Single Resource Revenue Management with Independent Demands.docxbudabrooks46239
Single Resource Revenue Management with Independent Demands
c
Guillermo Gallego
Updated Spring 2013
Abstract
Providers of fixed perishable capacity, such as airline seats and hotel rooms use price discrimination
to improve revenues; in practice, this discrimination is typically achieved by imposing booking and usage
restrictions or including ancillary services such as mileage accrual and luggage handling, to sell the same
capacity to different customers at different prices. We will assume that the set of fare classes (a menu
of prices, restrictions and ancillary services) is given, and that the capacity provider’s goal is to allocate
capacity among the different fare classes to maximize expected revenues. The problem of designing and
pricing fare classes is treated in a separate chapter. We analyze the two fare class problem under the
assumption that the lower fare class books first. We use marginal analysis to informally derive
Littlewood’s
rule and then show that Littlewood’s rule is in fact optimal.
Spill rates, spill penalties and callable
products are discussed next. A dynamic programming formulation for the multiple fare class problem is
then introduced under the assumption that lower fare classes book first. Commonly used heuristics as well
as bounds on the value function are presented. Dynamic models that explicitly take time into account,
allow for more general fare arrival patterns and for randomness in the size of the requests. We compare
the performance of static and dynamic policies and find that dynamic policies have a real advantage when
the fare arrivals patterns are not low-to-high. We finalize the chapter with a model where fare classes are
not allowed to reopen after they are closed for the first time.
1
Introduction
This chapter considers the simplest and best known revenue management problem, the single resource,
inde-
pendent demand problem. We assume that the capacity provider is trying to maximize the expected
revenues
from a sunk investment in c units of capacity. We assume that capacity is sold through a reservation
system
and that capacity cannot be modified or replenished during the booking horizon. We also assume that
unsold
capacity has no salvage value. Later we will see that the zero salvage value assumption is made without
loss
of generality as any problem with positive salvage value can be transformed into a problem with zero
salvage
value. We assume that the set of fare classes (a menu of prices and restrictions) is given, and that the
demands
for the different fare classes are statistically independent. In particular, we assume that if a customer finds
his
preferred fare class closed, he will leave the system without purchasing. This assumption holds
approximately
if the difference in fares is large so that demands are decoupled or if customers can find alternative
sources
of capacity for their preferred fare class. In some cases, however, part of the demand may be recapt.
Probabilistic selling is a marketing strategy that multi-item vendors provide to consumers, presenting
discounted options through acceptance of uncertain risks with random selections from sets of multiple distinct
items. However, past studies of this strategy assume a no return policy since returned items shift part of the
mentioned uncertain risk to the retailer. Because returns are a common business practice and an important
coordination tool in supply chains, this research identifies the impacts of a return policy on the efficacy of
probabilistic selling models
Trying to find the right strategic sourcing decision optimization solution can be very confusing. Asking the right questions will go a long way towards finding the right solution.
201501 Dynamic Pricing Policies and Active LearningFrancisco Calzado
El big data y la minería de datos son términos que están de moda y que básicamente reflejan la capacidad que se tiene en la actualidad de recopilar cantidades ingentes de información y extraer datos relevantes. Es una de las grandes tendencias que están transformando el mundo pero pocas veces se ve sus aplicaciones prácticas. Una de ellas es el establecimiento de precios dinámicos.
El dynamic pricing consiste en el ajuste dinámico de los precios de acuerdo con el valor que los clientes atribuyen a un producto o servicio, con el objetivo de maximizar los ingresos y el beneficio. Se trata de aprovechar la disposición al pago de ciertos clientes en determinadas situaciones para obtener mayores ganancias, y de aplicar descuentos en otras situaciones para generar crecimiento. Esto, que en principio parece una aplicación simple de la ley de oferta y demanda, hoy en día puede sofisticarse gracias a la informática y a las matemáticas para que las compañías logren la mayor eficiencia posible. Un artículo académico firmado por expertos de la consultora Conento explica los factores que se tienen que tener en cuenta para definir una estrategia de precios dinámicos y la base matemática que debe configurarse para hacer simulaciones y comprobar que funciona.
Ver informe
Hay una línea difusa entre lo que puede tener éxito en términos de precios dinámicos y lo que puede generar rechazo. Las cinco condiciones siguientes pueden ser determinantes a la hora de aumentar el beneficio de las compañías:
Los clientes tienen una disposición al pago variada. La disposición al pago (en inglés, willingness to pay, o WTP) es la cantidad máxima que el cliente está dispuesto a pagar por el producto o servicio. No es fácil de estimar.
Es posible segmentar el mercado, identificando diferentes grupos de clientes. En un evento deportivo o en un concierto, hay clientes que priman la localización de su entrada y otros que elegirían la entrada de menor precio.
El arbitraje debe ser limitado. Es decir, la posibilidad de reventa debe ser lo más reducida posible, como ocurre por ejemplo con los billetes de avión.
El coste asociado a la segmentación del mercado y a la diferenciación de precios no debe ser muy elevado. Así ocurre en el comercio electrónico.
Los clientes o compradores deben percibir equidad en el vendedor.
Un buen ejemplo del uso de precios dinámicos es Uber, startup que conecta pasajeros con conductores en más de 200 ciudades del mundo a través de una aplicación móvil. Según New York Magazine es una de las compañías que crecen más deprisa a nivel mundial y podría llegar a ser más valiosa que Facebook, y según MIT Technology Review su principal innovación es la utilización de un robusto sistema para establecer los precios de forma dinámica (por ejemplo, subió los precios en una tormenta de nieve en Nueva York durante las pasadas Navidades).
También hay
Single Resource Revenue Management with Independent Demands.docxbudabrooks46239
Single Resource Revenue Management with Independent Demands
c
Guillermo Gallego
Updated Spring 2013
Abstract
Providers of fixed perishable capacity, such as airline seats and hotel rooms use price discrimination
to improve revenues; in practice, this discrimination is typically achieved by imposing booking and usage
restrictions or including ancillary services such as mileage accrual and luggage handling, to sell the same
capacity to different customers at different prices. We will assume that the set of fare classes (a menu
of prices, restrictions and ancillary services) is given, and that the capacity provider’s goal is to allocate
capacity among the different fare classes to maximize expected revenues. The problem of designing and
pricing fare classes is treated in a separate chapter. We analyze the two fare class problem under the
assumption that the lower fare class books first. We use marginal analysis to informally derive
Littlewood’s
rule and then show that Littlewood’s rule is in fact optimal.
Spill rates, spill penalties and callable
products are discussed next. A dynamic programming formulation for the multiple fare class problem is
then introduced under the assumption that lower fare classes book first. Commonly used heuristics as well
as bounds on the value function are presented. Dynamic models that explicitly take time into account,
allow for more general fare arrival patterns and for randomness in the size of the requests. We compare
the performance of static and dynamic policies and find that dynamic policies have a real advantage when
the fare arrivals patterns are not low-to-high. We finalize the chapter with a model where fare classes are
not allowed to reopen after they are closed for the first time.
1
Introduction
This chapter considers the simplest and best known revenue management problem, the single resource,
inde-
pendent demand problem. We assume that the capacity provider is trying to maximize the expected
revenues
from a sunk investment in c units of capacity. We assume that capacity is sold through a reservation
system
and that capacity cannot be modified or replenished during the booking horizon. We also assume that
unsold
capacity has no salvage value. Later we will see that the zero salvage value assumption is made without
loss
of generality as any problem with positive salvage value can be transformed into a problem with zero
salvage
value. We assume that the set of fare classes (a menu of prices and restrictions) is given, and that the
demands
for the different fare classes are statistically independent. In particular, we assume that if a customer finds
his
preferred fare class closed, he will leave the system without purchasing. This assumption holds
approximately
if the difference in fares is large so that demands are decoupled or if customers can find alternative
sources
of capacity for their preferred fare class. In some cases, however, part of the demand may be recapt.
Probabilistic selling is a marketing strategy that multi-item vendors provide to consumers, presenting
discounted options through acceptance of uncertain risks with random selections from sets of multiple distinct
items. However, past studies of this strategy assume a no return policy since returned items shift part of the
mentioned uncertain risk to the retailer. Because returns are a common business practice and an important
coordination tool in supply chains, this research identifies the impacts of a return policy on the efficacy of
probabilistic selling models
Trying to find the right strategic sourcing decision optimization solution can be very confusing. Asking the right questions will go a long way towards finding the right solution.
201501 Dynamic Pricing Policies and Active LearningFrancisco Calzado
El big data y la minería de datos son términos que están de moda y que básicamente reflejan la capacidad que se tiene en la actualidad de recopilar cantidades ingentes de información y extraer datos relevantes. Es una de las grandes tendencias que están transformando el mundo pero pocas veces se ve sus aplicaciones prácticas. Una de ellas es el establecimiento de precios dinámicos.
El dynamic pricing consiste en el ajuste dinámico de los precios de acuerdo con el valor que los clientes atribuyen a un producto o servicio, con el objetivo de maximizar los ingresos y el beneficio. Se trata de aprovechar la disposición al pago de ciertos clientes en determinadas situaciones para obtener mayores ganancias, y de aplicar descuentos en otras situaciones para generar crecimiento. Esto, que en principio parece una aplicación simple de la ley de oferta y demanda, hoy en día puede sofisticarse gracias a la informática y a las matemáticas para que las compañías logren la mayor eficiencia posible. Un artículo académico firmado por expertos de la consultora Conento explica los factores que se tienen que tener en cuenta para definir una estrategia de precios dinámicos y la base matemática que debe configurarse para hacer simulaciones y comprobar que funciona.
Ver informe
Hay una línea difusa entre lo que puede tener éxito en términos de precios dinámicos y lo que puede generar rechazo. Las cinco condiciones siguientes pueden ser determinantes a la hora de aumentar el beneficio de las compañías:
Los clientes tienen una disposición al pago variada. La disposición al pago (en inglés, willingness to pay, o WTP) es la cantidad máxima que el cliente está dispuesto a pagar por el producto o servicio. No es fácil de estimar.
