General Game Playing B-to-B Price Negotiations⋆
This paper discusses the scientific and practical perspectives of using general game playing in business-to-business price negotiations as a part of Procurement 4.0 revolution. The status quo of digital price negotiations software, which emerged from intuitive solutions to business goals and refereed to as electronic auctions in industry, is summarized in a scientific context. Description of such aspects as auctioneers’ interventions, asymmetry among players and time- depended features reveals the nature of nowadays electronic auctions to be rather termed as price games. This paper strongly suggests general game playing as the crucial technology for automation of human rule setting in those games. Game theory, genetic programming, experimental economics, and AI human player simulation are also discussed as satellite topics. SIDL-type game descriptions languages and their formal game-theoretic foundations are presented.
With an increasing number of companies applying smart manufacturing (Industry 4.0) technologies, and therefore gathering records from multiple enterprise data sources, a potential for big data analytics (BDA) is seemingly limitless. Still not every firm that implemented smart manufacturing reports gathering or making use of big data emerging from those processes, let alone extracting value from them. This study investigates business value creation mechanisms from BDA in smart manufacturing. Relying on several use cases and project stories described in publicly available sources, we analyze key drivers, applications, barriers, success factors, and business benefits of BDA in smart manufacturing. We summarize our findings in a comprehensive framework capturing first- and second- order effects of BDA implementation on Industry 4.0 processes. Our work aims at contributing to the body of knowledge on BDA and smart manufacturing, and at guiding practitioners in identifying and assessing various application scenarios for those technologies.
I argue that Friedrich von Hayek anticipated some major results in the theory of mechanism design. © 2015, Springer Science+Business Media New York.
This book presents the latest research perspectives on how the Industry 4.0 paradigm is challenging the process of technological and structural change and how the diversification of the economy affects structural transformation. It also explores the impact of fast-growing technologies on the transformation of socioeconomic and environmental systems, and asks whether structural and technological change can generate sustainable economic growth and employment. Further, the book presents the basic innovations (new technologies, materials, energy, etc) and industrial policies that can lead to such a structural change.
I consider the problem of allocating N indivisible objects among N agents according to their preferences when transfers are absent and an outside option may exist. I study the tradeoff between fairness and efficiency in the class of strategy-proof mechanisms. The main finding is that for strategy-proof mechanisms the following efficiency and fairness criteria are mutually incompatible: (1) ex-post efficiency and envy-freeness, (2) ordinal efficiency and weak envy-freeness, and (3) ordinal efficiency and equal division lower bound. Result 1 is the first impossibility result for this setting that uses ex-post efficiency ; results 2 and 3 are more practical than similar results in the literature. In addition, for N=3, I give two characterizations of the celebrated random serial dictatorship mechanism: it is the unique strategy-proof, ex-post efficient mechanism that (4) provides agents that have the same ordinal preferences with assignments not dominated by each other (weak envy-freeness among equals), or (5) provides agents that have the same cardinal preferences with assignments of equal expected utility (symmetry). These results strengthen the characterization by Bogomolnaia and Moulin (2001); result 5 implies the impossibility result by Zhou (1990).
Analysis of problems of utilization of oil associated gas is given. Method for optimal distribution of expenses to laying of gas pi peline, taking into account a financing from oil companies and possible participation of government, is proposed. A multi-criteria model for selection of optimal alternative of utilization of oil associated gas is given. Software is made implementing the developed algorithms.
It is generally known that software system development lifecycle (SSDL) should be managed adequately. The global economy crisis and subsequent depression have taught us certain lessons on the subject, which is so vital for digital transformation, for Industry 4.0. The paper presents the adaptive methodology of enterprise SSDL, which allows to avoid "local crises" while producing large-scale software. The methodology is based on extracting common ERP module level patterns and applying them to series of heterogeneous implementations. The approach includes a lifecycle model, which extends conventional spiral model by formal data representation/management models and DSL-based "low-level" CASE tools supporting the formalisms. The methodology has been successfully implemented as a series of portal-based ERP systems in ITERA oil-and-gas corporation, and in a number of trading/banking enterprise smart applications for other enterprises. Semantic network-based air traffic planning system, and a 6D-model-driven nuclear power plant construction support system are currently in progress.
In November 2014, Team DESCARTES led by Newton Lee and sponsored by the Institute for Education, Research, and Scholarships (IFERS) was among one of the 104 teams registered with the Defense Advanced Research Projects Agency (DARPA) for the first-ever Cyber Grand Challenge (CGC). Only 28 teams, including Team DESCARTES, made it through two DARPA-sponsored dry runs and into the CGC Qualifying Event in June 2015. We proposed a system—Distributed Expert Systems for Cyber Analysis, Reasoning, Testing, Evaluation, and Security (DESCARTES)—that would be a fully autonomous cyber defense system that is capable of autonomous analysis, autonomous patching, autonomous vulnerability scanning, autonomous service resiliency, and autonomous network defense.