so the fixed points of the convex combination operators inherit some key properties of σ. Then we allow the logistic response to converge to a best response and along this path of convergence we obtain interior distributions that are close to σ and are payoff-monotone. 14 4.3 Empirical equilibrium analysis and full implementation theory Full implementation theory is the application of game theory in which one designs mech- anisms based on their worst-case scenario performance. More precisely, given an scc and a prediction for the interaction of agents in strategic situations, the designer looks for a mechanism that obtains outcomes selected by the scc for the true profile of types for all the predicted outcomes of the game that ensues when the mechanism is operated. When this exercise is done based on the Nash equilibrium prediction, the mechanism designer finds that many a desirable social objective is beyond her reach (Maskin, 1999; Jackson, 1991). By contrast, most of the constraints of the mechanism designer are lifted if the worst-case scenario discards all Nash equilibria that involve weakly dominated behavior (Palfrey and Srivastava, 1991; Jackson, 1992). Since there are Nash equilibria that are intuitively implausible, designing for a worst- case scenario accounting for all possible Nash equilibria is unnecessarily pessimistic. On the other extreme, ruling out all weakly dominated behavior, is also unrealistically optimistic (see Velez and Brown, 2020b). Our partnership dissolution problem epitomizes this conflict and clearly shows how empirical equilibrium analysis resolves it. One can envision an arbitrator having a deliberate choice on the division of the equity surplus in a partnership dissolution problem. For instance the arbitrator may want to guarantee that the lower valuation agent always receive at least half of the equity surplus. Proposition 2 implies that this is not achieved by the extreme-price auctions if one evaluates them with the Nash equilibrium prediction. The following lemma states that this is a feature not only of these auctions but also of any mechanism with at least one equitable Nash equilibrium for each profile of types. Lemma 2. Let (M,ϕ) be a mechanism. Suppose that for each v ∈ Θ, there is a Nash equilibrium of (M,ϕ, v) (potentially in mixed strategies) that obtains with positive prob- ability only efficient and equitable allocations for v. Then, for each v ∈ Θ such that vl < vh, and each {t, t+1} ⊆ {0, 1, ..., ES(v)} there is an efficient σ ∈ N(M,ϕ, v) such that vl/2 + t ≤ πl(σ) ≤ vl/2 + t+ 1. Lemma 2 states that if an arbitrator selects a mechanism that obtains efficiency and equity in at least one Nash equilibrium (partial implementation), then the range of divisions of the equity surplus that are necessarily obtained when valuations are different is essentially the whole Nash range. More precisely, for any two consecutive integer divisions of the equity surplus, there is a Nash equilibrium that obtains a division of the equity surplus between these two divisions. Theorems 1 and 2 and Lemma 2 allow us to conclude that a social planner who accounts 15 for the empirical plausibility of equilibria, realizes that some social goals, which would be ruled out impossible by the full Nash implementation analysis (independently whether implementation in mixed strategy equilibria as in Mezzetti and Renou (2012) is allowed or not), are within his or her reach. For instance, using LB could be sensible for a social planner who is able to exercise some level of affirmative action and chooses to benefit a segment of the population who are likely to have lower valuations for the objects to be assigned. Finally, it is worth noting that our results suggest that it is not without loss of generality to restrict our attention to pure-strategy equilibria when a mechanism is operated. Remark 1. Let v ∈ Θ such that vl < vh. The only pure-strategy empirical equilibrium of the winner-bid auction for v is σl = δvl/2−1 and σh := δvl/2. The only pure-strategy empirical equilibrium of the loser-bid auction for v is σl = δvh/2 and σh := δvh/2+1. Jackson (1992) constructed examples in which including arguably plausible mixed- strategy equilibria in a worst-case scenario analysis would reverse the conclusions one ob- tains by only analyzing pure-strategy equilibria. Empirical equilibrium analysis goes beyond these observations and provides a clear framework in which plausibility is built into the pre- diction of agents’ behavior. It is fair to say then that while empirical mechanism design opens new possibilities in the design of economic institutions, it also sets the standards of analysis high by forcing us to consider mixed-strategy equilibria. In this context, our complete characterization of empirical equilibria of extreme-price auctions in Theorems 1 and 2, and the characterization results in Velez and Brown (2020b), show that the technical challenges can be resolved in policy relevant environments. 5 Discussion Our analysis of mechanism based on empirical equilibrium has some challenges that are shared by the analysis of mechanisms based on any solution concept that is not single- valued for each game. If a Nash equilibrium is not empirical, we learn that it is implausible (under our hypothesis of weak payoff monotonicity). By contrast, if a Nash equilibrium is empirical, we do not know whether the equilibrium will be actually relevant in a particular environment. In some applications this may not be a problem. For instance, the main conclusion from our analysis of empirical equilibria of EPs survives even if some empirical equilibria end up not being relevant for these auctions. More precisely, the bias predicted for these mecha- nisms will be present even when not all empirical equilibria end up being relevant when they are operated. In general, many a social objective is guaranteed to be achieved whenever all 16 empirical equilibrium outcomes that result when a mechanism is operated satisfy it. Think, for instance, of Pareto efficiency. Suppose that a mechanism guarantees this property for each empirical equilibrium. This means that as long as behavior is payoff monotone and approximates mutual best responses, this behavior will obtain Pareto efficiency with high probability. Again, notice that in order to conclude this, it is not necessary to know which empirical equilibria will actually be relevant when the mechanism is operated. Designing based on empirical equilibrium also implicitly assumes that behavior when the mechanism is operated will approximate a Nash equilibrium. On the one hand, though not universally observed, there is evidence that frequencies of play in many games move towards best responses. For instance, it is common that logistic QRE parameter estimates increase toward best responses when estimated in experiments that are run in multiple periods without repeated game effects (McKelvey and Palfrey, 1995). On the other hand, one can also see our analysis of mechanisms based on empirical equilibrium as a departure from the Nash equilibrium based analysis that makes it more realistic without losing the regularity and power provided by the assumption that individual incentives are eventually in equilibrium. It is worth noting that not all empirical evidence supports the assumption of weak payoff monotonicity. Velez and Brown (2020b) documented violations of this property in the second price auction experiments of Andreoni et al. (2007) and the pivotal mechanism experiment of Cason et al. (2006). In our partnership dissolution environment there is a positive association between the empirical expected payoff of an action and the prob- ability with which it is chosen (Brown and Velez, 2020). Rounding bids to multiples of five, a behavioral regularity observed in these games, can easily induce violations of payoff monotonicity, however. Thus, we should see weak payoff monotonicity as a regular expression of the positive association between choice and expected utility in a game. We should not see this property as a bullet proof characterization of behavior in games. Consistently, we should verify whether the conclusions we obtained from our analysis survive for continuous variations of it for which there is more empirical support. The following parametric form of the axiom allows us to do this. Definition 4. Let m ∈ [0, 1]. A profile of strategies σ := (σi)i∈N is m-weakly pay- off monotone for Γ if for each i ∈ N and each pair of actions {ai, âi} ⊆ Ai such that Ui(σ−i, ai) ≥ Ui(σ−i, âi), we have that σi(ai) ≥ mσi(âi). For m = 1 the property exactly corresponds to weak payoff monotonicity. For m > n, m-weak payoff monotonicity implies n-weak payoff monotonicity. For m = 0 the property imposes no restrictions in data. 17 Definition 5. Let m > 0. An m-empirical equilibrium of Γ is a Nash equilibrium of Γ that is the limit of a sequence of m-weakly payoff monotone strategies for Γ. One can prove that for any m > 0, the m-empirical equilibrium outcome correspondence violates invariance under Maskin monotonic transformations. Moreover, for values of m close enough to one, the m-empirical equilibria of WB and LB are separated on the left half and the right half of the Nash range. It is an interesting open question to determine the lowest m for which this is so. Finally, we conducted empirical equilibrium analysis under the assumption of risk neu- trality. This can be seen as the choice of a model in which we can constructively arrive at the main conclusion from our study, i.e., that mechanisms that are essentially equivalent with respect to the Nash equilibrium prediction may be biased towards certain populations. The interpretation of empirical equilibrium analysis as pointing to particular mechanisms to implement certain normative objectives (Sec. 4.3), does assume that the social planner only entertains agents have this type of risk preferences. It would be interesting, but outside of the scope of this paper, to identify mechanisms that implement in empirical equilibria ordinal social choice correspondences independently of risk preferences (c.f., Mezzetti and Renou, 2012). 