Es posible segmentar el mercado, identificando diferentes grupos de clientes. En un evento deportivo o en un concierto, hay clientes que priman la localización de su entrada y otros que elegirían la entrada de menor precio.
El arbitraje debe ser limitado. Es decir, la posibilidad de reventa debe ser lo más reducida posible, como ocurre por ejemplo con los billetes de avión.
El coste asociado a la segmentación del mercado y a la diferenciación de precios no debe ser muy elevado. Así ocurre en el comercio electrónico.
Los clientes o compradores deben percibir equidad en el vendedor.
Un buen ejemplo del uso de precios dinámicos es Uber, startup que conecta pasajeros con conductores en más de 200 ciudades del mundo a través de una aplicación móvil. Según New York Magazine es una de las compañías que crecen más deprisa a nivel mundial y podría llegar a ser más valiosa que Facebook, y según MIT Technology Review su principal innovación es la utilización de un robusto sistema para establecer los precios de forma dinámica (por ejemplo, subió los precios en una tormenta de nieve en Nueva York durante las pasadas Navidades).
También hay
Statistics applied to the interdisciplinary areas of marketingCarol Hargreaves
Optimising price and marketing mix.
Concept of learning. When an account/product has too little sales data, bayesian shrinkage allows us to borrow information from other accounts.
Deals with outliers, by shrinking estimates towards each other.
Allows one hierarchical model instead of multiple models.
More robust, stable estimates with significant regional and account variation in estimates that cannot be done in a classical linear model.
Provides price elasticity measure that shows the impact of price changes on volume
Submitted to Operations Researchmanuscript XXA General A.docxmattinsonjanel
Submitted to Operations Research
manuscript XX
A General Attraction Model and Sales-based Linear
Program for Network Revenue Management under
Customer Choice
Guillermo Gallego
Department of Industrial Engienering and Operations Research, Columbia University, New York, NY 10027,
[email protected]
Richard Ratliff and Sergey Shebalov
Research Group, Sabre Holdings, Southlake, TX 76092, [email protected]
This paper addresses two concerns with the state of the art in network revenue management with dependent
demands. The first concern is that the basic attraction model (BAM), of which the multinomial logit (MNL)
model is a special case, tends to overestimate demand recapture in practice. The second concern is that the
choice based deterministic linear program, currently in use to derive heuristics for the stochastic network
revenue management problem, has an exponential number of variables. We introduce a generalized attraction
model (GAM) that allows for partial demand dependencies ranging from the BAM to the independent
demand model (IDM). We also provide an axiomatic justification for the GAM and a method to estimate its
parameters. As a choice model, the GAM is of practical interest because of its flexibility to adjust product-
specific recapture. Our second contribution is a new formulation called the Sales Based Linear Program
(SBLP) that works for the GAM. This formulation avoids the exponential number of variables in the earlier
choice-based network RM approaches, and is essentially the same size as the well known LP formulation
for the IDM. The SBLP should be of interest to revenue managers because it makes choice-based network
RM problems tractable to solve. In addition, the SBLP formulation yields new insights into the assortment
problem that arises when capacities are infinite. Together these two contributions move forward the state of
the art for network revenue management under customer choice and competition.
Key words : pricing, choice models, network revenue management, dependent demands, O&D, upsell,
recapture
1. Introduction
One of the leading areas of research in revenue management (RM) has been incorporating demand
dependencies into forecasting and optimization models. Developing effective models for suppliers
to estimate how consumer demand is redirected as the set of available products changes is critical
1
Gallego, Ratliff, and Shebalov: A General Choice Model and Network RM Optimization
2 Article submitted to Operations Research; manuscript no. XX
in determining the revenue maximizing set of products and prices to offer for sale in industries
where RM is used. These industries include airlines, hotels, and car rental companies, but the issue
of how customers select among different offerings is also important in transportation, retailing and
healthcare. Several terms are used in industry to describe different types of demand dependen-
cies. If all products are available for sale, we observe ...
Since regression analysis is used to produce an equation that will.docxbudabrooks46239
Since regression analysis is used to produce an equation that will predict a dependent variable using one or more independent variables. This equation has the form
Y = b1X1 + b2X2 + ... + A
For the given data using gdp_1000 as the dependent variable and the following as independent variables gives;
Independent variables: compulse, dem_oth, hdi2001, pop2002
From the above equation we would easily see that gdp1000 is predicted to increase by 3.6155 and by 16.1655 when the dem_oth and hdi2001, gdp1000 is predicted to decrease by and by 2.0032 when the variables pop2002 and Compulse goes up by one. The predicted value of gdp1000 is predicted to remain at -7.64487 if dem_oth, hdi2001, compulse, pop2002 variables are zero
We also need some measure to tell us how strongly each independent variable is associated with the dependent variable. We are trying to discover whether the coefficients on your independent variables are really different from 0 (and therefore that independent variable is ideally significant and has some effect on the dependent variable) or if any apparent differences from 0 are just due to random chance.
The null hypothesis is always that each independent variable is having absolutely no effect (has a coefficient of 0) and you are looking for a reason to reject this theory. A p-value of 5% or less is the generally accepted point at which to reject the null hypothesis.
With the p-values of compulse, dem_oth, hdi2001, less than 0.05, we reject the null hypothesis and clearly conclude that these three variables are statistically significant in the model at 95% confidence level. But with the p-value of pop2002 being greater than 0.05 we fail to reject the null hypothesis and conclude that pop2002 is not significant in the model at that level of significance.
The R-squared of the regression is the proportion of the variation in your dependent variable that is predicted by your independent variables. From the above model R2 = 67.01% therefore 67.01% of the variation in gdp1000 is explained by the independent variables, the rest may be random chances.
The overall p-value =0.0000 clearly indicates that the model is highly significant.
_
c
o
n
s
-
7
.
6
4
4
8
6
5
1
.
3
4
3
3
3
2
-
5
.
6
9
0
.
0
0
0
-
1
0
.
3
0
8
7
4
-
4
.
9
8
0
9
8
7
h
d
i
2
0
0
1
1
6
.
1
6
5
4
6
2
.
4
3
3
4
4
1
6
.
6
4
0
.
0
0
0
1
1
.
3
3
9
8
5
2
0
.
9
9
1
0
6
d
e
m
_
o
t
h
3
.
6
1
5
5
2
6
1
.
2
2
9
2
9
9
2
.
9
4
0
.
0
0
4
1
.
1
7
7
7
8
1
6
.
0
5
3
2
7
2
c
o
m
p
u
l
s
e
-
2
.
0
0
3
2
8
1
.
7
5
0
3
3
-
2
.
6
7
0
.
0
0
9
-
3
.
4
9
1
2
1
4
-
.
5
1
5
3
4
8
6
p
o
p
2
0
0
2
-
2
.
0
2
e
-
0
9
1
.
7
8
e
-
0
9
-
1
.
1
3
0
.
2
5
9
-
5
.
5
4
e
-
0
9
1
.
5
1
e
-
0
9
g
d
p
_
1
0.
Enterprise Key Management Plan An eight- to 10-page double.docxbudabrooks46239
Enterprise Key Management Plan
: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Enterprise Key Management Policy
: A two- to three-page double-spaced Word document.
.
English IV Research PaperMrs. MantineoObjective To adher.docxbudabrooks46239
English IV Research Paper
Mrs. Mantineo
Objective:
To adhere to the rules of MLA format while using a variety of sources to write a research paper which focuses on a literary topic.
Requirements:
- Your paper must be persuasive in nature, but focus on a literary topic. This paper is worth 3 Essay
Grades. This paper is worth a significant amount of your 4th MP grade so I suggest you take this paper seriously.
- Your topic will focus on
1984
. I will be providing you with an official list of topics to choose from. You will
not
be allowed to create your own topic.
The final draft will be
3-5 pages
in length. (Times New Roman, 12 pt. font, double spaced). A Works Cited page is required and does not count towards your number of pages.
You are required to use
4
approved, academic references: 2 web based articles from credible sources, 1 printed book (This would be the novel
1984
), and one primary source document. You may use more than 4 sources, although you must first meet the minimum requirements for types of sources. You must use all 4 sources in your final draft.
ABSOLUTELY NO LATE PAPERS WILL BE ACCEPTED. No exceptions! If you are absent, you are still responsible for getting me the paper on time. Your paper must be submitted to turnitin.com by 11:59 PM.
If you do not submit your paper to Classroom by 11:59 p.m. you will receive a zero.
Extra help is available, please make an appointment.
Essay Topics:
The Loss of Individual Rights in
1984
:
Personal privacy and space is never granted throughout
1984
. Every person is always subject to observation, even by their own family members and friends. Furthermore, since Big Brother is always watching and the Thought Police are always on the lookout, it is impossible for any kind of individualism to flourish. For this essay you can look at the ways this occurs and how various characters attempt (successfully or not) to subvert it. Then move out to consider how this lack of privacy (and by proxy, individualism) influences individuals and society as a whole in the present day. How does the present US Government subvert the rights of the individual and how does this compare to the novel?
Fear of Technology
: During WWII, technology was primarily developed for military purposes, specifically for the surveillance of the enemy. People are generally resistant to technology that they believe can be used against them. George Orwell’s novel
1984
plays on this inherent fear of technology. Discuss the role of technology in Oceania. In what areas is technology highly advanced, and in what areas has its progress stalled? Why? How is it used against the people? To control them? How does this reflect the human fear of technology during the time the novel was written? How does this fear carry over in the modern world? Is it valid? How can technology be used against the common man to violate individual rights? How does this compare to the novel?
Historical Analysis
.
More Related Content
Similar to Single Resource Revenue Management Problems withDependent De.docx
Statistics applied to the interdisciplinary areas of marketingCarol Hargreaves
Optimising price and marketing mix.
Concept of learning. When an account/product has too little sales data, bayesian shrinkage allows us to borrow information from other accounts.
