Chia-Ming Yu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Sniffer tools capture protocol data. Kernel-profiling tools track function calls and events occurring in the kernel. These two types of tools help us observe external and internal behaviors of networking protocols, respectively. We need both types of data for a comprehensive view of protocol behavior. However, few tools perform these two tasks in an(More)
This paper characterizes the properties of equilibrium location patterns in an Anderson-Neven-Pal model and uses these characteristics to comprehensively find the subgame perfect Nash equilibria, most of which are not yet found in the literature. Since the external competition effect may be exactly canceled out, or internal competition strictly dominates(More)
An (A) expected (strong) bubble is said to exist if it is mutual knowledge that the price of the asset is higher than the expected (possible) dividend. By requiring common knowledge instead of mutual knowledge, the new concept of common expected bubble (common strong bubble) is developed. In a simple …nite horizon model with asymmetric information and short(More)
BACKGROUND AND PURPOSE Patients with chronic obstructive pulmonary disease (COPD) are at higher risk of stroke than those without COPD. This study aims to explore the impact of inhaled pharmacotherapy on stroke risk in COPD patients during a three-year follow-up, using a nationwide, population-based study and a matched cohort design. METHODS The study(More)
  • 1