6 Conclussion We advanced empirical equilibrium analysis of EPs. Our results reveal that as long as empirical distributions of play in the games induced by these mechanisms are weakly payoff monotone, they can approximate mutual best responses only if they exhibit a form of bias. WB favors the higher valuation agent and LB favors the lower valuation agent. This implies that an arbitrator who uses an EPA within a legal system in which this type of affirmative action is forbidden, can be subject to a legitimate challenge supported by theory and empirical data. Indeed, our results produce a series of comparative statics that are supported by experimental evidence (see our companion paper, Brown and Velez, 2020). Our analysis also brings news to the abstract mechanism design paradigm. We learned that an arbitrator can abide by a principle of equity and at the same time exercise a form of affirmative action that guarantees a special treatment for either low or high value agents. This shows that a mechanism designer who accounts for empirical plausibility of equilibria is not constrained by typical invariance properties. 18 7 Appendix For x ∈ R, ⌊x⌋ denotes the floor of x, i.e., the greatest integer that is less than or equal to x; ⌈x⌉ denotes the ceiling of x, i.e., the smallest integer that is greater than or equal to x. Definition 6. σ := (σi)i∈N is payoff monotone for (M,ϕ, v) if for each i ∈ N and each pair {mi, ni} ⊆ Mi, Uϕ(mi|σ−i; vi) ≥ Uϕ(ni|σ−i; vi) if and only if σi(mi) ≥ σi(ni). The following theorem is useful in our characterization of empirical equilibria of EPs. Theorem 3 (Velez and Brown, 2020a). Let (M,ϕ) be a EPA and v ∈ Θ. Then, σ is an empirical equilibrium of (M,ϕ, v) if and only if it is a Nash equilibrium of (M,ϕ, v) and it is the limit of interior payoff monotone distributions for (M,ϕ, v). The logistic quantal response function with parameter λ ≥ 0, denoted by lλ, assigns to each mi ∈ Mi and each x ∈ R Mi the value, lλimi(x) := eλxmi ∑ ni∈Mi eλxni . (3) It can be easily checked that for each λ > 0, the corresponding logistic quantal response function is continuous and monotone, i.e., for each x ∈ RMi and each pair {m, t} ⊆ Mi, xm ≥ xt if and only if l λ im(x) ≥ l λ it(x). Proof of Proposition 1. In any of the auctions, by bidding ch := vh/2 the high-value agent guarantees a payoff at least vh − ch = ch. By bidding cl := vl/2 the low-value agent guarantees a payoff at least cl = vl − cl. Thus, in a Nash equilibrium the high-value agent’s payoff is at least ch and the low-value agent’s payoff is at least cl. We prove the proposition for the winner-bid auction, which we denote by (M,ϕ). The proof for the loser-bid auction is symmetric. Let γ be the probability with which an agent with the high value gets the object when there is a tie. We prove our proposition for the slightly more general mechanism in which γ ≥ 1/2. The alternative tie breaker γ = 1 may be relevant in experimental settings. Let σ ∈ N(M,ϕ, v) with vl < vh. Let p be in the support of σh. We claim that p ≤ ch. Suppose without loss of generality that p is the maximal element in the support of σh. Suppose by contradiction that p ≥ ch + 1. Since p > cl and γ > 0, the expected payoff of any bid b > p for the low-valuation agent is strictly lower than the expected payoff of p. 19 Thus, there is no b > p in the support of σl. Since p− 1 ≥ ch, Uϕ(p− 1|σl; vh)− Uϕ(p|σl; vh) ≥ (1− σl(p)− σl(p− 1)) +σl(p− 1)(γ + (1− γ)((p − 1)− (vh − p))) +σl(p)(p − (vh − p)) = (1− σl(p)− σl(p− 1)) +σl(p− 1)(2γ − 1 + 2(1− γ)(p − ch)) +2σl(p)(p − ch) > 0, where the last inequality holds because σl is a probability distribution, γ ≥ 1/2, and p− ch ≥ 1. This contradicts p is in the support of σh. We claim now that p ≥ cl. Suppose without loss of generality that p is the minimal element in the support of σh. Suppose by contradiction that p ≤ cl−1. We claim that there is no b < p in the support of σl. Suppose by contradiction there is b < p in the support of σl. Since cl − p ≥ 1 and b < p, Uϕ(p+ 1|σh; vl)− Uϕ(b|σh; vl) ≥ σh(p)(vl − (p+ 1)− p) = σh(p)(2(cl − p)− 1) > 0. This contradicts b is in the support of σl. We claim that σl(p) = 0. Suppose by contradiction that σl(p) > 0. Then, Uϕ(p+ 1|σh; vl)− Uϕ(p|σh; vl) ≥ σh(p) (γ(vl − (p+ 1)− p) + (1− γ)(−1)) = σh(p) (γ(2(cl − p)− 1)− (1− γ)) ≥ σh(p)(γ − 1 + γ) ≥ 0. If the inequality above holds strictly, there is a contradiction to σl(p) > 0. Since σh(p) > 0, γ ≥ 1/2, and cl − p ≥ 1, the expression above is equal to zero only when γ = 1/2 and p = cl − 1. Suppose then that γ = 1/2 and p = cl − 1. Since for each b < p, σl(b) = 0, we have that Uϕ(p + 1|σl; vh)− Uϕ(p|σl; vh) ≥ 1 2 σl(p)(−1) + 1 2 σl(p)(vh − cl − (cl − 1)) = σl(p)(ch − cl) > 0. This contradicts σh(p) > 0. Thus far we have proved that the support of σl belongs to (p,+∞). Let b be the minimum element of the support of σl. Thus, p < b. If b < ch, since γ > 0, agent h would benefit by bidding b instead of p. Thus, b ≥ ch. Recall that the support of σh belongs to (−∞, ch]. Since the expected payoff of l is at least cl, b ≤ ch, for otherwise agent l, when bidding b, would receive the object with probability one and pay the other agent more than ch > cl. Thus, b = ch. Thus, agent l would benefit by bidding 20 b − 1 instead of b, because ch > cl and σh(p) > 0. This contradicts ch is in the support of σl. Thus, the support of σl is empty. This is a contradiction. Thus, the support of σh belongs to [cl, ch]. Let p be the minimum element of the support of σh and b an element in the support of σl. We claim that b ≤ p. Suppose by contradiction that there is b > p in the support of σl. Since p ≥ cl, b > cl. Thus, since σh(p) > 0, agent l benefits by bidding cl instead of b. This contradicts b is in the support of σl. Thus, the support of σl belongs to (−∞, p]. Finally, let p be the minimum of the support of σh. If γ = 1/2 and σ is efficient, the support of σl belongs to {0, ..., p − 1}. Thus, σh = δp, i.e., agent h receives the object and pays p to the other agent. Suppose now that σ is inefficient, i.e., σl(p) > 0 and γ = 1/2. We claim that p = cl and σl(p) < 1/(ch − cl). Recall that, p ∈ [cl, ch]. Since σl(p) > 0, 0 ≥ Uϕ(p − 1|σh; vl)− Uϕ(p|σh; vl) = σh(p)[p − [(vl − p)/2 + p/2]] = σh(p)(p − cl). Since σh(p) > 0, p = cl. Recall that agent l has guaranteed vl/2 in each Nash equilibrium of (M,ϕ, v). If the maximum of the support of σl is cl, then agent h gets in equilibrium at least what he or she would get by bidding cl +1. This bid gives agent h an expected payoff of vh − (vl/2 + 1). Thus, the aggregate expected payoff is at least vh − 1. Proof of Proposition 2. We prove the proposition for the winner-bid auction. The proof for the loser-bid auction is symmetric. Let σ ∈ N(M,ϕ, v). By Proposition 1, there is p ∈ {vl/2, ..., vh/2} that is in the support of σh such that the support of σl belongs to {0, ..., p} and the support of σh belongs to {p, ..., p}. Suppose first that σ is efficient. Thus, the support of σl belongs to {0, ..., p − 1}. Thus, σh = δp. Thus, πl(σ) = vl/2 + t and πh(σ) = vh/2 + ES(v) − t for some t ∈ {0, 1, ..., ES(v)}. One can easily see that for each t ∈ {0, 1, ..., ES(v)} the distributions σl = δp−1, σh = δp with p = vl/2 + t is a Nash equilibrium. Proof of necessity in Theorem 1. We prove that h’s expected payoff in an empirical equilibrium of the winner-bid auction is bounded below by the expressions in the theorem. The proof for the loser-bid auction is symmetric. Let (M,ϕ) be the winner-bid auction and v ∈ Θ. Let σ ∈ N(M,ϕ, v). For i ∈ N , let ci := vi/2. By Proposition 1 there is p ∈ {cl, ..., ch} separating the supports of σl and σh, i.e., such that the support of σl belongs to {0, ..., p}; the support of σh belongs to {p, ..., p}; and p belongs to the support of σh. Suppose that p ≥ cl + 1. Since p is a best response to σl for h with type vh, h’s expected payoff of p should be at least the expected payoff of 21 p− 1. Thus, vh − p ≥ σl(p− 1) [ 1 2 (vh − (p− 1)) + 1 2 (p− 1) ] + (1− σl(p− 1))(vh − (p − 1)). Equivalently, σl(p− 1) ≥ 1/(ch − p+ 1). (4) Let σ be an efficient empirical equilibrium of (M,ϕ, v) and let p be its associated separating bid (in the support of σh). Let {σ λ}λ∈N be a sequence of interior payoff monotone distribu- tions for (M,ϕ, v) that converges to σ as λ → ∞. This sequence exists by Theorem 3. For i ∈ N and {r, d} ⊆ {0, 1, ..., p} such that r ≤ d, let ∆i(r, d) be the difference in expected utility for agent i in the winner-bid auction between the two situations in which agent i bids strictly to the left of r and bids exactly d, conditional on agent −i bidding r.10 Using this notation we have that when b < d, Uϕ(b|σ−i, vi)−Uϕ(d|σ−i, vi) = ∑ r<b σ−i(r)(d− b)+σ−i(b)(d− ci)+ ∑ b<r≤d σ−i(r)∆i(r, d). (5) We prove that the expected payoff for h given σ satisfies the lower bound in the statement of the theorem. Case 1: ES(v) = 1. Recall that we require valuations to be positive. Thus, cl > 0. Let λ ∈ N. By (5), Uϕ(cl − 1|σ λ h , vl)− Uϕ(cl|σ λ h, vl) = ∑ r<cl−1 σλh(r) + σ λ h(cl − 1)(cl − cl) + σ λ h(cl − 1)∆l(cl, cl) = ∑ r<cl−1 σλh(r) + 0 + 0 ≥ 0. By payoff monotonicity, σλl (cl) ≤ σ λ l (cl − 1). By convergence, σl(cl) ≤ σl(cl − 1). Thus, σl(cl) ≤ 1/2. We claim that p = cl. Suppose by contradiction that p = ch = cl + 1. By Proposition 1, the support of σl belongs to {0, ..., cl}. Thus, Uϕ(cl|σl, vh)− Uϕ(ch|σl, vh) = (1− σl(cl))(ch + 1) + σl(cl)ch − ch = 1− σl(cl) > 0. This contradicts σ is a Nash equilibrium of (M,ϕ, v). Thus, p = cl. Since σ is efficient, πh = vh/2 + 1. Case 2: ES(v) > 1. Let t := p− cl − 1 and suppose that t ≥ 1. Let d := p− 1. Then ∆l(d, d) = d− ((vl − d)/2 + d/2) = t. 10Note that conditional on agent −i bidding r, the payoff for agent i when bidding strictly to the left of r is exactly r. Thus, ∆i(r, d) is well defined. 