Deals with outliers, by shrinking estimates towards each other.
Allows one hierarchical model instead of multiple models.
More robust, stable estimates with significant regional and account variation in estimates that cannot be done in a classical linear model.
Provides price elasticity measure that shows the impact of price changes on volume
Submitted to Operations Researchmanuscript XXA General A.docxmattinsonjanel
Submitted to Operations Research
manuscript XX
A General Attraction Model and Sales-based Linear
Program for Network Revenue Management under
Customer Choice
Guillermo Gallego
Department of Industrial Engienering and Operations Research, Columbia University, New York, NY 10027,
[email protected]
Richard Ratliff and Sergey Shebalov
Research Group, Sabre Holdings, Southlake, TX 76092, [email protected]
This paper addresses two concerns with the state of the art in network revenue management with dependent
demands. The first concern is that the basic attraction model (BAM), of which the multinomial logit (MNL)
model is a special case, tends to overestimate demand recapture in practice. The second concern is that the
choice based deterministic linear program, currently in use to derive heuristics for the stochastic network
revenue management problem, has an exponential number of variables. We introduce a generalized attraction
model (GAM) that allows for partial demand dependencies ranging from the BAM to the independent
demand model (IDM). We also provide an axiomatic justification for the GAM and a method to estimate its
parameters. As a choice model, the GAM is of practical interest because of its flexibility to adjust product-
specific recapture. Our second contribution is a new formulation called the Sales Based Linear Program
(SBLP) that works for the GAM. This formulation avoids the exponential number of variables in the earlier
choice-based network RM approaches, and is essentially the same size as the well known LP formulation
for the IDM. The SBLP should be of interest to revenue managers because it makes choice-based network
RM problems tractable to solve. In addition, the SBLP formulation yields new insights into the assortment
problem that arises when capacities are infinite. Together these two contributions move forward the state of
the art for network revenue management under customer choice and competition.
Key words : pricing, choice models, network revenue management, dependent demands, O&D, upsell,
recapture
1. Introduction
One of the leading areas of research in revenue management (RM) has been incorporating demand
dependencies into forecasting and optimization models. Developing effective models for suppliers
to estimate how consumer demand is redirected as the set of available products changes is critical
1
Gallego, Ratliff, and Shebalov: A General Choice Model and Network RM Optimization
2 Article submitted to Operations Research; manuscript no. XX
in determining the revenue maximizing set of products and prices to offer for sale in industries
where RM is used. These industries include airlines, hotels, and car rental companies, but the issue
of how customers select among different offerings is also important in transportation, retailing and
healthcare. Several terms are used in industry to describe different types of demand dependen-
cies. If all products are available for sale, we observe ...
Since regression analysis is used to produce an equation that will.docxbudabrooks46239
Since regression analysis is used to produce an equation that will predict a dependent variable using one or more independent variables. This equation has the form
Y = b1X1 + b2X2 + ... + A
For the given data using gdp_1000 as the dependent variable and the following as independent variables gives;
Independent variables: compulse, dem_oth, hdi2001, pop2002
From the above equation we would easily see that gdp1000 is predicted to increase by 3.6155 and by 16.1655 when the dem_oth and hdi2001, gdp1000 is predicted to decrease by and by 2.0032 when the variables pop2002 and Compulse goes up by one. The predicted value of gdp1000 is predicted to remain at -7.64487 if dem_oth, hdi2001, compulse, pop2002 variables are zero
We also need some measure to tell us how strongly each independent variable is associated with the dependent variable. We are trying to discover whether the coefficients on your independent variables are really different from 0 (and therefore that independent variable is ideally significant and has some effect on the dependent variable) or if any apparent differences from 0 are just due to random chance.
The null hypothesis is always that each independent variable is having absolutely no effect (has a coefficient of 0) and you are looking for a reason to reject this theory. A p-value of 5% or less is the generally accepted point at which to reject the null hypothesis.
With the p-values of compulse, dem_oth, hdi2001, less than 0.05, we reject the null hypothesis and clearly conclude that these three variables are statistically significant in the model at 95% confidence level. But with the p-value of pop2002 being greater than 0.05 we fail to reject the null hypothesis and conclude that pop2002 is not significant in the model at that level of significance.
The R-squared of the regression is the proportion of the variation in your dependent variable that is predicted by your independent variables. From the above model R2 = 67.01% therefore 67.01% of the variation in gdp1000 is explained by the independent variables, the rest may be random chances.
The overall p-value =0.0000 clearly indicates that the model is highly significant.
_
c
o
n
s
-
7
.
6
4
4
8
6
5
1
.
3
4
3
3
3
2
-
5
.
6
9
0
.
0
0
0
-
1
0
.
3
0
8
7
4
-
4
.
9
8
0
9
8
7
h
d
i
2
0
0
1
1
6
.
1
6
5
4
6
2
.
4
3
3
4
4
1
6
.
6
4
0
.
0
0
0
1
1
.
3
3
9
8
5
2
0
.
9
9
1
0
6
d
e
m
_
o
t
h
3
.
6
1
5
5
2
6
1
.
2
2
9
2
9
9
2
.
9
4
0
.
0
0
4
1
.
1
7
7
7
8
1
6
.
0
5
3
2
7
2
c
o
m
p
u
l
s
e
-
2
.
0
0
3
2
8
1
.
7
5
0
3
3
-
2
.
6
7
0
.
0
0
9
-
3
.
4
9
1
2
1
4
-
.
5
1
5
3
4
8
6
p
o
p
2
0
0
2
-
2
.
0
2
e
-
0
9
1
.
7
8
e
-
0
9
-
1
.
1
3
0
.
2
5
9
-
5
.
5
4
e
-
0
9
1
.
5
1
e
-
0
9
g
d
p
_
1
0.
Enterprise Key Management Plan An eight- to 10-page double.docxbudabrooks46239
Enterprise Key Management Plan
: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Enterprise Key Management Policy
: A two- to three-page double-spaced Word document.
.
English IV Research PaperMrs. MantineoObjective To adher.docxbudabrooks46239
English IV Research Paper
Mrs. Mantineo
Objective:
To adhere to the rules of MLA format while using a variety of sources to write a research paper which focuses on a literary topic.
Requirements:
- Your paper must be persuasive in nature, but focus on a literary topic. This paper is worth 3 Essay
Grades. This paper is worth a significant amount of your 4th MP grade so I suggest you take this paper seriously.
- Your topic will focus on
1984
. I will be providing you with an official list of topics to choose from. You will
not
be allowed to create your own topic.
The final draft will be
3-5 pages
in length. (Times New Roman, 12 pt. font, double spaced). A Works Cited page is required and does not count towards your number of pages.
You are required to use
4
approved, academic references: 2 web based articles from credible sources, 1 printed book (This would be the novel
1984
), and one primary source document. You may use more than 4 sources, although you must first meet the minimum requirements for types of sources. You must use all 4 sources in your final draft.
ABSOLUTELY NO LATE PAPERS WILL BE ACCEPTED. No exceptions! If you are absent, you are still responsible for getting me the paper on time. Your paper must be submitted to turnitin.com by 11:59 PM.
If you do not submit your paper to Classroom by 11:59 p.m. you will receive a zero.
Extra help is available, please make an appointment.
Essay Topics:
The Loss of Individual Rights in
1984
:
Personal privacy and space is never granted throughout
1984
. Every person is always subject to observation, even by their own family members and friends. Furthermore, since Big Brother is always watching and the Thought Police are always on the lookout, it is impossible for any kind of individualism to flourish. For this essay you can look at the ways this occurs and how various characters attempt (successfully or not) to subvert it. Then move out to consider how this lack of privacy (and by proxy, individualism) influences individuals and society as a whole in the present day. How does the present US Government subvert the rights of the individual and how does this compare to the novel?
Fear of Technology
: During WWII, technology was primarily developed for military purposes, specifically for the surveillance of the enemy. People are generally resistant to technology that they believe can be used against them. George Orwell’s novel
1984
plays on this inherent fear of technology. Discuss the role of technology in Oceania. In what areas is technology highly advanced, and in what areas has its progress stalled? Why? How is it used against the people? To control them? How does this reflect the human fear of technology during the time the novel was written? How does this fear carry over in the modern world? Is it valid? How can technology be used against the common man to violate individual rights? How does this compare to the novel?
Historical Analysis
.
Enter in conversation with other writers by writing a thesis-dri.docxbudabrooks46239
Enter in conversation with other writers by writing a thesis-driven essay that responds to 3 readings selected by your instructorYour essay should include
all
of the following:
A precise thesis, or main claim
Supporting details or evidence for your claim
A clearly defined audience
An outline of the "conversation" begin by the 3 assigned articles
Direct reference (through quotation, summary, or paraphrase) to the 3 assigned articles
"Beyonce' and Social Media..." by Melissa Avdeef
"Not so Busy" by William Power
"Growing up Tethered" by Sherry Turkle
Length/Due Date
: approximately 800-1,000 words, Use 12 point, Times New Roman font, double-spaced.
Use 1-inch margins top, bottom, and sides.
.
English II – Touchstone 3.2 Draft an Argumentative Research Essay.docxbudabrooks46239
English II – Touchstone 3.2 Draft an Argumentative Research Essay
Peter Comment by Kvinge, Krystal: Hi Peter! I’ll be reviewing your essay today.
