Chia-Ming Yu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Sniffer tools capture protocol data. Kernel-profiling tools track function calls and events occurring in the kernel. These two types of tools help us observe external and internal behaviors of networking protocols, respectively. We need both types of data for a comprehensive view of protocol behavior. However, few tools perform these two tasks in an(More)
An (A) expected (strong) bubble is said to exist if it is mutual knowledge that the price of the asset is higher than the expected (possible) dividend. By requiring common knowledge instead of mutual knowledge, the new concept of common expected bubble (common strong bubble) is developed. In a simple …nite horizon model with asymmetric information and short(More)
This paper characterizes the properties of equilibrium location patterns in an Anderson-Neven-Pal model and uses these characteristics to comprehensively find the subgame perfect Nash equilibria, most of which are not yet found in the literature. Since the external competition effect may be exactly canceled out, or internal competition strictly dominates(More)
  • 1