22 Let r < d and n = d− r. Then, ∆l(r, d) = r − (vl − d) = cl + t− n− (2cl − cl − t) = 2t− n. (6) We claim that for each max{0, cl − 3t} ≤ b < d there is Λ ∈ N such that for each λ ≥ Λ Uϕ(b|σ λ h , vl)− Uϕ(d|σ λ h , vl) ≥ 0. (7) Note that if this claim is true for b, then by payoff monotonicity and convergence, σl(b) ≥ σl(d). By (5), for each max{0, cl − 3t} ≤ b < d, we have that Uϕ(b|σ λ h , vl)− Uϕ(d|σ λ h , vl) = ∑ r<b σ λ h(r)(d− b) + σ λ h(b)(d − cl) + ∑ b<r<d σ λ h(r)∆l(r, d) +σλh(d)∆l(d, d) = ∑ r<b σ λ h(r)(d− b) + σ λ h(b)t+ ∑ b<r<d σ λ h(r)∆l(r, d) + σ λ h(d)t ≥ ∑ b<r<d σ λ h(r)∆l(r, d). (8) Let cl − t− 1 ≤ b < d. By (6), for each d− 2t ≤ r, ∆l(r, d) ≥ 0. Thus, by (8), for each λ ∈ N, Uϕ(b|σ λ h , vl) − Uϕ(d|σ λ h , vl) ≥ 0. We complete the proof of our claim by proving by induction on η ∈ {1, ..., 2t} that the claim holds for b = cl − t − η. Let η ∈ {2, ..., 2t} and suppose that for each cl − t− η < g < d, σl(g) ≥ σl(d). Let b := cl − t− η. We claim that there is Λ ∈ N for which for each λ ≥ Λ, ∑ b<r<d σλh(r)∆l(r, d) ≥ 0. Note that ∑ b<r<d σ λ h(r)∆l(r, d) = ∑ cl−t−η+1≤r≤cl−t−1 σλh(r)∆l(r, d) + σ λ h(c− t)∆l(cl − t, d) + ∑ cl−t+1≤r≤cl−t+η−1 σλh(r)∆l(r, d) + ∑ cl−t+η≤r<d σλh(r)∆l(r, d). Since for each r ≥ cl − t, ∆l(r, d) ≥ 0, ∑ b<r<d σ λ h(r)∆l(r, d) ≥ ∑ cl−t−η+1≤r≤cl−t−1 σλh(r)∆l(r, d) + ∑ cl−t+1≤r≤cl−t+η−1 σλh(r)∆l(r, d) = ∑ 1≤r≤η−1 σ λ h(cl − t− r))(−r)+ ∑ 1≤r≤η−1 σ λ h(cl − t+ r)r = ∑ 1≤r≤η−1(σ λ h(cl − t+ r)− σ λ h(cl − t− r))r. Thus, in order to prove our claim it is enough to show that there is Λ ∈ N such that for 23 each λ ≥ Λ and each r ∈ {1, .., η − 1}, σλh(cl − t+ r) ≥ σ λ h(cl − t− r). Let r ∈ {1, .., η − 1}. Then, ∆h(cl− t+r, cl− t+r) = cl− t+r− ((vh− (cl− t+r))/2+(cl− t+r)/2) = −(ch−cl+ t−r). Let 1 ≤ s ≤ 2r − 1. Then, ∆h(cl − t+ r− s, cl − t+ r) = cl − t+ r− s− (vh − (cl − t+ r)) = −(2(ch − cl + t− r) + s). Observe that Uϕ(cl − t+ r|σl, vh)− Uϕ(cl − t− r|σl, vh) = − ∑ 0≤s<cl−t−r σl(s)2r +σl(cl − t− r)(vh − (cl − t+ r)− ((vh − (cl − t− r))/2 + (cl − t− r)/2)) − ∑ 1≤s≤2r−1 σl(cl − t+ r − s)∆h(cl − t+ r − s, cl − t+ r) −σl(cl − t+ r)∆h(cl − t+ r, cl − t+ r). Thus, Uϕ(cl − t+ r|σl, vh)− Uϕ(cl − t− r|σl, vh) ≥ −(1− ∑ 0≤s≤2r σl(cl − t+ r − s))2r +σl(cl − t− r)(ch − cl + t− r) + ∑ 1≤s≤2r−1 σl(cl − t+ r − s)(2(ch − cl + t− r) + s) +σl(cl − t+ r)(ch − cl + t− r). Since cl − t− r ≥ cl − t− η + 1 = b+ 1, for each 0 ≤ s ≤ 2r, b + 1 ≤ cl − t+ r − s. Since r ≤ η − 1 and η ≤ 2t, cl − t + r ≤ cl + t − 1 < d. By the induction hypothesis, for each 0 ≤ s ≤ 2r, σl(cl − t+ r− s) ≥ σl(d) = σl(p− 1). By (4), σl(cl − t+ r− s) ≥ 1/(ch − p+1). Thus, Uϕ(cl − t+ r|σl, vh)− Uϕ(cl − t− r|σl, vh) ≥ −(1− 2r+1 ch−p+1 )2r + 2r ch−p+1 2(ch − cl + t− r) > 2r ch−p+1 (2(ch − cl)− (ch − p+ 1)). Since p ≥ cl and ch > cl + 1, 2(ch − cl) − (ch − p + 1) > 0. Thus, Uϕ(cl − t+ r|σl, vh) − Uϕ(cl − t− r|σl, vh) > 0. Thus, there is Λ ∈ N such that for each λ ≥ Λ, Uϕ(cl − t+ r|σ λ l , vh)− Uϕ(cl − t− r|σ λ l , vh) > 0. By payoff monotonicity, σ λ h(cl−t+r) ≥ σ λ h(cl−t−r). Thus, there is Λ ∈ N such that for each λ ≥ Λ and each r ∈ {1, .., η − 1}, σλh(cl − t+ r) ≥ σ λ h(cl − t− r). Thus, for each λ ≥ Λ, ∑ b<r<d σ λ h(r)∆l(r, d) ≥ 0. In summary, we have proved that when p−1 ≥ cl+1, for each max{cl−3t, 0} ≤ b ≤ p−1, σl(b) ≥ σl(p − 1). (9) 24 There are two sub-cases. Case 2.1: vl ≤ 3vh/8. We claim that p ≤ ES(v)/2− vl/4+ 1/2 = vh/4+1/2. Suppose by contradiction that p > vh/4+ 1/2. Since p and cl are integers, p ≥ ⌊vh/4+ 1/2⌋+1 and cl ≤ ⌈3vh/16⌉ ≤ 3vh/16. Then, p− 1− cl ≥ ⌊vh/4 + 1/2⌋ + 1− ⌈3vh/16⌉. Since vh is even, ⌊vh/4+1/2⌋ ≥ vh/4 and p ≥ vh/4+1. Thus, p−1−cl ≥ vh/16. Thus, p−1−cl ≥ 1 whenever vh ≥ 16. Since ES(v) > 1, then vh ≥ 6 (recall that we assumed positive even valuations). Direct calculation determines that ⌊vh/4 + 1/2⌋ + 1 − ⌈3vh/16⌉ ≥ 1 for vh = {6, ..., 14}. Since, t = p − cl − 1 ≥ vh/4 − cl ≥ vh/16 = ch/8, cl − 3t ≤ cl − 3ch/8 ≤ 0. Thus, max{cl−3t, 0} = 0. Since t ≥ 1, by (9), σl(p−1) ≤ 1/(cl+t+1) = 1/(cl+p−1−cl+1) = 1/p. By (4), 1/(ch − p + 1) ≤ 1/p. Thus, p ≤ ch/2 + 1/2 = vh/4 + 1/2. This contradicts p ≥ vh/4 + 1. Since σ is efficient and σh(p) > 0, the support of σl belongs to {0, ..., p − 1}. Thus, πh(σ) ≥ vh−p ≥ vh−(vh/4+1/2) = vh/2+vh/4−1/2 = vh/2+ES(v)/2+vl/4−1/2. Note that if vl ≤ 3vh/8 and ES(v) = 2, then vl = 2. Thus, statements (a) and (b) in the theorem have no overlap. Case 2.2: vl > 3vh/8. We claim that p ≤ vl/2 + (vh/2 − vl/2)/5 + 4/5. Suppose by contradiction that p > q := ⌊vl/2 + (vh/2− vl/2)/5 + 4/5⌋. Since vl/2 and vh/2− vl/2 > 1 are integers, q ≥ vl/2 + 1 = cl + 1. Moreover, q = vl/2 + (vh/2 − vl/2)/5 + ε where ε ∈ {0, 1/5, 2/5, 3/5, 4/5}. Let n := p−q ≥ 1 and tq := q−cl ≥ 1. Then, tq = vl/2+(vh/2− vl/2)/5+ε−cl = (ch−cl)/5+ε. Thus, cl−3tq = cl−3(ch−cl)/5−3ε ≥ 8(cl−3ch/8)/5−3ε. Since vl > 3vh/8, cl > 3ch/8. Since cl and ch are integers, cl − 3ch/8 ≥ 1/8. Thus, cl − 3tq ≥ 1/5 − 3ε. Thus, if ε ≤ 1/5, cl − 3tq ≥ 0; if 2/5 ≤ ε ≤ 3/5, cl − 3tq ≥ −1; and if ε = 4/5, cl − 3tq ≥ −2. Suppose that ε ≤ 1/5. Since tq ≥ 1, by (9), σl(p− 1) ≤ 1/(4tq +1). By (4), 1/(ch − p+ 1) ≤ 1/(4tq + 1). Thus, 1/(ch − q − n+ 1) ≤ 1/(4tq + 1). Equivalently, ch − 4tq − n ≥ q. Since n ≥ 1 and tq = (ch − cl)/5 + ε, ch − 4(ch − cl)/5 − 4ε − 1 ≥ q. Equivalently, q−5ε−1 = cl+(ch−cl)/5−5ε−1 ≥ q. This is a contradiction. Suppose that 2/5ε ≤ 3/5. Since tq ≥ 1, by (9), σl(p−1) ≤ 1/(4tq−1+1). By (4), 1/(ch−p+1) ≤ 1/(4tq). Thus, 1/(ch − q − n + 1) ≤ 1/(4tq). Equivalently, ch − 4tq − n + 1 ≥ q. Since n ≥ 1 and tq = (ch−cl)/5+ε, ch−4(ch−cl)/5−4ε ≥ q. Equivalently, q−5ε = cl+(ch−cl)/5−5ε−1 ≥ q. This is a contradiction. Finally, suppose that ε = 4/5. Since tq ≥ 1, by (9), σl(p − 1) ≤ 1/(4tq − 2 + 1). By (4), 1/(ch − p + 1) ≤ 1/(4tq − 1). Thus, 1/(ch − q − n + 1) ≤ 1/(4tq − 1). Equivalently, ch − 4tq − n + 1 + 1 ≥ q. Since n ≥ 1 and tq = (ch − cl)/5 + ε, ch − 4(ch − cl)/5− 4ε+ 1 ≥ q. Equivalently, q − 3 = cl + (ch − cl)/5− 5ε+ 1 ≥ q. This is a contradiction. Since σ is efficient and σh(p) > 0, the support of σl belongs to {0, ..., p − 1}. Thus, πh(σ) ≥ vh − p ≥ vh − (vl/2 + (vh/2− vl/2)/5 + 4/5) = vh/2 + 4ES(v)/5 − 4/5. Suppose now that ES(v) = 2. Recall that σ is efficient. Since vl > 3vh/8, vl > 2. Since πh(σ) ≥ vh/2 + 4ES(v)/5 − 4/5 = vh/2 + 4/5, p ≤ cl + 1. We prove that p = cl. 25 Suppose by contradiction that p = cl+1, i.e., πh(σ) = vh/2+1. By Proposition 1, σh = δp. Let {σλ}λ∈N be a sequence of interior payoff monotone distributions such that as λ → ∞, σλ → σ. Since Uϕ(cl − 2|σh; vl) − Uϕ(cl + 1|σh; vl) = cl + 1 − cl = 1, there is Λ ∈ N such that for each λ ≥ Λ, Uϕ(cl − 2|σ λ h ; vl) > Uϕ(cl + 1|σ λ h; vl). By payoff monotonicity, for each λ ≥ Λ, σλl (cl − 2) ≥ σ λ l (cl + 1). By convergence, σl(cl − 2) ≥ σl(cl + 1). Notice also that for each λ ∈ N, Uϕ(cl − 1|σ λ h ; vl) ≥ Uϕ(cl|σ λ h; vl). Thus, for each λ ∈ N, σ λ l (cl − 1) ≥ σ λ l (cl). Now, Uϕ(cl + 1|σ λ l ; vh)− Uϕ(cl|σ λ l ; vh) = ∑ b<cl σλl (b)(−1) + σ λ l (cl)(ch + 1− ch) +σλl (cl + 1)(ch − (ch − 1)) ≤ −σλl (cl − 2)− σ λ l (cl − 1) +σλl (cl) + σ λ l (cl + 1) ≤ 0. By payoff monotonicity, for each λ ≥ Λ, σλh(cl) ≥ σ λ h(cl + 1). By convergence, σh(cl) ≥ σh(cl + 1). Since p = cl + 1 is in the support of σh, cl is also in the support of σh. This contradicts that the support of σh is contained in {p, ..., p}. Finally, suppose that ES(v) > 2 and vl ≥ 7vh/12 − 7/6. We claim that p < vl/2 + (vh/2− vl/2)/5 +4/5. Suppose by contradiction that p = vl/2+ (vh/2− vl/2)/5 +4/5. Let y := cl − 3(p − 1 − cl). Direct calculation yields that since vl ≥ 7vh/12 − 7/6, y ≥ ch − p. By (7), there is Λ ∈ N such that for each λ ≥ Λ, and each max{0, cl − 3t} ≤ b < p − 1, σλl (b) ≥ σ λ l (p− 1). Since p is in the support of σh and p > cl, for each b < p, Uϕ(b|σh; vl) > Uϕ(p|σh; vl). Thus, we can suppose without loss of generality that for each λ ≥ Λ and each b < p, Uϕ(b|σ λ h ; vl) > Uϕ(p|σ λ h ; vl) and consequently σ λ l (b) ≥ σ λ l (p). Thus, Uϕ(p|σ λ l ; vh)− Uϕ(p− 1|σ λ l ; vh) = ∑ b<p−1 σ λ l (b)(−1) +σλl (p− 1)(2ch − p− ch) + σ λ l (p)(ch − p) = σλl (p)(ch − p)− ∑ 0≤b<y σ λ l (b) − ∑ y≤b≤p−1 σ λ l (b) + (ch − p+ 1)σ λ l (p− 1) ≤ σλl (p)(ch − p)− ∑ 0≤b<y σ λ l (p) − ∑ y≤b≤p−1 σ λ l (p − 1) + (ch − p+ 1)σ λ l (p − 1) ≤ σλl (p − 1)(ch − p+ 1− 4(p − 1− cl)− 1) = 0, where the last equality follows from direct calculation given that p = cl+(ch−cl)/5+4/5. By payoff monotonicity, for each λ ≥ Λ, σλh(p−1) ≥ σ λ h(p). By convergence, σh(p−1) ≥ σh(p). Thus, p − 1 is in the support of σh. This contradicts that the support of σh belongs to {p, ..., p}. Proof of sufficiency in Theorem 1. Let (M,ϕ) be an EPA and v ∈ Θ such that vl < 26 Statement Case 1 Case 2 Case 3 Case 4 Case 5 1 + 2 + + + 3 + + + 4 + + + + Table 1: Cases in the proof of sufficiency in Theorem 1: If the case in the proof (column) applies to the statement of the theorem (row), there is a + in the corresponding cell. vh. We prove that each Nash equilibrium of (M,ϕ, v) satisfying the bounds in the statement of the theorem is an empirical equilibrium. We prove it for WB. The proof for LB is symmetric. We consider five cases for which the same type of construction applies. These cases are exhaustive. Table 1 summarizes how they apply to the different statements in the theorem. Case 1: Let (πl, πh) be such that πl = cl and πh = ch+ES(v). We construct a sequence of weakly payoff monotone distributions that converges to σ where σl = δcl−1 and σh = δcl . One can easily see that σ is a Nash equilibrium of (M,ϕ, v). Note that for each b ≤ cl − 1, Uϕ(cl|σl; vh)−Uϕ(b|σl; vh) ≥ Uϕ(cl|σl; vh)−Uϕ(cl−1|σl; vh) = vh−cl−ch = ch−cl > 0, (10) and for each b > cl, Uϕ(cl|σl; vh)− Uϕ(b|σl; vh) = b− cl > 0. (11) Thus, cl is h’s unique best response to σl. Note also that for each b > cl, Uϕ(cl − 1|σh; vl)− Uϕ(b|σh; vl) = cl − (vl − b) = b− cl > 0. (12) Let ε > 0 and t ∈ N. For each xh ∈ R Mh and xl ∈ R Mh , let f ε,t h (xh) = (1− ε)δcl + εl t(x), f ε,t l (xh) = (1− ε)δcl−1 + εl t(x). Let {γt}t∈N be such that for each t ∈ N, γ t is a fixed point of the composition of (f ε,t h , f ε,t l ) and the expected payoff operator, i.e., the continuous mapping that assigns to each profile of mixed strategies γ, F ε,t(γ) := (f ε,t l (Uϕ(b|γh; vl)b∈{0,...,p}), f ε,t h (Uϕ(b|γl; vh)b∈{0,...,p})). Existence of γt is guaranteed by Brower’s fixed point theorem. We will now describe the intuition of the reminder of the proof of this case. We will spell 27 the details after. The construction of empirical equilibria in other cases will rest partially on arguments that are related to this first case. Observe that as ε vanishes and t diverges to infinity, the distributions γε,t converge to σ. Thus, we need to show that for appropriately chosen parameters ε and t, γε,t is weakly payoff monotone for v. We will show that it is indeed payoff monotone for v. Note that by continuity, we will be able to select ε small enough that (10-12) hold. Since γε,t is interior, cl − 1 actually has higher expected utility than cl for l (l gains one dollar when h bids below cl − 1; note that by our assumption vl ≥ 4, cl − 1 > 0). To to complete the construction, it is enough to show that one can select ε and t such that cl − 1 has higher utility than any lower bid for l given that h plays γ ε,t h . Note that the difference in utility between cl−1 and any bid below it for h is bounded below by a positive number. This is so because when h bids cl − 1 the auction ends in a tie with probability close to one. Bidding below cl − 1 guarantees h loses almost for sure. Since the probabilities that γ ε,t h places in cl − 1 and any bid below it are determined by a logistic QRF, the ratio of this probabilities also vanishes, i.e., h plays any bid below cl − 1 with much less probability than cl − 1. Now, conditional on h bidding cl − 1, the difference in utility for l between bidding cl − 1 or below this bid is at least one unit. If what h bids below cl− 1 is small compared to what she bids cl− 1, l prefers to bid cl − 1 than any lower bid. To simplify notation, let u ε,t l (b) := Uϕ(b|γ ε,t h ; vl) and u ε,t h (b) := Uϕ(b|γ ε,t l ; vh). For each t ∈ N, ||σ − γε,t||∞ := max i∈{l,h},b∈{0,...,p} |σi(b)− γ ε,t i (b)| < ε. Thus, there is η > 0 such that for each 0 < ε < η, each t ∈ N, each b ∈ {0, ..., p} \ {cl}, u ε,t h (cl)− u ε,t h (b) > 0, (13) and for each b > cl, u ε,t l (cl − 1)− u ε,t l (cl − 1) > 0. (14) For each t and ε, γε,t is interior. Thus, u ε,t l (cl − 1)− u ε,t l (cl) = ∑ b<cl−1 γ ε,t h (b) > 0. (15) By (13), for each 0 < ε < η and each t, γ ε,t h is ordinally equivalent to (u ε,t h (b))b∈{0,...,p} (note that γ ε,t h is determined outside the support of σh by a logistic QRF). Let 0 < ε < min{η, 2/(p−2)}. We claim that we can fin T ∈ N such that for each t ≥ T , γ ε,t l is ordinally equivalent to (u ε,t l (b))b∈{0,...,p}. By (14) and (15) it is enough to show that there is T such 28 that for each t ≥ T , for each b < cl−1, u ε,t l (cl−1)−u ε,t l (b) > 0 (note that γ ε,t l is determined outside the support of σl by a logistic QRF). For each b < cl − 1, u ε,t h (cl − 1)− u ε,t h (b) = ∑ d<b γ t l (d)(−(cl − 1− b)) + γ t l (b)(vh − cl + 1− ch) + ∑ b<d<cl−1 γtl (d)(vh − cl + 1− d) + γ t l (cl − 1)(ch − cl + 1) > −εp+ 2(1− ε) > 0. where the last inequality holds because ε < 2/(p − 2). Thus, for each b < cl − 1. u ε,t l (cl)− u ε,t l (b) = ∑ d<b γ t h(d)(−(cl − b)) + γ t h(b)(vl − cl − cl) + ∑ b<d<cl γth(d)(vl − cl − d) + γ t h(cl)(cl − cl) ≥ − ∑ d<b γ t h(d)cl + γ t h(cl − 1) = γth(cl − 1) ( 1− ∑ d<b γt h (d) γt h (cl−1) cl ) = γth(cl − 1) ( 1− ∑ d<cl−1 γt h (d) γt h (cl−1) cl ) = γth(cl − 1) ( 1− cl ∑ d<cl−1 etuh(d) etuh(cl−1) cl ) = γth(cl − 1) ( 1− cl ∑ d<cl−1 e−t(uh(cl−1)−uh(d)) ) ≥ γth(cl − 1) ( 1− cl ∑ d<cl−1 e−t(−εp+2(1−ε)) ) . Thus, there is T ∈ N such that for each t ≥ T , u ε,t l (cl)− u ε,t l (b) > 0. Case 2: πl = cl +1 and πh = ch +ES(v)− 1 and ES(v) > 2. Let ε > 0 and t ∈ N. For each xh ∈ R Mh and xl ∈ R Mh , let f ε,t h (xh) = (1− ε)δcl+1 + εl t(x). f ε,t l (xh) = (1/2 − ε)δcl−1 + (1/2 − ε)δcl + 2εl t(x). Let {γt}t∈N be such that for each t ∈ N, γ t is a fixed point of the composition of (f ε,t h , f ε,t l ) and the expected payoff operator. As t → ∞, γth → δcl and γ t l → (1/2)δcl−1 + (1/2)δcl . Let σ be this limit distribution profile. Then, πl(σ) = cl + 1 and πh(σ) = ch + ES(v) − 1. In order to complete the construction as in Case 1, we need to show that ε can be selected small enough such that for large t, the distribution is strictly monotone with respect to expected payoffs. The expected payoff of cl + 1 given σ for h, is greater than the payoff of any other bid. The expected payoff of cl − 1 and cl given σ for l is greater than the payoff of any bid higher than cl. Thus, it is only necessary to show that the expected payoff of cl + 1, for the distribution profile γ t for h, is eventually greater than the payoff of cl. Note 29 that the expected payoff of cl − 1 is never less than that of cl for l. For each b < cl − 1, u ε,t h (cl − 1)− u ε,t h (b) = ∑ d<b γ t l (d)(−(cl − 1− b)) + γ t l (b)(vh − cl + 1− ch) + ∑ b<d<cl−1 γtl (d)(vh − cl + 1− d) + γ t l (cl − 1)(ch − cl + 1) > −2εp+ 4(1/2 − ε). Thus, the argument in Case 1 can be easily reproduced for the sequence of fixed points. Case 3: cl ≤ 3ch/8, cl + 1 < p ≤ vh/4 + 1/2, πl = p and πh = vh − p and ES(v) > 2. Let ε > 0 and t ∈ N. For each xh ∈ R Mh and xl ∈ R Mh , let f ε,t h (xh) = (1− ε)δp + εl t(x). f ε,t l (xh) = (1/p − ε)   ∑ b<p δb  + (p − 1)εδp + εl t(x). Let {γt}t∈N be such that for each t ∈ N, γ t is a fixed point of the composition of (f ε,t h , f ε,t l ) and the expected payoff operator. As t → ∞, γth → δp and γ t l → (1/p) ∑ b<p δb. Let σ be this limit distribution profile. Then, πl(σ) = p and πh(σ) = vh − p. In order to complete the construction as in Case 1, we need to show that ε can be selected small enough such that for large t, the distribution is strictly monotone with respect to expected payoffs. The expected payoff of p given σ for h, is greater than the payoff of any bid greater than p. The expected payoff of each bid less than or equal to p−1 given σ for l is greater than the payoff of any bid greater than or equal to p. The expected payoff of p given σ for l is greater than the payoff of any bid greater than p. Thus, it is only necessary to show that the expected payoff of p, for the distribution profile γt for h, is eventually greater than the payoff of each b < p. Since 2 ≤ cl + 1 < p ≤ vh/4 + 1/2 = ch + 1/2, (ch − p+ 1)/p ≥ 1, u ε,t h (p)− u ε,t h (p− 1) = − ∑ d<p−1 γ t l (d) + γ t l (p − 1)(vh − p− ch) +γtl (p)(ch − p) > −(1/p − ε)(p − 1)− ε+ (1/p − ε)(ch − p) + (p− 1)ε(ch − p) = −1 + 1/p + ε(p− 1)− ε+ (ch − p+ 1)/p − 1/p −ε(ch − p) + (p− 1)ε(ch − p) ≥ 0. 30 Moreover, for b < p, u ε,t h (b)− u ε,t h (b− 1) = − ∑ d<b−1 γ t l (d) + γ t l (b− 1)(vh − b− ch) +γtl (b)(ch − b) > −(1/p − ε)(b − 1)− ε+ 2(1/p − ε)(ch − b) ≥ −b/p + 1/p + ε(b− 1)− ε+ 2(ch − b+ 1)/p − 2/p − 2ε(ch − b) ≥ 1− 2ε(ch − b)− ε− 1/p. Thus, the argument in Case 1 can be easily reproduced for the sequence of fixed points. Case 4: vl > 3vh/8, cl + 1 < p < vl/2 + (vh/2 − vl/2)/5 + 4/5, πl = p and πh = vh − p and ES(v) > 2. Let y := cl − 3(p− 1− cl). Since p− 1 ≤ cl +(vh/2− vl/2)/5 +4/5− 1 and cl > 3ch/8, y > 0. Let n := p− y = 4(p−1− cl)+1. Since p < vl/2+(vh/2− vl/2)/5+4/5, 1/(4(p − 1 − cl) + 1) > 1/(ch − p + 1). Thus, 1/n > 1/(ch − p + 1). Let σ be defined by: σh = δp and σl := (1/n) ∑ y≤b<p δb. Then, Uϕ(p|σl; vh) − Uϕ(p − 1|σl; vh) = −(n − 1)/n + (1/n)(ch−p) > 0. Thus, p is a unique best response to σl for h. Clearly, σl is a best response to σh for l. Thus, σ is a Nash equilibrium with payoffs πl(σ) = p and πh(σ) = vh − p. Now, for y ≤ b− 1 < b ≤ p− 1, Uϕ(b|σl; vh)− Uϕ(b− 1|σl; vh) ≥ −(n− 2)/n + (1/n)(ch − b) + (1/n)(ch − b) > 1. Thus, Uϕ(b|σl; vh) strictly increases in the set b ∈ {y, ..., p}. Let r ∈ {p, ..., p} be the maximum for which Uϕ(r|σl; vh) ≥ Uϕ(y|σl; vh). Thus, Uϕ(r + 1|σl; vh) < Uϕ(y|σl; vh). Now, for each b < y, Uϕ(y|σl; vh)− Uϕ(b|σl; vh) ≥ σl(y)(ch − y) ≥ ES(v)/n > 0. Thus, there is ε > 0 for which for each distribution profile γ such that ||σ − γ||∞ < ε, (i) there is a constant c > 0 such that for each b 6= p, Uϕ(p|γl; vh) − Uϕ(b|γl; vh) ≥ c; (ii) for each b ∈ {y, ..., r} and each d < y or d > r, Uϕ(b|γl; vh) − Uϕ(d|γl; vh) > 0; (iii) Uϕ(b|γl; vh) strictly increases in the set b ∈ {y, ..., p}; and (iv) for each b ≤ p − 1 < d, Uϕ(b|γh; vl)− Uϕ(d|γh; vl) > 0. Let t ∈ N and η := ε/2(r − y + 2). For each xh ∈ R Mh and xl ∈ R Mh , let f ε,t h (xh) = (1− ε/2)δp + η ∑ y≤b≤r δb + ηl t(x). f ε,t l (xh) = (1/n − ε)   ∑ y≤b<p δb  + nεlt(x). 