English Composition II
Touchstone 3.2 Draft an Argumentative Research Essay
July 16, 2020
Recent pandemic, commonly referred to as COVID 19, has changed the world dynamics. This disease has not just crashed the world health system but has also impacted the global education system. COVID 19 has made our daily routine vulnerable. Still, the precautionary measures such as social distancing have not just impacted the social life of human beings. Still, they have also altered the Present and the future of the global learning system. According to the UNESCO report, the nationwide termination of educations institutes has obstructed over 60% of the world's learner’s populace, with approximately 1.53 billion learners out of learning institutes. Many educationists believe that with the current circumstance, the drop-out rate of students across the globe will increase in the near future because of the disruption in the system. Though many parents and institutes are still in denial of the changes that have occurred due to the pandemic, educationists and research indicate that the current alteration in the global education system will not be short-lived and will have a profound impact on the future means of education. Comment by Kvinge, Krystal: Write smoothly: this sentence is awkward. Try reading your writing aloud to see if it sounds natural. Comment by Kvinge, Krystal: Use specific language: what do you mean by “crashed?” Comment by Kvinge, Krystal: Avoid repetition in your essay: here, beginning two sentences in a row with “still” weakens your writing. Comment by Kvinge, Krystal: Cite all outside information in APA format. You can find information on it here: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html Comment by Kvinge, Krystal: Look out for odd word choices throughout your paper. Write clearly, directly, and concisely. Comment by Kvinge, Krystal: Important: improve this thesis. Your thesis statement must be argumentative: it must take a side and state what should be done What exactly are you arguing for?
Education System during Pandemic Comment by Kvinge, Krystal: If you are going to use headings, use them throughout the paper, including for your Introduction and Conclusion.
The recent survey shows that around 22 countries in three continents have closed their learning system on local and state levels because of COVID 19. Such massive disruption has pushed educators and institutions to opt for new means of education, such as online learning and instructional tutoring. However, such means of education has also exposed other crucial factors, such as inconsistent resource allocation and social and economic differences. The historical research on the impact of school closure depicts that even a brief intervention in school activities has a h.
English 3060Spring 2021Group Summary ofReinhardP.docxbudabrooks46239
English 3060
Spring 2021
Group Summary of
Reinhard
Please work with your group (or individually) to summarize Reinhard’s article. Your summary should be two pages long, in MLA format, listing the name of each participant in your breakout room who attended and contributed for the entire session.
To begin your summary, tell who wrote the essay, the name of the essay, and what the writer’s main point or project is. As with McDonald’s you should be able to do this is one short paragraph. (
For example: In his essay, “ Disgrace and the Neighbor: An Interchange with Bill McDonald,” Coetzee scholar Kenneth Reinhard responds to Bill McDonald’s essay, arguing against McDonald’s thesis that David Lurie changes. It is Reinhart’s thesis that David Lurie does not undergo significant change in the novel. In answering McDonald, Reinhard analyzes each of Lurie’s changed vision in the context of two sets of questions—one regarding the redemptive potential of change in vision and the second regarding what it means to love one’s neighbor.
Reinhard devotes the first 1 ½ pages to this contextualization. In the middle of page 2, he announces his own project: he will respond to McDonald by questioning the redemptive nature of vision AND also questioning neighbor love. Reinhard then sets about defining and contextualizing the significance of erotic vision. On page 96, he begins his analysis of the three visions set forth by McDonald, addressing the limitations of each vision to indicate real change in Lurie. This might be the heart of your summary.
Reinhard moves from his analysis of the three visions to an analysis of neighborly love in Disgrace and the problems of living side-by-side with those whose presence may be a challenge. He places his case for the novel’s redemption in Lucy and her “blindness” to the evils she has suffered.
Once again your summary should be 2 pages long, double-spaced in MLA format.
.
English 102 Essay 2 First Draft Assignment Feminism and Hubris.docxbudabrooks46239
English 102 Essay 2 First Draft Assignment: “Feminism and Hubris”
MLA format
Write an essay in which you compare and contrast the play
Oedipus Rex
by Sophocles with the play
Trifles
by Susan Glaspell. You should focus on 3 or more of the following elements in your essay:
theme, character, setting, dialogue, stage directions, plot, and structure.
Please consider 1 or more of the following questions in your essay:
How is
Oedipus Rex
an example of ancient Greek drama, and how is
Trifles
an example of modern drama? Ancient Greek drama is often characterized by a ritualistic tone. The presence of a chorus is an example of this tone.
Is Susan Glaspell's
Trifles
an example of a feminist play? In a feminist story or play, the female characters typically struggle to assert their rights in a society dominated by men.
The title character in Sophocles’ play
Oedipus Rex
is often referred to as a tragic hero. A tragic hero or heroine begins the play as a well-loved person of stature, but that stature disappears, because of a tragic set of circumstances that (a) is foretold, (b) is inevitable, and (c) is brought about by the hero’s or heroine's own actions. Compare and contrast Oedipus, Creon, or another character from
Oedipus Rex
with Minnie Foster or another character from
Trifles.
Is Minnie a tragic heroine? Is Minnie’s tragic circumstance (being arrested for and possibly convicted of murder after killing her husband) foretold, inevitable, and brought about by her own actions, like Oedipus’s circumstance?
The final draft of your essay should be 5 to 7 double-spaced pages (and 1,200 to 1,500 words) in length, plus a works cited page. Your essay should have a
title
as well as a
thesis statement.
You must support each of your claims with quotations from the play(s) you choose to write about. After answering the above questions as part of the prewriting process, develop a Thesis Statement. Please consult the sample essay on drama in our literature book (in the chapter entitled “Writing about Plays”) for help on formatting in-text citations for plays (such as
Oedipus Rex
) that are divided into acts and scenes. Please study the sample works cited page below. Relax and have fun with this assignment!
Works Cited
Glaspell, Susan.
Trifles.
Literature: A Portable Anthology.
Ed. Janet E. Gardner, et al. 4th ed.
Bedford, 2016. pp. 909-920.
Sophocles.
Oedipus Rex.
Literature: A Portable Anthology.
Ed. Janet E. Gardner, et al. 4th ed.
Bedford, 2016. pp. 707-750.
.
English 102 Essay 2 Assignment Feminism and Hubris”Write a.docxbudabrooks46239
English 102 Essay 2 Assignment: “Feminism and Hubris”
Write an essay in which you compare and contrast the play
Oedipus Rex
by Sophocles with
the play
Trifles
by Susan Glaspell. You should focus on 3 or more of the following elements
in your essay:
theme, character, setting, dialogue, stage directions, plot, and structure.
Please
consider 1 or more of the following questions in your essay:
How is
Oedipus Rex
an example of ancient Greek drama, and how is
Trifles
an example
of modern drama? Ancient Greek drama is often characterized by a ritualistic tone. The
presence of a chorus is an example of this tone.
Is Susan Glaspell's
Trifles
an example of a feminist play? In a feminist story or play, the
female characters typically struggle to assert their rights in a society dominated by men.
The title character in Sophocles’ play
Oedipus Rex
is often referred to as a tragic hero. A
tragic hero or heroine begins the play as a well-loved person of stature, but that stature
disappears, because of a tragic set of circumstances that (a) is foretold, (b) is inevitable,
and (c) is brought about by the hero’s or heroine's own actions. Compare and contrast
Oedipus, Creon, or another character from
Oedipus Rex
with Minnie Foster or another
character from
Trifles.
Is Minnie a tragic heroine? Is Minnie’s tragic circumstance (being
arrested for and possibly convicted of murder after killing her husband) foretold,
inevitable, and brought about by her own actions, like Oedipus’s circumstance?
The final draft of your essay should be 5 to 7 double-spaced pages (and 1,200 to 1,500
words) in length, plus a works cited page. Your essay should have a
title
as well as a
thesis
statement.
You must support each of your claims with quotations from the play(s) you choose to
write about. After answering the above questions as part of the prewriting process, develop a
Thesis Statement. Please consult the sample essay on drama in our literature book (in the chapter
entitled “Writing about Plays”) for help on formatting in-text citations for plays (such as
Oedipus
Rex
) that are divided into acts and scenes. Please study the sample works cited page below.
Relax and have fun with this assignment!
Works Cited
Glaspell, Susan.
Trifles.
Literature: A Portable Anthology.
Ed. Janet E. Gardner, et al.
4th ed.
Bedford, 2016. pp. 909-920.
Sophocles.
Oedipus Rex.
Literature: A Portable Anthology.
Ed. Janet E. Gardner, et al.
4th ed.
Bedford, 2016. pp. 707-750.
.
ENGL112 WednesdayDr. Jason StarnesMarch 9, 2020Human Respo.docxbudabrooks46239
ENGL112 Wednesday
Dr. Jason Starnes
March 9, 2020
Human Response to Trauma in In The Shadow of No Towers and Fun Home
Trauma means the response to a deeply distressing or disturbing experience that overwhelms
and diminishes their sense of self. When facing trauma, people will show different reactions. Art
Spiegelman and Alison Bechdel in In The Shadow of No Towers and Fun Home have a
similarity which they also face generation trauma. However, their generation traumas are
different in scale and period. After experiencing the trauma, their behaviors also have different
changes.
Generation trauma means a psychological trauma which occurs in a generation and can be
transferred in between generations. After the first generation people experiences the trauma, they
are capable to transfer their trauma to their children and further generations of posterity. They
may suffer mental disease such as Post-Traumatic Stress Disorder and depression.
As for the book “In The Shadow of No Towers”, the 9/11 terrorist attack not only become
Art Spiegelman’s trauma, but also become whole American’s trauma. This incident converted to
a generation trauma of whole American at 21st century. When 9/11 terrorist attack occur, all
American are not sure what is happening at that time. All the internet connection are lost. For
Art Spiegelman, he shows a nervous and anxiousness towards the trauma. His wife and him are
walking normally on the street. But suddenly they heard that there was a crush behind them. The
author shows an awful face and realized their daughter was having class. (Art Spiegelman P2,3).
They rushed to school and found their daughter. It can show that the writer is worry about his
family members. He wants his family member to be with him at that time. However, after his
daughter had found, they walked back home and not concerned about the 9-11 attack. (4). He is
selfish when facing such a horrible terrorist attack. When facing such a big event, the writer is
just concern about his own personal interest and does not care about others.
After the 9/11 terrorist attack, Art Spiegelman and many American suffer Post-Traumatic
Stress Disorder. (Art Spiegelman P2,8,9).
In Fun Home, Alison Bechdel and her father also have trauma which the society were not
open-mindedness enough for homosexual in that generation. Most of the people are not
accept for homosexual because of the culture, law, religion, and belief, they consider
homosexual is illegal, against moral, ethics, and nature.
The difference of generation trauma between the Art Spiegelman and Alison Bechdel.
Art Spiegelman and Alison Bechdel also experience generation trauma through In The
Shadow of No Towers and Fun Home. Although their trauma are different in scale and period,
the trauma affect a lot to them and change their behavior and lives.
.
English 101 - Reminders and Help for Rhetorical Analysis Paragraph.docxbudabrooks46239
English 101 - Reminders and Help for Rhetorical Analysis Paragraphs
1. Remember the “Rule of Thirds” for Body Paragraphs (Besides BP1 on Essay II)
Top 1/3 of Paragraph (about 4-5 sentences) – your development of an idea stated through a clear topic sentence and a group of follow up sentences that explain and ‘analyze’ the point.
-(P) main point of paragraph in the topic sentence
-(I) follow up and explanation of the idea, how it is true and its importance
Middle 1/3 of paragraph (4-5 sentences) – this section should be focused on ‘support’ of your that will in a sense prove the idea presented
-(E) Use of a specific example/evidence from the text or perhaps a ‘universal’ example to display and ‘show’ your audience what you mean or perhaps a secondary source
Final 1/3 (4-5 sentences) – summarize and reassert your main point in a fresh way.
-(S) Returning to your main point – you may have to transition out of your example to return back to your main idea. Be sure to restate it and perhaps change the context to analyze it in a new way.
2. Help Developing Main Points – Rhetorical Analysis
The I and S sections carry a lot of ‘weight’ because they are the areas where a student writer can show the depth of their thinking and comprehension of the idea presented. This is especially true with rhetorical analysis paragraphs: Target Audience, Message, Manipulation/Persuasion, Effectiveness, and/or Effect (an indiv. essay will not have all of these).
Asking questions of your main point is a great way to ‘dig’ for development of your idea. Here are some example questions for each RA paragraph that may help you plan/develop your I and S sections:
A. Target Audience (TA) – Why has this audience been chosen by the ‘company’/advertiser/text? What does knowing this TA tell you about the ad’s purpose/message? Why/how is this audience susceptible to the purpose/message of text.
B. Message – Why is this message being used by the ‘text’? How/why is this message meaningful to the audience? What is the message trying to make the audience feel or believe?
C. Manipulation/Persuasion – Explain a specific method/way the text tries to persuade the audience. How does this method of persuasion ‘work’ within the text? More generally, why is this approach to manipulation/persuasion used?
D. ***Effectiveness*** (prob. a paragraph only for ads) – How/why does the ad succeed or fail in its purpose? What could be done to make the ad more effective?
E. Effect – How does the add connect to, support, or create a problem in the real world? How/why does ad have this impact? How does the ‘effect’ benefit or damage the real life of audience?
English 101 - Essay II – Assignment
Texts Covered to Prepare for EII:
-“Why Good Advertising Works (Even When You Think It Doesn’t)” – Nigel Hollis
-“How Advertisers Are Manipulating You in Ways You Don’t Even Know” – video link provided on Canvas
-“Backpacks vs. Briefcases” - Laura Bolin Carroll
-“How Advertising Has Become an Agent o.
ENGL 301B Sections 12 & 15
Prof. Guzik Spring 2020
Assignment #2: Mis and Dis
Purpose and Logistics:
Normally, as we work on assignment #2 in ENGL 301B we would be revisiting key structural elements of essays more advanced than the Five-Paragraph-Style (FPS) Essay. However, many of the lessons that I usually use for this assignment to focus on global organization are activities that (despite my best efforts) are activities that I don’t have an easy fix for to convert them to activities that can be done at home or online. So this is going to be a bit awkward.
Instead, we’ll drill down on paragraph development and strategies for introductory paragraphs and concluding paragraphs.
Moreover, since many (but not all) of you are taking the class C/NC instead of for a letter grade, some of you will only plan to write two out of class essays instead of all three.
This assignment topic should be completed by all students taking the class who DO NOT plan to use A1 in the final portfolio. It’s another argumentative, thesis-driven essay, and every passing portfolio should have one. A3 is a more narrative topic (although it does involve some heavy-duty analysis.)
However, I am mindful that even though this assignment has two topic options, both of them may be close enough to current events that students who either struggle with issues of anxiety or who are easily distracted by news in our current study and work environments might find this assignment hard to complete, even if you choose to focus on political mis and dis instead of public health mis and dis. (Those terms will make sense soon.)
To that end, I am posting the materials for A2 and A3 at the same time and asking students to make the choices that work best for them when selecting which assignment to work on next.
When we hold online classes, we may divide up into A2 and A3 groups to discuss the topics. Stay tuned for details.
Readings:
Truth Decay: An Initial Exploration of the Diminishing Role of Facts and Analysis in American Public Life by Jennifer Kavanagh and Michael D. Rich (you are only required to read the summary and the introduction of this book-length report. If you choose to use this as a reading for your essay, you are welcome to draw on other parts of the text, but in no way required to.)
“Why We Believe Lies” by Cailin O’Connor and James Owen Weatherall. (This article was published in Scientific American but is locked behind a paywall if you try to google the article. I suggest using the Academic Search Complete database, which has the HTML version of the article. It was published in the September 2019 edition.)
“YouTube, The Great Radicalizer” by Zeynep Tufekci from The New York Times
“Evaluating Information: The Cornerstone of Civic Online Reasoning” the executive summary published by the Stanford History Education Group in 2016.
“Misinformation Telephone” by Renee Diresta from Slate
Background:
Current events have driven home yet again that the infras.
ENGL 102Use the following template as a cover page for each writ.docxbudabrooks46239
ENGL 102
Use the following template as a cover page for each written essay:
Title of Assignment
COURSE # and TITLE_________________________________________
(e.g., ENGL 102: Literature and Composition)
SEMESTER OF ENROLLMENT_______________________
(e.g., Fall D 2017)
NAME_________________________________________ID #____________
WRITING STYLE USED_____________________________________________________
(e.g., MLA)
Page 1 of 1
ENGL 102
Research Paper Grading Rubric
Criteria
Levels of Achievement
Points Earned
Excellent/Good
Fair/Competent
Deficient
Development
(CCLO #2)
65 to 75 points
· Major points are stated clearly and are well-supported.
· Content is persuasive and comprehensive.
· Content and purpose of the writing are clear.
· Thesis has a strong claim.
· Audience is clear and appropriate for the topic.
· Supportive information (if required) is strong and addresses writing focus.
51 to 64 points
· Major points are addressed, but clarity or support is limited.
· Content is somewhat persuasive or comprehensive.
· Content is inconsistent (lack of clear purpose and/or clarity).
· Thesis could be stronger.
· Supportive information (if required) needs strengthening or does not address writing focus.
0 to 50 points
· Major points are unclear and/or insufficiently supported.
· Content is missing essentials.
· Content has unsatisfactory purpose, focus, and clarity.
· Supportive information (if required) is missing.
Organization and Structure
(CCLO #1)
65 to 75 points
· Writing is well-structured, clear, and easy-to-follow.
· Introduction is compelling and forecasts the topic and thesis.
· Each paragraph is unified and has a clear central idea.
· Transitional wording is present throughout the writing.
· Conclusion is a logical end to the writing.
· Word count is at least 1,500 words.
51 to 64 points
· Paper is adequately organized, but some areas are difficult to follow.
· Introduction needs to provide a stronger gateway into the writing.
· Some paragraphs lack unity and coherence.
· Better transitions are needed to provide fluency of ideas.
· Conclusion is trite or barely serves its purpose.
· Word count almost meets requirement.
0 to 50 points
· Organization and structure detract from the writer’s message.
· Introduction and/or conclusion is/are incomplete or missing.
· Paragraphs are not unified (e.g. more than 1 topic is included, missing or inadequate controlling and concluding sentences).
· Transitions are missing.
· Conclusion, if present, fails to serve its purpose.
· Word count does not meet requirement.
Grammar and Diction
(CCLO #1, #3)
65 to 75 points
· The writing reflects correct grammar, punctuation, and spelling standards.
· Language is accurate, appropriate, and effective.
· The writing’s tone is appropriate and highly effective.
· 51 to 64 points
· The writing contains some grammar, punctuation, and/or spelling errors.
· Language is unclear, awkward, or inappropriate in parts.
· The writing’s tone is gener.
ENGL2310 Essay 2 Assignment Due by Saturday, June 13, a.docxbudabrooks46239
ENGL2310: Essay 2 Assignment Due by Saturday, June 13, at 11:59pm Central
The Essay 2 assignment builds on the analytical skills you displayed in Essay 1, asking you to deepen those skills by applying two lenses to the readings. We’re also adding in our Weeks 5 and 6 reading, Heart of Darkness, a work of 20th-century literature. Exploring the intersection of two different themes is an opportunity to narrow your scope even further, giving you a stronger foundation for analysis.
For this assignment, you have the option to submit the essay as a normal Word document or as a digital text called a Sway. This is a chance to get experience with digital writing before the Final Project. (Here’s an example of a Sway that introduces postcolonial theory.) A multimodal approach with Sway opens many creative possibilities, but those should all be in service of enhancing a deep analysis.
Whichever mode of delivery you choose, the essay should have the elements of a scholarly literary analysis: APA or MLA citation style (you can skip the abstract!); a narrow, arguable thesis statement; separate supporting ideas with topic sentences/transitions; and a dynamic conclusion.
In this essay, you are expected to do the following:
1. Select two of the themes of postcolonial theory that you would like to explore. These will be the lenses through which you look at the literature. You’re more than welcome to stick to the same initial theme you chose for Essay 1 and add in a new one, or you could choose two entirely new themes to apply.
2. Describe the lenses and explain how/why they represent a promising combination. Why are they worthwhile to discuss in relationship to one another? How do they inform one another? How does the combination limit your approach in helpful, constructive, or opportune ways? Be specific.