31 Let {γt}t∈N be such that for each t ∈ N, γ t is a fixed point of the composition of (f ε,t h , f ε,t l ) and the expected payoff operator. Then, ||γt − σ||∞ < ε. Thus, for each t ∈ N, γ t satisfies conditions (i)-(iv) above. By (i) and (ii), for each t ∈ N and each pair {b, d} ⊆ {0, ..., p}, γth(b) ≥ γ t h(d) if and only if Uϕ(b|γ t l ; vh) − Uϕ(d|γ tl; vh). By (iv), for each t ∈ N and each b ≤ p − 1 < d, Uϕ(b|γ t h; vl) − Uϕ(d|γ t h; vl) > 0. By (iii) we can reproduce the argument in our proof of necessity in Theorem 1 and show that for each t ∈ N and each y ≤ b < p − 1, Uϕ(b|γ t h; vl) − Uϕ(p − 1|γ t h; vl) ≥ 0. Now, by (i), as t → ∞, γ t h → γh := (1 − ε/2 + η)δp + η ∑ y≤b≤r δb. Direct calculation shows that for each b < y, Uϕ(p − 1|γh; vl)− Uϕ(b|γh; vl) = (p − 1 − cl)η. Thus, there is T ∈ N such that for each t ≥ T , if d < y ≤ b ≤ p − 1, Uϕ(b|γ t h; vl) − Uϕ(d|γ t h; vl) > 0. This implies that for each i ∈ N and {b, d} ⊆ {0, ..., p}, γtl (b) ≥ γ t l (d) if and only if Uϕ(b|γ t h; vl) ≥ Uϕ(d|γ th; vl). Thus, one can complete the proof as in Case 1. Case 5: vl > 3vh/8, vl < 7vh/12−7/6, cl+1 < p = vl/2+(vh/2−vl/2)/5+4/5, πl = p, πh = vh−p and ES(v) > 2. Let y := cl−3(p−1−cl). Let n = p−1−y+1 = 4(p−1−cl)+1. Since p− 1− cl ≥ 1, n ≥ 5. Direct calculation yields, n = ch − p+ 1. (16) Now, (ch − p)− y = 6((7vh/12− 7/6) − vl)/5 > 0. Since ch, p, and y are integers, (ch − p)− y ≥ 1. (17) Let σh := δp and σl := (1/n) ∑ y≤b≤p−1 δb. Clearly, for each p ≤ b < d, Uϕ(b|σl; vh) ≥ Uϕ(d|σl; vh) + 1. Clearly, for each d < y, Uϕ(y|σl; vh) > Uϕ(b|σl; vh). Let y ≤ d < p − 1. Then, Uϕ(d+ 1|σl; vh)− Uϕ(d|σl; vh) = −(b− y)(1/n) + (1/n)(vh − (d+ 1)− ch) +(1/n)(ch − (d+ 1)) = −(b− y + 2)/n + 2(ch − p+ 1)/n − 2/n ≥ 1− 2/n > 0. Let r ∈ {p, ..., p} be the maximum for which Uϕ(r|σl; vh) ≥ Uϕ(y|σl; vh). Thus, for each y ≤ b ≤ r and d > r, Uϕ(b|σl; vh) > Uϕ(d|σl; vh). Clearly, for each b < p < d, Uϕ(b|σh; vl) > Uϕ(p|σh; vl) > Uϕ(d|σh; vl). Thus, there is ζ > 0 such that if ||γ − σ||∞ < ζ, then (a) Uϕ(b|γl; vh) > Uϕ(d|γl; vh) whenever one of the following four conditions is satisfied (i) p ≤ b < d; (ii) d < b = y; (iii) y ≤ d < p − 1 and b = d + 1; or (iv) y ≤ b ≤ r and d > r. 32 (b) For each p < d, Uϕ(p|γl; vh) ≥ Uϕ(d|γl; vh) + 1/2. (c) For each b < p < d, Uϕ(b|γh; vl) > Uϕ(p|γh; vl) > Uϕ(d|γh; vl). Let t ∈ N, ε > 0, η := ε/2(r − y + 2), τ := (y + 3/2)ε/n such that 2max{ε, τ} < ζ. For each xh ∈ R Mh and xl ∈ R Mh , let f ε,t h (xh) = (1− ε/2)δp + η ∑ y≤b≤r δb + ηl t(x). f ε,t l (xl) = (1/n − τ)   ∑ y≤b≤p−1 δb  + ε   ∑ 0≤b≤y−1 δb  + εδp + (ε/2)l t(x). Let {γt}t∈N be such that for each t ∈ N, γ t is a fixed point of the composition of (f ε,t h , f ε,t l ) and the expected payoff operator. Then, ||γt − σ||∞ < ζ. Thus, for each t ∈ N, γ t satisfies (a)-(c) above. Now, Uϕ(p|γ t l ; vh)− Uϕ(p− 1|γ t l ; vh) = ∑ 0≤b≤p−2 γ t l (b)(−1) +γtl (p− 1)(vh − p− ch) + γ t l (p)(ch − p) ≥ −yε− (n− 1)(1/n − τ) −ε/2 + (1/n − τ)(ch − p) + ε(ch − p) = ε(ch − p− y − 1/2) +(1/n − τ)(ch − p+ 1− n). By (16) and (17), Uϕ(p|γ t l ; vh) − Uϕ(p− 1|γ t l ; vh) ≥ ε/2 > 0. Thus, for each t ∈ N and each {b, d} ⊆ {0, ..., p}, γth(b) ≥ γ t h(d) if and only if Uϕ(b|γ t l ; vh) − Uϕ(d|γ t l ; vh). Moreover, since for each t ∈ N and each b 6= p, Uϕ(p|γ t l ; vh) ≥ Uϕ(p− 1|γ t l ; vh) + ε/2, we have that as t → ∞, γth → γh := (1− ε/2 + η)δp + η ∑ y≤b≤r δb. The construction can be completed as in Case 6. Proof of Lemma 2. (M,ϕ) be a mechanism satisfying the property in the statement of the lemma. Let v ∈ Θ, such that vl < vh, 0 ≤ t ≤ t + 1 ≤ ES(v). Let v ∗ l := 2(vl/2 + t) and v∗h := v ∗ l +2. Thus, ES(v ∗) = 1 and the set of efficient and equitable allocations for v∗ is that in which agent h receives the object and the payoff of the lower valuation agent is between vl/2+ t and vl/2+ t+1. By the hypothesis of the lemma, there is σ ∈ N(M,ϕ, v ∗) that obtains an efficient allocation for v∗, i.e., agent h receives the object for sure, and vl/2 + t ≤ πl(σ) ≤ vl/2 + t+ 1. We claim that σ ∈ N(M,ϕ, v). We prove first that σl is a 33 best response to σh for l with type vl. Let ml ∈ Ml be in the support of σl and m ′ l ∈ Ml. Then Uϕ(ml|σh; vl) = Uϕ(ml|σh; v ∗ l ) ≥ Uϕ(m ′ l|σh; v ∗ l ) ≥ Uϕ(m ′ l|σh; vl). Where the first equality holds because in equilibrium σ, l never receives the object, so both expressions are the same integrals of expected compensation; the first inequality is the equilibrium condition for l with type v∗l ; and the third inequality holds because the expected utility index of an allotment for l with value vl is less than or equal than the expected utility index of the allotment for l with value v∗l , because v ∗ l ≥ vl. Letmh ∈ Mh be in the support of σh andm ′ h ∈ Mh. Since σ assigns the object to agent h with certainty, Uϕ(mh|σl; vh) − Uϕ(mh|σl; v ∗ h) = vh − v ∗ h. Since the utility index of h is in- variant when receiving an amount of money and no object, Uϕ(m ′ h|σl; vh)−Uϕ(m ′ h|σl; v ∗ h) ≤ vh − v ∗ h. Thus, Uϕ(m ′ h|σl; vh)− Uϕ(mh|σl; vh) ≤ Uϕ(m ′ h|σl; v ∗ h)− Uϕ(mh|σl; v ∗ h) ≤ 0, where the last inequality is the equilibrium condition for σ with type v∗h. Thus, σh is a best response to σl for h with type vh. Thus, σ ∈ N(M,ϕ, v) is efficient and such that the lower valuation agent’s payoff is between vl/2 + t and vl/2 + t+ 1. References Anderson, S. P., Goeree, J. K., Holt, C. A., 1998. Rent seeking with bounded rationality: An analysis of the allpay auction. Journal of Political Economy 106 (4), 828–853. URL http://www.jstor.org/stable/10.1086/250031 Anderson, S. P., Goeree, J. K., Holt, C. A., 2001. Minimum-effort coordination games: Stochastic potential and logit equilibrium. Games Econ Behavior 34 (2), 177 – 199. URL http://www.sciencedirect.com/science/article/pii/S0899825600908005 Andreoni, J., Che, Y.-K., Kim, J., 2007. Asymmetric information about rivals’ types in standard auctions: An experiment. Games Econ Behavior 59 (2), 240 – 259. URL http://dx.doi.org/10.1016/j.geb.2006.09.003 Brown, A. L., Velez, R. A., 2020. Empirical bias of extreme-price auctions: experimental evidence. URL https://arxiv.org/abs/1905.03876 34 http://www.jstor.org/stable/10.1086/250031 http://www.sciencedirect.com/science/article/pii/S0899825600908005 http://dx.doi.org/10.1016/j.geb.2006.09.003 https://arxiv.org/abs/1905.03876 Cabrales, A., Serrano, R., Mar 2012. Stochastically stable implementation. SERIEs 3 (1), 59–72. URL https://doi.org/10.1007/s13209-011-0062-7 Cason, T. N., Saijo, T., Sjöström, T., Yamato, T., 2006. Secure implementation experi- ments: Do strategy-proof mechanisms really work? Games Econ Behavior 57 (2), 206 – 235. URL http://dx.doi.org/10.1016/j.geb.2005.12.007 Cramton, P., Gibbons, R., Klemperer, P., 1987. Dissolving a partnership efficiently. Econo- metrica 55 (3), pp. 615–632. URL http://www.jstor.org/stable/1913602 de Clippel, G., October 2014. Behavioral implementation. American Economic Review 104 (10), 2975–3002. URL https://doi.org/10.1257/aer.104.10.2975 de Clippel, G., Saran, R., Serrano, R., 06 2018. Level-k Mechanism Design. The Review of Economic Studies 86 (3), 1207–1227. URL https://doi.org/10.1093/restud/rdy031 Eliaz, K., 2002. Fault tolerant implementation. The Review of Econ Stud 69 (3), 589–610. URL http://www.jstor.org/stable/1556711 Foley, D., 1967. Resource allocation and the public sector. Yale Economic Essays 7, 45–98. Goeree, J. K., Holt, C. A., Palfrey, T. R., 2005. Regular quantal response equilibrium. Experimental Economics 8 (4), 347–367. URL http://dx.doi.org/10.1007/s10683-005-5374-7 Harsanyi, J. C., Dec 1973. Games with randomly disturbed payoffs: A new rationale for mixed-strategy equilibrium points. Int J Game Theory 2 (1), 1–23. URL https://doi.org/10.1007/BF01737554 Healy, P. J., 2006. Learning dynamics for mechanism design: An experimental comparison of public goods mechanisms. J Econ Theory 129 (1), 114 – 149. URL https://doi.org/10.1016/j.jet.2005.03.002 Jackson, M. O., 1991. Bayesian implementation. Econometrica 59 (2), 461–477. URL http://www.jstor.org/stable/2938265 35 https://doi.org/10.1007/s13209-011-0062-7 http://dx.doi.org/10.1016/j.geb.2005.12.007 http://www.jstor.org/stable/1913602 https://doi.org/10.1257/aer.104.10.2975 https://doi.org/10.1093/restud/rdy031 http://www.jstor.org/stable/1556711 http://dx.doi.org/10.1007/s10683-005-5374-7 https://doi.org/10.1007/BF01737554 https://doi.org/10.1016/j.jet.2005.03.002 http://www.jstor.org/stable/2938265 Jackson, M. O., 1992. Implementation in undominated strategies: A look at bounded mech- anisms. The Review of Economic Studies 59 (4), 757–775. URL http://www.jstor.org/stable/2297996 Jackson, M. O., 2001. A crash course in implementation theory. Soc Choice Welfare 18, 655–708. Kneeland, T., 2017. Mechanism design with level-k types: theory and applications to bilat- eral trade, wBZ Discussion paper SPII 2017-303. Maskin, E., 1999. Nash equilibrium and welfare optimality. Review Econ Studies 66, 83– 114, first circulated in 1977. URL http://www.jstor.org/stable/2566947 McAfee, P. R., 1992. Amicable divorce: Dissolving a partnership with simple mechanisms. Journal of Economic Theory 56 (2), 266–293. URL "http://dx.doi.org/10.1016/0022-0531(92)90083-T" McKelvey, R. D., Palfrey, T. R., 1995. Quantal response equilibria for normal form games. Games and Economic Behavior 10 (1), 6–38. URL http://dx.doi.org/10.1006/game.1995.1023 McKelvey, R. D., Palfrey, T. R., 1996. A statistcial theory of equilibrium in games. Japanese Econ Review 47 (2), 186–209. Mezzetti, C., Renou, L., 2012. Implementation in mixed nash equilibrium. J Econ Theory 147 (6), 2357 – 2375. URL https://doi.org/10.1016/j.jet.2012.09.004 Palfrey, T. R., Srivastava, S., 1991. Nash implementation using undominated strategies. Econometrica 59 (2), 479–501. URL http://www.jstor.org/stable/2938266 Svensson, L.