3. Apply that lens to The Epic of Gilgamesh, The Tempest, and Heart of Darkness. This should be the bulk of your writing. How do the themes function within the story? What specific moments in the story are valuable for drawing deeper insights about the intersection between the two themes? Include balanced textual evidence, not simply general statements about the plot elements or characters. Ultimately, the analysis should answer this question: what do these three stories reveal about how these themes combine? What insight(s) can we take from the readings that apply beyond the literature?
Additional advice:
Your essay should be a postcolonial analysis, not just a character study or a general discussion of symbols in the literature. The focus on colonial relationships should not be difficult to maintain, especially as we’re tying in 20th-century literature that’s directly tied to actual colonial events. Don’t hesitate to reach out if you’re having trouble working through ideas or weighing your options.
As you can see in the rubric, a specific length is not part of the grading criteria, but successful essays are generally bet.
ENGL 151 Research EssayAssignment DetailsValue 25 (additio.docxbudabrooks46239
ENGL 151 Research Essay
Assignment Details
Value: 25% (additional 5% for Draft/Peer Review)
Due Date: Draft—Jun 10
Final—June 19
Length: 1500 words (does not count the references list)
Instructions
Write a 1,500 word argumentative essay in which you communicate and defend a thesis about a specific topic you have begun researching over the first four weeks of the term.
While your essay is based on your own opinion about a topic, the strength of your essay will depend on your ability to anticipate objections/questions from critical readers and address them by collecting and integrating supporting evidence from other texts. As always, I expect your argument to be thorough, well-reasoned, and concise. Don’t waste space with empty words.
Your analysis should have a strong, clear structure. As a guide, consider our standard conceptualization of essay format:
· Introduction paragraph containing (among other things) a clear thesis
· Body paragraphs discussing one aspect of the argument to support your thesis
· Conclusion paragraph that reminds readers of the thesis and major supporting ideas
Your essay must be formatted according to APA 7th edition guidelines, and you must cite both quotations and paraphrasing in APA style, which includes a References list.
Research
You must incorporate information from a minimum of five reliable and appropriate sources in your essay, at least one of which must be a scholarly article from the Camosun library database. Texts providing only general information (eg. dictionaries, encyclopedias, wikis) are not appropriate sources. Web resources from reliable sources (eg. American Medical Association, Statistics Canada) can be valuable, but extreme caution should be used when defining “reliable”. If you’re in doubt, discuss with other students and/or contact me.
Academic Honesty
Remember, plagiarism is a very serious offence. All borrowed material must be cited using APA style, and any paraphrasing must be significantly re-worded from the original material.
I expect you to limit the length of your quotations (all under 40 words long).
Essay Draft: Process and Grading
1. On Wednesday, June 10, before 12:00pm (noon), you will submit a draft of your research essay to the Essay Draft Drop Box on our D2L page. Your draft should be
· a complete essay that may lack the polish of a final draft
· fully cited in APA style, including in-text citations and a references list
· formatted in APA style (see sample on D2L)
· submitted without your name on it (don’t include it on the title page)
2. I will email you another student’s draft by 5:00pm the same day, and you will use the Peer Review Guide to give feedback on the student’s essay. The review process should only take 60 minutes max (that’s how long I give my students when we do this in class).
3. You will submit your feedback to the Peer Review Drop Box on D2L before Thursday, June 11, at 5:00pm.
The draft will be graded on a pass/fail basis. Failing to su.
ENGL 140 Signature Essay Peer Review Worksheet
AssignmentDirections: Your task is to provide high level feedback to at least one of your fellow classmates that should help them improve their final essay. You will need to complete, in its entirety, this peer review worksheet to help your fellow student.
PART ONE: DEMOGRAPHICS
Name of the student whose essay you reviewed:
Your Name: Daniel Placeres
PART TWO: ANALYSIS
Summarize, in three to five sentences, the overall argument being made in this essay. Share your opinion on how well you think this draft meets the assignment requirements.
INPUT: The overall argument mentions the association between bad health and low income. Daniel argues that poverty increases the risk of poor hygienic and health related issues. Mentioned, is the fact that without the proper income healthcare services are limited or not accessible to those in need.
I feel the draft does need more revision, but does meet the requirements provided to our class. I have a clear understanding of the link between poor health and poverty and believe we can make this a great paper.
PART THREE: CONTENT
Address each of the following questions, using complete sentences and specific examples when possible. Remember that you can give both positive and negative answers here to help highlight both the best aspects of the essay and address those areas that need revision.
Format
YES
NO
1
Does the essay use appropriate APA formatting, including double spacing, Times New Roman 12 point. Times New Roman font, one-inch margins, and appropriate paragraph indentations?
N
2
Can you identify any areas where outside source information appears to be used when no in-text citations are included? Provide specific examples:
N
3
When in-text citations are used, do they follow APA formatting?
Y
4
Does the essay include the required 8 sources?
Y
5
Can you identify any issues with the references page? If so, please provide specific examples: hyperlinks, capitalizations (review “Poverty and health: thirty years of progress?”),
Y
Content
YES
NO
1
Can you identify the main argument being made?
Y
2
Can you identify the thesis statement? Does it make a claim that can be argued and clearly take a stance?
Y
3
Do each of the paragraphs in the essay work to directly support the argument being made in the essay?
Y
Organization
1. How effectively does the introduction engage the reader while providing an overview of the main controversy being addressed?
Introductory paragraph flows, however, his argument needs to be more clear. Before mentioning his point of view on poor health care linked to political injustice, he mentions a point on education, which weakens his argument by diverting the subject. Although I believe this is the argument he was attempting to make, he then begins the body of his essay by discussing correlations between poverty, healthcare, and lifestyle (e.g., diets), which once again scatters his topic.
2. How easily .
ENGINEERING ETHICSThe Space Shuttle Challenger Disaster.docxbudabrooks46239
ENGINEERING ETHICS
The Space Shuttle Challenger Disaster
Department of Philosophy and Department of Mechanical Engineering
Texas A&M University
NSF Grant Number
DIR-9012252
Instructor's Guide
Introduction To The Case
On January 28, 1986, seven astronauts were killed when the space shuttle they were piloting, the Challenger,
exploded just over a minute into the flight. The failure of the solid rocket booster O-rings to seat properly
allowed hot combustion gases to leak from the side of the booster and burn through the external fuel tank. The
failure of the O-ring was attributed to several factors, including faulty design of the solid rocket boosters,
insufficient low- temperature testing of the O-ring material and the joints that the O-ring sealed, and lack of
proper communication between different levels of NASA management.
Instructor Guidelines
Prior to class discussion, ask the students to read the student handout outside of class. In class the details of the
case can be reviewed with the aide of the overheads. Reserve about half of the class period for an open
discussion of the issues. The issues covered in the student handout include the importance of an engineer's
responsibility to public welfare, the need for this responsibility to hold precedence over any other responsibilities
the engineer might have and the responsibilities of a manager/engineer. A final point is the fact that no matter how
far removed from the public an engineer may think she is, all of her actions have potential impact. Essay #6,
"Loyalty and Professional Rights" appended at the end of the case listings in this report will be found relevant for
instructors preparing to lead class discussion on this case. In addition, essays #1 through #4 appended at the end
of the cases in this report will have relevant background information for the instructor preparing to lead
classroom discussion. Their titles are, respectively: "Ethics and Professionalism in Engineering: Why the Interest in
Engineering Ethics?;" "Basic Concepts and Methods in Ethics," "Moral Concepts and Theories," and
"Engineering Design: Literature on Social Responsibility Versus Legal Liability."
Questions for Class Discussion
1. What could NASA management have done differently?
2. What, if anything, could their subordinates have done differently?
3. What should Roger Boisjoly have done differently (if anything)? In answering this question, keep in mind
that at his age, the prospect of finding a new job if he was fired was slim. He also had a family to support.
4. What do you (the students) see as your future engineering professional responsibilities in relation to both
being loyal to management and protecting the public welfare?
The Challenger Disaster Overheads
1. Organizations/People Involved
2. Key Dates
3. Space Shuttle Solid Rocket Boosters (SRB) Joints
4. Detail of SRB Field Joints
5. Ballooning Effect of Motor Casing
6. Key Issues
ORGANIZATIONS/PEOPLE INVOLV.
Engaging Youth Experiencing
Homelessness
Core Practices and Services
National Health Care for the Homeless Council
January 2016
DISCLAIMER
This project was supported by the Health Resources and Services Administration (HRSA) of the
U.S. Department of Health and Human Services (HHS) under grant number U30CS09746,
a National Training and Technical Assistance Cooperative Agreement for $1,625,741, with 0%
match from nongovernmental sources. This information or content and conclusions are those of
the author and should not be construed as the official position or policy of, nor should any
endorsements be inferred by HRSA, HHS or the U.S. Government.
All material in this document is in the public domain and may be used and reprinted without
special permission. Citation as to source, however, is appreciated.
Suggested citation: National Health Care for the Homeless Council (January 2016). Engaging
Youth Experiencing Homelessness: Core Practices & Services [Author: Juli Hishida, Project Manager.]
Nashville, TN: Available at: www.nhchc.org.
ACKNOWLEDGEMENTS
Special thanks are owed to the National Health Care for the Homeless Clinicians’ Network (CN)
Steering Committee, the CN Engaging Homeless Youth advisory work group, and the individual
clinicians, administrators, and consumers interviewed for this project. Without their willingness to
share valuable information about their organization and their experiences this publication would
not be possible. Additional thanks to Council staff members who reviewed and contributed to the
research process and this publication.
Engaging Homeless Youth Advisory Work Group Members:
Amy Grassette
Consumer Advisory Board Chair
Community Healthlink
Bella Christodoulou, LCSW
Social Worker
Tulane Drop-In Health Services
Brian Bickford, LMHC
Director of Primary Care and Homeless Svcs
Community Healthlink
Cicely Campbell, BS
Volunteer Coordinator
Tulane Drop-In Health Services
Debbian Fletcher-Blake, APRN, FNP
Assistant Executive Director, Clinic
Administrator
Care for the Homeless
Deborah McMillan, LSW
Assistant Vice President of Social Services
Public Health Management Corporation
Eowyn Rieke, MD, MPH
Physician
Outside In
Heather McIntosh, MS
Research Project Coordinator
University of Oklahoma School of
Community Medicine
Heidi Holland, M.Ed
Program Manager
The National LGBT Health Education
Center
Mark Fox, MD
Medical Director/ Associate Dean for
Community Health and Research
Development
Street Outreach Clinic/ University of
Oklahoma School of Community Medicine
Mollie Sullivan, LMHC
Licensed Mental Health Counselor
Health Care for the Homeless/ Mercy
Medical Center
Rachael Kenney, MA
Associate
Center for Social Innovation
Ric Munoz, JD
Assistant Clinical Professor of Social Work
University of Oklahoma School of Social
Work
Robin Scott, MD
Pediatrician
Community Health Center of South Bronx .
Engaging Families to Support Indigenous Students’ Numeracy Devel.docxbudabrooks46239
Engaging Families to Support Indigenous Students’ Numeracy Development
Abstract
Indigenous children are performing poorly in mathematical skills compared to their non-indigenous counterparts in the classroom. Reasons such as unequal education opportunities and socio-economic factors have been put forward by education scholars to justify this statement. This paper will look at some of the learning and teaching strategies that can be used in Australian education to help indigenous students in improving their numeracy skills. https://yourhomeworkaide.info/2021/06/02/briefly-describe-an-organization-with-which-you-are-familiar-describe-a-situati/ The teaching and learning skills will revolve around engaging the families, improving the relationship between home and school, and bridging the cultural gap. The parents, the community and the educators have crucial roles in implementing these learning and teaching strategies.
Introduction
Numeracy skills have been an issue in the academic endeavors of many students in Australia. More so the numeracy skills are relatively poor in indigenous students compared to non-indigenous; the achievement gap between indigenous and non-indigenous widen over time and there is worrying evidence that the size of gap in recent years has been increasing (Klenowski, 2009). Indigenous people have not been recognized in the constitution therefore they are living as immigrants in their own mother land; this means they have been sidelined in national development activities, such as education, making it difficult to close the achievement gap between them and non-indigenous people.
Many people use the word numeracy interchangeably with mathematical skills, even though related, numeracy is a broad field that involves mathematical skills, problem solving and communication skills. Numeracy goes beyond the learning process that is mainly employed in a school setting; numeracy involves the understanding of quantitative techniques that are used to communicate, solve problems, respond to issues and help in the day to day undertakings. It is almost next to impossible to achieve numeracy skills without literacy.
Indigenous students have poor numeracy skills that are as a result economic, policy and pedagogical issues. The high levels of truancy and low performance can be attributed to the economic challenges that indigenous students undergo. Educational policies have not been able to provide a level playing grounds for indigenous and non-indigenous children, there has been unequal opportunities in terms of financing, tutelage and the curriculum. All these issues can be solved by engaging the parents and communities in the decision making processes on education issues especially those regarding indigenous students. https://intellectualessay.com/2021/05/08/mgmt2021-business-law-legal-systems-in-the-caribbean/
Literature Review
Pre-schooling
In order to improve the numeracy achievement gap between non-indigenous and indigenous s.
Endocrine Attendance QuestionsWhat is hypopituitarism and how .docxbudabrooks46239
Endocrine Attendance Questions
What is hypopituitarism and how is it managed?
Compare and contrast the pathophysiology of Syndrome of Inappropriate Antidiuretic Hormone (SIADH) and Diabetes Insipidus (DI)
Discuss the pathophysiology of Graves disease and include signs and symptoms associated with this disorder.
Discuss the pathophysiology of congenital hypothyroidism and the therapeutic management
Discuss the therapeutic management of diabetic ketoacidosis (DKA)
.
ENG 130 Literature and Comp ENG 130 Research Essay E.docxbudabrooks46239
ENG 130: Literature and Comp
ENG 130: Research Essay
Essay ENG 130: Research Essay
This assignment focuses on your ability to: evaluate researched source materials to be
academic, valid, and reliable; to incorporate research fluidly into an essay format; to cite researched
information properly in APA format.
The purpose of completing this assignment is: learning how to research valid and reliable
sources is an important lifelong skill for school, career, and personal life. You will need to know how
to synthesize researched information and present it effectively. As a student of Post, please be sure
you use this assignment to solidify your mastery of APA text citations. Ask your instructor questions!
______________________________________________________________
Prompt (what you are writing about):
Who is August Wilson and how do his plays in The Pittsburgh Cycle—particularly Fences—
reflect the society in which they are set?
Instructions (How to get it done):
Research August Wilson, his life, The Pittsburgh Cycle of plays, and how they reflect the eras
in which the plays are set.
You must have at least four outside sources that are academic and reliable.
Create an essay that is 2 to 3 pages and relates the following information:
o August Wilson’s life and accomplishments
o The plays that are included in Wilson’s The Pittsburgh Cycle including brief summaries
each play.
o Research on the era and location in which Fences is set.
This is a research essay and not an argumentative essay.
Include direct quotes and paraphrases from your researched information
Be sure that you have in text citations and corresponding reference citations for all quoted
material, paraphrased material, and newly researched material.
Requirements:
Length and format: 2-3 pages.
The title page and reference page are also required, but they should not be factored into the
2-3 page length of the essay.
It should also be double spaced, written in Times New Roman, in 12 point font and with 1 inch
margins. Essay should conform to APA formatting and citation style.
Use the third-person, objective voice, avoiding personal pronouns such as “I,” “you,” “we,” etc.
Please use the above source and at least four outside sources to create a properly-formatted
APA reference page.
Use APA format for in-text citations and references when using outside sources and textual
evidence.
Please be cautious about plagiarism. Make sure to use in-text citations for direct quotes,
paraphrases, and new information.
Source: Fences by August Wilson (pages 1270-1331)
Research Essay Rubric
Does Not Meet
Expectations
0-11
Below
Expectations
12-13
Needs
Improvement
14-15
Satisfactory
16-17
Meets
Expectations
18-20
Organization Many details are
not in a logical or
expected order.
The paper does
not use
paragraphs.
Writing may have
little discernible
.
ENG 201 01 Summer I Presentation Assignment· Due , June 7, .docxbudabrooks46239
ENG 201 01 Summer I Presentation Assignment
· Due: , June 7, at 1:00 p.m. EST
· Length: 5-7 minutes
· Format: MLA or APA style (including in-text citations and list of Works Cited/References)
· Submit to: Moodle
· Prompt: Your presentation will focus on the author of your selected book. The goal of the presentation is to inform your audience about the author’s life and literary career. Here are some questions to consider:
What are their most important publications?
What awards have they won?
How have critics and the public received their work?
Has their work generated any controversy?
Who are their literary influences?
Incorporate multi-modal elements (handout, audio/visual clip, PowerPoint, etc.) in your presentation. It is imperative that you work on this assignment consistently throughout the term.
· When doing research to learn more about the author and text, be sure to use scholarly sources. There is information about distinguishing between scholarly and popular sources here:
http://www.library.vanderbilt.edu/peabody/tutorial_files/scholarlyfree/
. A good database to begin your research with is the Literary Reference Center Plus (access available through TU’s library website). Here is a link to the library’s website:
http://www.tiffin.edu/library/
.
·
Authors:
Al-Sanea, Rajaa (
Girls of Riyadh
)
.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. find his preferred
product, he may decide not to purchase or to purchase an
alternative product in the
offer set. The problem is to decide, at each state, which set of
products to make available
for sale. Since there are an exponential number of sets that can
be offered, we study
the structure of the optimization problem to define and
characterize efficient sets with
the purpose of reducing the dimensionality of the optimization
problem and to obtain
insights into the type of products, e.g., nested-by-fares, that
may be optimal to offer. We
provide a dynamic programming formulation for the revenue
management problem and
use fare and demand transformations to relate it to the
formulation of the independent
demand model. We present an upper bound on the value
function throughout the use
of approximate dynamic programming with affine functions. A
formulation that does
not allow fares to be opened once they are closed is also
presented. We then turn
our attention to static models, where the time element is
suppressed. We present an
optimal solution to the two fare problem and an efficient
heuristic for the multi-fare
case. Numerical examples show that the proposed heuristic
works almost as well as the
optimal solution for the restricted dynamic programming model
where fares cannot be
reopened once they are closed.
1
3. 1 Introduction
Suppliers of perishable capacity often offer a menu of products
that vary in terms of price and
quality. If the products differ only on price we would expect
most, if not all, customers to
buy the lowest priced product that gives him a positive surplus
and to walk away otherwise.
When differences in quality are also present, customers do not
always buy the lowest priced
product. As an example, a customer may be willing to pay an
extra $50 for a room with an
ocean view or $29 for advance seat selection and priority
boarding.
When the difference between products in menu is small, there is
a real likelihood that a
customer will buy a different product if his preferred product is
not available. This is known
as demand recapture. Demand that is lost because a product is
not offered is called spilled
demand. Under the independent demand model, all demand for
an unavailable product is
spilled. In contrast, under a discrete choice model, part of this
demand may be recaptured
by other available products. In the context of revenue
management, the independent demand
model results in low protection levels for higher fare classes as
it ignores demand recapture.
This causes higher spill rates among the higher fare classes and
leads to a downward spiral in
revenues as estimates of demands for high fare classes become
lower over time as explained in
Cooper, Homem de Mello and Kleywegt [4].
4. Revenue mangers have been struggling for decades with the
problem of finding optimal
control mechanisms for fare class structures with dependent
demands. Many attempts have
been made by research groups in industry to cope with this
problem. At the same time aca-
demic research has moved vigorously to tackle the problem of
capacity allocation under choice
models. A key difference between is how the notion of time is
handled. Practitioners tend to
prefer to model time implicitly, e.g., through static models that
are extensions of Littlewood’s
rule and EMSR type heuristics. However, finding the right way
to extend Littlewood’s rule
proved to be more difficult than anticipated. The key
complication is that the marginal value
of capacity is more difficult to compute due to the fact that
protecting an additional unit of
capacity for later sale also alters the number of potential
customers (as some of their demand
may be recaptured). Nevertheless, it is possible to overcome
this difficulty and find static
heuristic policies that are easy to implement and perform almost
as well as dynamic policies.