-G., 1983. Large indivisibles: an analysis with respect to price equilibrium and fairness. Econometrica 51, 939–954. URL http://www.jstor.org/stable/1912044 Tadenuma, K., Thomson, W., 1995. Refinements of the no-envy solution in economies with indivisible goods. Theory and Decision 39, 189–206. URL http://dx.doi.org/10.1007/BF01078984 36 http://www.jstor.org/stable/2297996 http://www.jstor.org/stable/2566947 "http://dx.doi.org/10.1016/0022-0531(92)90083-T" http://dx.doi.org/10.1006/game.1995.1023 https://doi.org/10.1016/j.jet.2012.09.004 http://www.jstor.org/stable/2938266 http://www.jstor.org/stable/1912044 http://dx.doi.org/10.1007/BF01078984 Thomson, W., 2010. Fair allocation rules. In: Arrow, K., Sen, A., Suzumura, K. (Eds.), Handbook of Social Choice and Welfare. Vol. 2. North-Holland, Amsterdam, New York, Ch. 21. Tumennasan, N., 2013. To err is human: Implementation in quantal response equilibria. Games and Economic Behavior 77 (1), 138 – 152. URL http://www.sciencedirect.com/science/article/pii/S0899825612001522 van Damme, E., 1991. Stability and Perfection of Nash Equilibria. Springer Berlin Heidel- berg, Berlin, Heidelberg. URL https://link.springer.com/book/10.1007/978-3-642-58242-4 Velez, R. A., October 2018. Equitable rent division. Trans Econ Computation 6 (2), Article 9. URL http://dx.doi.org/10.1145/3274528 Velez, R. A., Brown, A. L., 2020a. Empirical equilibrium, arXiv:1804.07986 [econ.EM]. URL https://arxiv.org/abs/1804.07986 Velez, R. A., Brown, A. L., 2020b. Empirical strategy-proofness, mimeo, Texas A&M Uni- versity. URL https://arxiv.org/abs/1907.12408 37 http://www.sciencedirect.com/science/article/pii/S0899825612001522 https://link.springer.com/book/10.1007/978-3-642-58242-4 http://dx.doi.org/10.1145/3274528 https://arxiv.org/abs/1804.07986 https://arxiv.org/abs/1907.12408 1 Introduction 2 Related literature 3 Model 4 Results 4.1 Extreme-price auctions and Nash equilibrium 4.2 Empirical equilibrium 4.2.1 Empirical equilibrium payoffs 4.2.2 The intuition 4.3 Empirical equilibrium analysis and full implementation theory 5 Discussion 6 Conclussion 7 Appendix
0non-cybersec
arXiv
I tuck my knees to my chest and lean forward until gravity takes me.. That's just how I roll.
0non-cybersec
Reddit
redirecting output of /dev/fb0 to /dev/fb2. <p>I am using IMX6 Saberauto board on Linux OS. I have 2 displays primary is <code>HDMI</code> and secondary is <code>LVDS</code>. I want to run 2 applications.</p> <p>One QT on primary display, which I am able to do. Second application is airplay application I want this application to run on seondary display ie <code>/dev/fb2</code>. But I am not able to do that.</p> <p>It is coming on primary display only. Please let me know the command to direct airplay output to <code>/dev/fb2</code>.</p>
0non-cybersec
Stackexchange
Java: Float Formatting depends on Locale. <p>I live in Belgium. And generally, in mathematics, we write our decimals with a comma like this: 3,141592<br> And that is also the result when I <strong>format</strong> the float.</p> <pre><code>System.out.println(String.format("%f", 3.141592)); </code></pre> <p>So, the <code>.</code> is replaced by a <code>,</code> like so: <code>3,141592</code>. So always when I need a point instead I have to add something like this: <code>String.format("%f", 3.14).replace(',','.');</code></p> <p>So, the question is: is there a way to change the Locale which makes every formatter in Java use a point, instead of comma?</p> <p>Thanks</p> <hr> <pre><code>System.out.println(Locale.getDefault()); </code></pre> <p>prints</p> <pre><code>nl_BE </code></pre>
0non-cybersec
Stackexchange
Pro-Democracy Websites in Hong Kong Targeted with and Serving Malware (Java Exploits & PlugX).
1cybersec
Reddit
Outlook 2016 for mac - migrate calendar to new exchange account. <p>I'm migrating a user from an old exhange host to a new one. What I did was export everything from his old exchange account (mail, contacts, calendar, etc) to a .olm-file. Then I created a new profile, set up the new account, and imported everything back into Outlook.</p> <p>Buut.. the import didn't put everything back into the new account. Rather, the import made a new local folder with all the contents from the .olm-file.</p> <p>For mail and contacs I could drag&amp;drop or copy&amp;paste everything into the new exchange account, but for the calendar I don't know what to do? Has anyone encountered this problem before?</p>
0non-cybersec
Stackexchange
Access field of outer base class. <p>In Java, inner classes can normally access outer classes' private members. While writing an Android app, I had a static inner class which extended it's outer class. Turns out, private fields of the outer class could not be accessed:</p> <pre><code>class Outer { private int m_field = 1; static class Inner extends Outer { Inner() { m_field = 2; } } } </code></pre> <p>It gives a confusing error message:</p> <blockquote> <p>error: non-static variable m_field cannot be referenced from a static context</p> </blockquote> <p>Even though nothing is static except the class itself.</p> <p>When the field m_field is made protected, it compiles without a problem. But also, when doing this:</p> <pre><code>class Outer { private int m_field = 1; static class Inner extends Outer { Inner() { ((Outer)this).m_field = 2; } } } </code></pre> <p>It works without problems. Is this a bug in the compiler? Why would you need to cast to the outer class, which you are already an instance of?</p> <hr> <p>EDIT:</p> <p>For a real use-case of this, consider a class like this:</p> <pre><code>public abstract class MyItem { private int m_counter = 0; public abstract int updateSomething(); public static class CountItem extends MyItem { public int updateSomething() { m_counter++; } } public static class DoubleCountItem extends MyItem { public int updateSomething() { m_counter += 2; } } } </code></pre> <p>Pretty abstract example, but it can be used to provide basic implementations for abstract classes which don't need a lot of code on their own.</p> <p>EDIT2:</p> <p>As @Nathan suggests, it seems like this problem can be recreated by 2 classes without nesting:</p> <pre><code>class Base { private int x = 0; void a(Extended b) { ((Base)b).x = 1; //&lt;-- with cast: compiles, without: error } } class Extended extends Base { } </code></pre> <p>Which gives better error message:</p> <blockquote> <p>error: x has private access in Base</p> </blockquote>
0non-cybersec
Stackexchange
Compiler chooses erroneous overload instead of valid overload. <p>Take a look at this code:</p> <pre><code>#include &lt;vector&gt; #include &lt;functional&gt; template&lt;typename RandIt, typename T, typename Pred&gt; auto search_with(RandIt begin, RandIt end, const T&amp; value, Pred&amp;&amp; pred) noexcept { //... return begin; } template&lt;typename RandIt, typename T&gt; auto search_with(RandIt begin, RandIt end, const T&amp; value) noexcept { return search_with(begin, end, value, std::less&lt;T&gt;{}); } template&lt;typename Array, typename T, typename Pred&gt; auto search_with(const Array&amp; array, const T&amp; value, Pred&amp;&amp; pred) noexcept { return search_with(std::begin(array), std::end(array), value, std::forward&lt;Pred&gt;(pred)); } int main() { std::vector&lt;int&gt; v = { 1, 2, 3 }; search_with(v, 10, std::less&lt;int&gt;{}); // ok search_with(v.begin(), v.end(), 10); // fail! } </code></pre> <p>I do not understand why in the second <code>search_with</code> call, the compiler selects the third overload. If I comment out the third overload, then the code compiles fine. This indicates that the second overload is not discarded as it does compile, and it should be a valid overload.</p> <p>However, the third overload is chosen, which fails, as there is no specialization of <code>std::begin</code> (and <code>std::end</code>) for iterators:</p> <pre><code>main.cpp: In instantiation of 'auto search_with(const Array&amp;, const T&amp;, Pred&amp;&amp;) [with Array = __gnu_cxx::__normal_iterator&lt;int*, std::vector&lt;int&gt; &gt;; T = __gnu_cxx::__normal_iterator&lt;int*, std::vector&lt;int&gt; &gt;; Pred = int]': main.cpp:23:39: required from here main.cpp:17:34: error: no matching function for call to 'begin(const __gnu_cxx::__normal_iterator&lt;int*, std::vector&lt;int&gt; &gt;&amp;)' return search_with(std::begin(array), std::end(array), value, std::forward&lt;Pred&gt;(pred)); ~~~~~~~~~~^~~~~~~ </code></pre> <p>I would have thought that the opposite happens: the third overload is discarded because it fails to compile, and the second one is chosen.</p> <p>But that is obviously not the case, so what is happening here? Why is the wrong overload being chosen? Why is the third overload a better match then the second one?</p>
0non-cybersec
Stackexchange
Nothing gets me Randy like a bunch of fully promoted Apocalypse Tanks. (Yuris Revenge).
0non-cybersec
Reddit
iphone not charging after 7.0.6. My friend just updated his iPhone to 7.0.6 and now his iphone isn't charging. He's used apples charging cables and other off brand chargers and neither are working. Any help would be greatly appreciated. Thanks.
0non-cybersec
Reddit
Which encoding supports this symbol ƒ?. <p>I have this encoding in my file:</p> <pre><code>\usepackage[utf8]{inputenc} %unicode support </code></pre> <p>but I still get the error </p> <pre><code>Package inputenc Error: Unicode char \u8... not set up for use with ... </code></pre> <p><strong>How can you make LaTeX understand the symbol ƒ?</strong></p>
0non-cybersec
Stackexchange
Complete immutability and Object Oriented Programming. <p>In most OOP languages, objects are generally mutable with a limited set of exceptions (like e.g. tuples and strings in python). In most functional languages, data is immutable.</p> <p>Both mutable and immutable objects bring a whole list of advantages and disadvantages of their own.</p> <p>There are languages that try to marry both concepts like e.g. scala where you have (explicitly declared) mutable and immutable data (please correct me if I am wrong, my knowledge of scala is more than limited).</p> <p>My question is: <strong>Does <em>complete</em> (sic!) immutability -i.e. no object can mutate once it has been created- make any sense in an OOP context?</strong></p> <p><strong>Are there designs or implementations of such a model?</strong></p> <p><strong>Basically, are (complete) immutability and OOP opposites or orthogonal?</strong></p> <p>Motivation: In OOP you normally operate <strong>on</strong> data, changing (mutating) the underlying information, keeping references between those objects. E.g. an object of class <code>Person</code> with a member <code>father</code> referencing another <code>Person</code> object. If you change the name of the father, this is immediately visible to the child object with no need for update. Being immutable you would need to construct new objects for both father and child. But you would have a lot less kerfuffle with shared objects, multi-threading, GIL, etc.</p>
0non-cybersec
Stackexchange
Cannot boot, ending in (initramfs), and kernel panic. <p>After getting some errors upgrading the Linux kernel packages with <code>apt</code> (including insufficient disk space on the boot partition, where the images are stored), I couldn't boot any more.</p> <p>First, on my setup: I have one hard disk, <code>/dev/sda</code> with one boot partition <code>/dev/sda1</code> (this is where the kernel images are stored, and was mounted to /boot). The "root" partition is <code>/dev/mapper/ubuntu--vg--usbkey-root</code>.</p> <p>More precisely:</p> <pre><code>$ sudo fdisk -l /dev/sda Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors Units: sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disklabel type: dos Disk identifier: 0x00000000 Device Boot Start End Sectors Size Id Type /dev/sda1 * 2048 499711 497664 243M 83 Linux /dev/sda2 501758 976771071 976269314 465.5G 5 Extended /dev/sda5 501760 976771071 976269312 465.5G 8e Linux LVM </code></pre> <hr> <pre><code>$ ls /dev/mapper control ubuntu--vg--usbkey-root ubuntu--vg--usbkey-swap_1 </code></pre> <hr> <pre><code>$ sudo lvs LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert root ubuntu-vg-usbkey -wi-a----- 457.51g swap_1 ubuntu-vg-usbkey -wi-a----- &lt;7.96g </code></pre> <hr> <pre><code>$ lsblk NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT loop0 7:0 0 1.7G 1 loop /rofs loop1 7:1 0 86.6M 1 loop /snap/core/4486 loop2 7:2 0 140M 1 loop /snap/gnome-3-26-1604/59 loop3 7:3 0 1.6M 1 loop /snap/gnome-calculator/154 loop4 7:4 0 12.2M 1 loop /snap/gnome-characters/69 loop5 7:5 0 21M 1 loop /snap/gnome-logs/25 loop6 7:6 0 3.3M 1 loop /snap/gnome-system-monitor/36 sda 8:0 0 465.8G 0 disk ├─sda1 8:1 0 243M 0 part ├─sda2 8:2 0 1K 0 part └─sda5 8:5 0 465.5G 0 part ├─ubuntu--vg--usbkey-root │ 253:0 0 457.5G 0 lvm /mnt └─ubuntu--vg--usbkey-swap_1 253:1 0 8G 0 lvm sdb 8:16 1 1.9G 0 disk /cdrom ├─sdb1 8:17 1 1.8G 0 part └─sdb2 8:18 1 2.3M 0 part sr0 11:0 1 1024M 0 rom </code></pre> <p>My last attempt was to follow the instructions from <a href="https://zeldor.biz/2010/12/install-grub-from-chroot/" rel="nofollow noreferrer">this article</a>.</p> <p>So I did the following:</p> <pre><code>$ sudo mount /dev/sda1 /mnt/boot/ $ sudo mount /dev/mapper/ubuntu--vg--usbkey-root /mnt/ $ sudo mount -t proc none /mnt/proc $ sudo mount -o bind /dev /mnt/dev $ sudo mount -t sysfs sys /mnt/sys $ sudo chroot /mnt # update-grub Generating grub configuration file ... Warning: Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported. Found linux image: /boot/vmlinuz-4.4.0-127-generic Found initrd image: /boot/initrd.img-4.4.0-127-generic Found linux image: /boot/vmlinuz-4.4.0-124-generic Found initrd image: /boot/initrd.img-4.4.0-124-generic Found linux image: /boot/vmlinuz-4.4.0-116-generic Found initrd image: /boot/initrd.img-4.4.0-116-generic Found memtest86+ image: /memtest86+.elf Found memtest86+ image: /memtest86+.bin /run/lvm/lvmetad.socket: connect failed: No such file or directory WARNING: Failed to connect to lvmetad. Falling back to internal scanning. done </code></pre> <p>Is this warning an issue? Anyway, I then did the following:</p> <pre><code># /usr/sbin/grub-install --recheck --no-floppy /dev/sda Installing for i386-pc platform. Installation finished. No error reported. </code></pre> <p>Then I rebooted, and I was lead to a <code>(initramfs)</code> prompt. The screen contained the following error message:</p> <pre><code>fsck: error 2 (No such file or directory) while executing fsck.ext2 for /dev/sda1 </code></pre> <p>However, I checked <code>/dev/sda1</code> with <code>fsck</code> from the bootable USB key and it reports no errors... Same for <code>/dev/sda5/</code>.</p> <p>Also, the command </p> <p>(initramfs) ls /root</p> <p>reports the contents of <code>/dev/sda1</code>. However, besides the expected content, there is also a directory <code>/root/boot/grub</code>:</p> <pre><code>(initramfs) ls /root/boot/grub fonts locale grubenv i386-pc </code></pre> <p>Running </p> <pre><code>(initramfs) exit </code></pre> <p>brings me to a screen which ends with</p> <pre><code>end Kernel panic - not syncing: Attempted to kill init! </code></pre> <p>All this is quite confusing to me. Any suggestions are appreciated.</p>
0non-cybersec
Stackexchange
Playful girlfriend.
0non-cybersec
Reddit
Why the braves do the tomahock chop!.
0non-cybersec
Reddit
4 parties and a funeral: A day on the trail with Sanders and Biden.
0non-cybersec
Reddit
Postgresql truncate table with foreign key constraint. <p>Currently I am trying to truncate tables which have foreign key constraint on Postgresql 11.3.</p> <p>I tried doing this </p> <pre><code>BEGIN; SET CONSTRAINTS ALL DEFERRED; TRUNCATE tableA; COMMIT; </code></pre> <p>but received error</p> <pre><code>ERROR: cannot truncate a table referenced in a foreign key constraint DETAIL: Table "xxx" references "tableA". HINT: Truncate table "xxx" at the same time, or use TRUNCATE ... CASCADE. </code></pre> <p>Doesn't <code>SET CONSTRAINTS ALL DEFERRED</code> would turn off the foreign key constraint check? Are there anyway to truncate a table without triggering foreign key constraint check and not involving CASCADE?</p>
0non-cybersec
Stackexchange
Creator of the Jolicraft texture pack completely redoes it as Jolicraft 2.
0non-cybersec
Reddit
Can I use __qualname__ in a Python type hint with postponed annotation evaluation?. <p>I like using <code>__qualname__</code> for the return-type annotation of factory-style class methods, because it doesn't hardcode the classname and therefore keeps working subclasses (cf. <a href="https://stackoverflow.com/a/58789374/857390">this answer</a>).</p> <pre class="lang-py prettyprint-override"><code>class Foo: @classmethod def make(cls) -&gt; __qualname__: return cls() </code></pre> <p>Currently this seems to work fine, but I am not sure whether this will still be possible with the postponed evaluation of annotations (<a href="https://www.python.org/dev/peps/pep-0563/" rel="nofollow noreferrer">PEP 563</a>): the PEP <a href="https://www.python.org/dev/peps/pep-0563/#id5" rel="nofollow noreferrer">says</a> that</p> <blockquote> <p>Annotations can only use names present in the module scope as postponed evaluation using local names is not reliable (with the sole exception of class-level names resolved by <code>typing.get_type_hints()</code>).</p> </blockquote> <p>The PEP also <a href="https://www.python.org/dev/peps/pep-0563/#id7" rel="nofollow noreferrer">says</a>:</p> <blockquote> <p>The <code>get_type_hints()</code> function automatically resolves the correct value of <code>globalns</code> for functions and classes. It also automatically provides the correct <code>localns</code> for classes.</p> </blockquote> <p>However, the following code</p> <pre class="lang-py prettyprint-override"><code>from __future__ import annotations import typing class Foo(): @classmethod def make(cls) -&gt; __qualname__: return cls() print(typing.get_type_hints(Foo.make)) </code></pre> <p>fails with</p> <pre><code> File "qualname_test.py", line 11, in &lt;module&gt; print(typing.get_type_hints(Foo.make)) File "/var/local/conda/envs/py37/lib/python3.7/typing.py", line 1004, in get_type_hints value = _eval_type(value, globalns, localns) File "/var/local/conda/envs/py37/lib/python3.7/typing.py", line 263, in _eval_type return t._evaluate(globalns, localns) File "/var/local/conda/envs/py37/lib/python3.7/typing.py", line 467, in _evaluate eval(self.__forward_code__, globalns, localns), File "&lt;string&gt;", line 1, in &lt;module&gt; NameError: name '__qualname__' is not defined </code></pre> <p>Commenting the <code>__future__</code> import makes the code work again, in that case it outputs</p> <pre><code>{'return': &lt;class '__main__.Foo'&gt;} </code></pre> <p>as expected.</p> <p><strong>Is my use case <code>__qualname__</code> supported (which would mean that <code>get_type_hints</code> is buggy), or is this approach not possible with PEP 563?</strong></p>
0non-cybersec
Stackexchange
President Obama Endorses Gay Marriage on ABC Nightly News.
0non-cybersec
Reddit
Elevator malfunction.
0non-cybersec
Reddit
The measurements on this jug.
0non-cybersec
Reddit
Any good mp3 volume normalizer?. <p>I tried to use <a href="https://superuser.com/questions/14635/windows-command-line-program-to-change-the-volume-of-an-mp3-file">MP3Gain</a> to keep mp3 files with the same volume. </p> <p>The problem is: when I re synchronize all files into my IPod, some musics get too loud.</p> <p>So, it seems MP3Gain is not fixing volume at all or there is a problem with synchronization software.</p> <p>Perhaps I should "re add" files into ITunes 10.1 library again.</p> <p>Meanwhile, is there a another good mp3 volume normalizer for testing playback in IPod?</p>
0non-cybersec
Stackexchange
Graph of the AFCS playoff chances throughout the season.
0non-cybersec
Reddit
I am C. Robert Cargill, long time film critic turned co-writer of SINISTER. AMA.. I'll be back around 5pm Central (sooner if my schedule permits) to answer your questions. Let 'er rip, Dreadit! **Edit 6:10pm** Alright gang! I'm off to try and get another job! But I'll drop back in a few hours to do another round of answers if you still have questions! Thanks for all the great discussion so far! **Edit 9:00pm** Thanks Dreadit! Been a great day with some amazing questions. A real pleasure on my end to hang with you. NIGHT!
0non-cybersec
Reddit
Limit of indicator function. <p>I am considering the measure space <span class="math-container">$(\mathbb{R}, \mathcal{B}(\mathbb{R},\lambda)$</span>. For every integer <span class="math-container">$\geq 1$</span> the function <span class="math-container">$f_{n}$</span> is defined as:</p> <p><span class="math-container">$f_{n}=n\cdot \mathbb{1}_{[n,n+n^{-2}]}$</span></p> <p>I am asked to show that <span class="math-container">$f_{n} \to \infty $</span> for <span class="math-container">$n \to \infty$</span> pointwise.</p> <p><strong>My attempt</strong></p> <p>By the definition of pointwise convergence we would like to analyse the limit of <span class="math-container">$f_{n}$</span> when <span class="math-container">$x$</span> is fixed and <span class="math-container">$n \to \infty$</span>.</p> <p>Now fix <span class="math-container">$x_{0} \in \mathbb{R}$</span>. If <span class="math-container">$x_{0} \in [n,n+n^{-2}]$</span> for an <span class="math-container">$n_{0}&gt;2$</span> then <span class="math-container">$f_{n_{0}}=1$</span> but then <span class="math-container">$x_{0} \notin [n,n+n^{-2}]$</span> for all <span class="math-container">$N&gt;n_{0}$</span> since all intervals <span class="math-container">$[n,n+n^{-2}]$</span> for <span class="math-container">$n&gt;2$</span> are disjoint. This means that all <span class="math-container">$f_{N&gt;n_{0}}=0$</span> which shows that <span class="math-container">$f_{n} \to 0$</span> when <span class="math-container">$n \to \infty$</span>.</p> <p>I have tried to simplify the above by only considering <span class="math-container">$n&gt;2$</span>. I know that <span class="math-container">$f_{1}=1$</span> and <span class="math-container">$f_{2}=2$</span> at the same time only when <span class="math-container">$n=2$</span>.</p> <p>Feedback is much appreciated.</p>
0non-cybersec
Stackexchange
Creating a &#39;sequence&#39; of subsets using the subset axiom, then using induction to prove they are all equal. <p>Setup:</p> <p><span class="math-container">$(N,\sigma)$</span> satisfies Peano axioms, i.e. <span class="math-container">$N \equiv ω$</span>.</p> <p>Using the subset axiom we define, for each <span class="math-container">$k \in N$</span>, <span class="math-container">$F_k = \{x \in N \; | \; \phi_k(x) \}$</span>. </p> <p>Next we define <span class="math-container">$D = \{d \in N \; | \; F_d = N\}$</span> and show that <span class="math-container">$1 \in D$</span> and when <span class="math-container">$d \in D$</span>, so is <span class="math-container">$d + 1$</span> (using the fact that <span class="math-container">$F_d = N$</span>). So <span class="math-container">$D = N$</span> and for all <span class="math-container">$k \in N$</span>, <span class="math-container">$F_k = N$</span>.</p> <p>What axioms of ZF set theory come into play here?</p> <p>The answer can be found by reading the comments, so I will list them here:</p> <p><a href="https://en.wikipedia.org/wiki/Axiom_of_infinity" rel="nofollow noreferrer">Axiom_of_infinity</a></p> <p><a href="https://en.wikipedia.org/wiki/Axiom_of_extensionality" rel="nofollow noreferrer">Axiom of extensionality</a></p> <p><a href="https://en.wikipedia.org/wiki/Axiom_schema_of_specification" rel="nofollow noreferrer">Axiom schema of specification</a></p> <hr> <p>I noticed that there is a vote to close this question - that it is unclear what I am asking. Well, without details, I guess it isn't the best question. But, the question did 'collect' three very important axioms from ZF set theory.</p> <hr> <p>I thought that since induction isn't an axiom, it is nothing to make a 'fuss' about. But, it seems that I need to take a refresher course in induction. For example, have you used <em>simultaneous</em> induction lately?</p> <p>For a review with exercises, see</p> <p><a href="https://www.maths.ox.ac.uk/system/files/attachments/induction_0.pdf" rel="nofollow noreferrer">Induction</a> by Richard Earl Mathematical Institute, Oxford August 2003</p> <p>I am adding the induction tag to this posting.</p>
0non-cybersec
Stackexchange
Office bunny.
0non-cybersec
Reddit
My [22F] boyfriend [25M] of 1.5 years didn't put any effort into my birthday but still asked for a "thank you blowjob".. To start, my boyfriend and I have been together almost 1.5 years and have an apartment together. Yesterday was my birthday and my boyfriend started the day by posting to my facebook that it was going to be a fun day full of presents and surprises. It was excited because in the past he's hasn't been very good with special occasions. Valentine's day 2013 he bought me a rose from a gas station when he went there to buy cigarettes, and that was it for the day. It was a nice gesture, but it left me feeling like he was too lazy to put any thought into the day. When we talked about it, he admitted that laziness was the case. I felt hurt but got over it, and explained to him that I feel like it's not about what he gets for me or does for me, what matters is the time and thought he put into things. Two weeks later it was my birthday. I was honest with him on Valentine’s Day and didn't play head games with him, so it was clear that it would be nice if he put some thought into doing something (anything) for me. A card made from printer paper and crayons would have meant something, but instead he just said happy birthday to me and went about his day. I was upset and felt hurt again, so I calmly expressed my disappointment, and told him that I'll try better to express what I'd like from him in the future. So yesterday after he spent the morning building me up, I was feeling really optimistic about the day. When noon time came around though, I found myself still waiting for the surprises. I inquired about our plans for the day and he said he had nothing planned. We can do whatever I want though. Well, of course I can do whatever I want. I'm an adult with a job; I didn't need to wait for my birthday to know that. I didn't say that, but I thought it. I just suggested a restaurant instead. The place we went to had a menu mainly of things to share. The boyfriend is a picky eater and anything I liked didn't sound good to him. I got over it and let him order what he wanted for us. After we ate I asked again what the plan was, and there was none, so I asked him if he wanted to come to a liquidation store with me. I need new shoes so I went was the shoe section to find a pair. I'll buy myself a damn birthday gift. We also need curtains for our house though, and he was learning towards getting the curtains he noticed. I put the shoes back because I agreed with him that we need curtains first. Sure it's my birthday but I don't want to be selfish so I'll get something that benefits us both. We went home after that. A while later I inquire about birthday cake. He was supposed to get one but it wasn't on his list of priorities so he agreed to come to the grocery store with me to get a cake. I didn't get a magical birthday full of surprises like I thought, but picking out a cake could cheer me up. The boyfriend ended up picking it out though. He didn't like what I chose and wouldn't eat it if I got it. So he picked out the cake he wanted...and made sure he got the discount one. I'm still fine though. It's good. It's just a day. It's just a cake. We go home and eat some cake and get ready for bed. I have a headache and don't feel so well anymore. The boyfriend asks me if my day was good besides the headache. It could have been worse. I'm not ungrateful for what I have, so I tell him I had a good day. He responds with: **“Good. I was going to ask you for a 'Thank you blowjob' for everything, but since you have a headache I won't.”** I responded with “You should not have said that. You don't have to tell me everything you think" and left it at that and rolled over to go to sleep. I feel really insulted and let down. I'm getting really tired of explaining the idea of making the other person feel special. I don't expect to be made to feel special, but I hope for it. His comment last night was so insensitive and selfish, and here I am constantly reminding myself that I shouldn't expect to be treated like a princess just because my friends are and I certainly have no right to demand to be treated more special. I don't know how to frame the topic anymore. I'm not going to end the relationship over it, but I'm starting to feel like maybe I should stop doing special things for him because he seems to expect and feel like he's earned those things without reciprocating. It's hurting my feelings. I could explain my feelings until I'm blue in the face and tell him exactly what I want from him and he still wouldn't do it. I need an outside perspective and some advice. --- **tl;dr**: Boyfriend doesn't put effort into special occasions. I've explained my feelings multiple times but he's too lazy to change anything. Expects an elaborate thank you for his sub par efforts. Edit: Oops. I'm actually 23. Like I said, yesterday was my birthday. --- Update: I had no idea my post would reach so many people, but you guys have offered me some great advice and a few different perspective which was what I needed. Thank you. I talked to the boyfriend a little last night, but I want to finish getting through this thread and reply as much as I can before I finalize what I want to say to him. --- Update #2: This is just an update to let you guys know that I haven't abandoned the thread...my laptop charger decided to stop working so computer access is currently limited. I don't have time to do a full update now, but I will get back to you guys within the week.
0non-cybersec
Reddit
How do I subtract times?. <p>I have an embarrassingly basic modular arithmetic question. I understand that I can subtract, for example, 1 hour from 10 o'clock to get 9 o'clock, or even 2 hours from 1 o'clock to get 11 o'clock; but how do I subtract 2 <em>o'clock</em> from 11 o'clock to get 3 <em>hours</em>. </p> <p>That is, I want a function that takes two times on the face of a clock, and gives me the interval between them.</p> <hr> <p>For example: I have two angular values measured in "hours". One value is the <a href="http://www.physics.csbsju.edu/astro/CS/CS.10.html" rel="nofollow">right ascension</a> of the apparent sun, $\alpha(t)$, while the other is the right ascension of the "<a href="http://www.thefreedictionary.com/mean+sun" rel="nofollow">mean sun</a>", $\langle\alpha\rangle(t)$; both are mod 24. I'm interested in <a href="http://en.wikipedia.org/wiki/Equation_of_time" rel="nofollow">the angular difference between these two values</a> $$E(t) = \langle\alpha\rangle(t) - \alpha(t)$$ Is this just inherently ambiguous, so that I need to impose some additional constraint based on information about the system (e.g., here that the values can be positive or negative, and are always small, so that, say $\pm 22$ should be interpreted as $\mp 2$), or is there some simple systematic way to ensure that I get the correct values?</p>
0non-cybersec
Stackexchange
A bit of an embarrassing question. I'm a Korean student currently living in America for college so I didn't really know who to ask since my mom would think I was literally the devil if I brought this up. I've recently tried masturbating out of curiosity mainly, and every time I get close to what I think might be an orgasm I end up peeing a little. It's extremely embarrassing and completely kills the moment, so I've sorta just given up afterwards each time. Is this normal? If not, is there anything I can do about it? Thanks. Sorry if this isn't the right place to post this, but I didn't really know where to ask. If this isn't the right place can someone please tell me a better subreddit to ask this question? Thanks.
0non-cybersec
Reddit
[Image] Just do your best.
0non-cybersec
Reddit
Audio to multiple HDMI sinks. <p>I have 2 HDMI monitors connected to my laptop, and both of them display just fine. However, I want to play audio on both of them at the same time as well. I saw this post: <a href="https://unix.stackexchange.com/questions/401492/how-to-output-unique-audio-to-multiple-ports-profiles-of-a-pulseaudio-card/401562#401562?newreg=a2c8d4c42a4944e1935687f0f0251994">How to output unique audio to multiple ports/profiles of a PulseAudio card?</a></p> <p>I have attempted the solution described in the answer, of editing the pulseaudio confs to create a new profile. However, when I tried setting it, it said no such profile:</p> <pre><code>No such profile: output:analog-stereo+output:hdmi-stereo+output:hdmi-stereo+output:hdmi-stereo </code></pre> <p>I was wondering if anyone else had a similar experience.</p>
0non-cybersec
Stackexchange
Sometimes Android allows for a bit too much customization....
0non-cybersec
Reddit
Relative performance of 2006 Mac Pro and 2007 iMac. <p>I'm trying to evaluate a purchase but am having trouble finding apples-to-apples performance comparisons for these two machines. A year and and many details separate them. Are there any common benchmarks that consider disk and graphics performance? Which is preferable for software development (dual-head, but otherwise light on the GPU)?</p> <p><strong>Mac Pro (2006)</strong> <a href="http://www.everymac.com/systems/apple/mac_pro/stats/mac-pro-quad-2.66-specs.html" rel="nofollow">[Detailed specs]</a></p> <ul> <li>Two dual-core Xeon processors at 2.66GHz (1.33GHz bus)</li> <li>3GB RAM</li> <li>NVIDIA GeForce 7300 GT with 256 MB RAM</li> </ul> <p><strong>iMac (2007)</strong> [<a href="http://www.everymac.com/systems/apple/imac/stats/imac-core-2-duo-2.4-24-inch-aluminum-specs.html" rel="nofollow">Detailed specs</a>]</p> <ul> <li>Core 2 Duo (obviously dual-core) at 2.4GHz (800MHz bus)</li> <li>3GB RAM</li> <li>ATI Radeon 2600 with 256 MB RAM</li> </ul> <p>Both machines have their original hard drives (SATA).</p> <p>Thanks in advance for your input.</p>
0non-cybersec
Stackexchange
Moon Moon doesn't care much for water..
0non-cybersec
Reddit