Academic researchers tend to prefer models where time is
handled explicitly. In contrast to
the independent demand formulations, where static models are
relatively easier to understand
and implement, the opposite seems to be true for dependent
demand models. Indeed, dynamic
formulations of the dependent demand model are only
marginally more complicated to set
up. The problem is a bit more difficult because it requires
specifying a choice model and
identifying the collection of “efficient” sets of products that
5. may be offered at different states
of the system. Once the efficient sets are identified, either
exactly or approximately, the
problem can be reformulated to be essentially equivalent to that
of the independent demand
model.
In this chapter we will explore both formulations. We start by
introducing discrete choice
models as a tool to model demand dependencies. After
introducing choice models and provid-
ing a variety of examples, we discuss the sales and revenue
rates associated with each set and
give a formal definition of efficient sets. Essentially efficient
sets maximize the revenue rate
2
among all convex combinations of sets whose sales rate is
bounded by the sales rate of the
efficient set. The notion of efficient sets helps simplify the the
dynamic programming formu-
lations so only efficient sets need to be considered. Structural
results are presented that are
useful both in terms of computations and in understanding
dynamic policies. In particular,
we relate the formulation to that of the independent demand
model and to dynamic pricing
with finite price menus. We then present an upper bound on
revenues, and a variant of the
dynamic model where fares cannot be opened once they are
closed. We end the chapter with
a discussion of static models that handle time implicitly. As the
reader will see, these models
6. are complicated by the fact that changing the protection level
also changes the number of
potential customers for higher fare classes.
2 Discrete Choice Models
We will assume that the set of potential products to be offered
is N = {1, . . . ,n}. For any
subset S ⊂ N, denote by πj(S) the probability that a customer
will select j ∈ S with πj(S) = 0
if j ∈ S′ = {j ∈ N : j /∈ S}. Let π(S) =
∑
j∈ S πj(S) denote the probability of sale when subset
S is offered. The complement π0(S) = 1−π(S) denotes the
probability that a customer selects
an outside alternative. An outside alternative may mean either
that the customer does not
purchase or that he purchases from another vendor. Let S+ =
S∪ {0} denote the set of offered
products together with the outside alternative. Then πS+ (S) =
π(S) + π0(S) = 1. Notice
that this notation implies that the no-purchase alternative j = 0
is always available. For this
reason, it would be more appropriate to write πj(S+) for j ∈ S+.
However, we follow here the
convention of writing πj(S) instead of the more cumbersome
πj(S+) with the understanding
that the no-purchase alternative j = 0 is always available. This
choice of notation makes it
easier to refer to the set S ⊂ N of offered products, but the
reader needs to remember that
implicitly the no-purchase alternative is always available to the
customer. We will describe a
few commonly used choice models, define efficient sets, and
7. then move on to the problem of
dynamic capacity allocation.
One reason to look at discrete choice models is to better
understand how customers make
choices. Another important reason for our purposes is to find a
subset of products that
maximizes the expected profit or expected revenues among all S
⊂ N.
2.1 The Independent Demand Model (IDM)
Under this model πj(S) is independent of the offer set S
(containing j). Under the IDM all
the demand for fare j is lost (to the no-purchase alternative) if j
is removed from S. This
implies that there are non-negative constants, say v0,vj,j ∈ N,
such that
πj(S) =
vj
v0 + V (N)
j ∈ S
where V (N) =
∑
j∈ N vj ( the constants can be normalized so that v0 + V (N) =
1). In most
practical situations, it is reasonable to expect that some of the
demand for fare j may be
3
8. recaptured by other products in S. The IDM is pessimistic in the
sense that it ignores recap-
ture. This may lead to incorrect decisions in the context it is
used. In Revenue Management
applications it usually leads to offering too much capacity at
discounted fares. In assortment
planning, it may lead to offering excessive product variety.
2.2 The Basic Attraction Model and the Multinomial Logit
Model
The Basic Attraction Model (BAM) is a discrete choice model
where each fare j ∈ N has an
attraction value vj > 0 and v0 > 0 represents the attractiveness
of the no-purchase alternative.
The choice model is given by
πj(S) =
vj
v0 + V (S)
∀ j ∈ S, (1)
where V (S) =
∑
j∈ S vj. Consequently, products with higher attraction values are
more likely
to be selected.
The BAM was first proposed by Luce [12] who postulated two
choice axioms and demon-
strated that a discrete choice model satisfies the axioms if and
only if it is of the BAM form.
To adequately describe the Luce Axioms we need additional
9. notation. For any S ⊂ T we let
πS(T) =
∑
j∈ S πj(T) denote the probability that a customer selects a
product in S when the
set T is offered. Also, πS+ (T) = πS(T) + π0(T) = 1 −πT−S(T),
where set differences T −S
mean T ∩S′. The Luce Axioms can be written as:
• Axiom 1: If πi({i}) ∈ (0, 1) for all i ∈ T, then for any R ⊂ S+,
S ⊂ T
πR(T) = πR(S)πS+ (T).
• Axiom 2: If πi({i}) = 0 for some i ∈ T, then for any S ⊂ T
such that i ∈ S
πS(T) = πS−{i}(T −{i}).
Axiom 1 implies that the probability of selecting any set R ⊂
S+, when set T is offered, is
equal to the probability of selecting R when S is offered times
the probability of selecting S+
when T is offered assuming that S ⊂ T. Axiom 2 implies that if
alternative i has no probability
of being chosen, then it can be deleted from S without affecting
the choice probabilities (Luce
[13]).
The celebrated multinomial logit (MNL) model, see McFadden
[16], is a special case of
the BAM that arises from a random utility model. Under a
random utility model, each
product has random utility Ui, i ∈ N+ and the probability that j
10. ∈ S is selected is given
by πj(S) = P(Uj ≥ Ui, i ∈ S+). In words, product j ∈ S is
selected if it gives as much
utility as any other product in S+. More specifically, McFadden
models the random utility of
product i, as Ui = µi + �i, where µi is the mean utility of
product i and depends on the price
and quality of product i. The term �i is modeled as an extreme
value distribution known as
a Gumbel random variable with parameter φ. The �is are
assumed to be independent and
4
identically distributed. We can think of �i as an idiosyncratic
variation on the mean utility
or as errors in measuring the utility. Under these assumptions,
πj(S) is of the BAM form
with vi = e
φµi, i ∈ N. The parameter φ is inversely related to the variance
of the �js. As
φ becomes large, the variance of the �js, becomes small, and
customers will gravitate to the
product in S with the largest mean utility µi (what is known as
the maximum utility model).
On the other hand, when φ becomes small the probability of
selecting any i ∈ S converges
to a uniform distribution where each product is equally likely to
be selected. This is because
when the variance is much larger than the mean, the customer
loses the ability to reliability
select products with higher mean utility.
11. 2.3 The Generalized Attraction Model
There is considerable empirical evidence that the basic
attraction model (BAM) may be too
optimistic in estimating demand recapture probabilities when
the customer’s first choice is
not part of the offer set S. The BAM assumes that even if a
customer prefers j ∈ S′, he must
select among k ∈ S+. This ignores the possibility that the
customer may look for products
j ∈ S′ elsewhere or at a later time. As an example, suppose that
a customer prefers a certain
wine, and the store does not have it. The customer may then
either buy one of the wines
in the store, go home without purchasing, or drive to another
store and look for the specific
wine he wants. The BAM precludes the last possibility; it
implicitly assumes that the search
cost for an alternative source of product j ∈ S′ is infinity, or
equivalently that there is no
competition.
As an illustration, suppose that the consideration set is N = {1,
2} and that v0 = v1 =
v2 = 1, so πk({1, 2}) = 33.3̄% for k = 0, 1, 2. Under the BAM,
eliminating choice 2 results in
πk({1}) = 50% for k = 0, 1. Suppose, however, that product 2 is
available across town and
that the customer’s attraction for product 2 from the alternative
source is w2 = 0.5 ∈ [0,v2].
Then his choice set, when product 2 is not offered, is in reality
S = {1, 2′} with 2′ representing
product 2 in the alternative location with shadow attraction w2.
A customer who arrives to
the store has attractiveness v0 = v1 = 1 and w2 = 0.5, resulting
in
12. π0({1}) =
1.5
2.5
= 60%, π1({1}) =
1
2.5
= 40%.
This formulation may also help mitigate the optimism of the
BAM in inter-temporal models
where a choice j ∈ S′ may become available at a later time. In
this case w2 is the shadow
attraction of choice 2 discounted by time and the risk that it
may not be available in the
future.
To formally define the general attraction model (GAM),
introduced by Gallego, Ratliff
and Shebalov [9], we assume that in addition to the attraction
values vk,k ∈ N = {1, . . . ,n},
there are shadow attraction values wk ∈ [0,vk],k ∈ N such that
for any subset S ⊂ N
πj(S) =
vj
v0 + W(S′) + V (S)
j ∈ S, (2)
5
13. where W(R) =
∑
j∈ R wj for all R ⊂ N. For the GAM,
π0(S) =
v0 + W(S
′)
v0 + W(S′) + V (S)
is the probability of the no-purchase alternative. The case wk =
0,k ∈ N recovers the BAM,
while the case wk = vk,k ∈ N recovers the independent demand
model (IDM). As with the
BAM it is possible to normalize the parameters so that v0 = 1
when v0 > 0. The parsimonious
GAM (p-GAM) is given by wj = θvj ∀ j ∈ N for some θ ∈ [0,
1]. The p-GAM can serve to test
the competitiveness of the market, by testing the hypothesis H0
: θ = 0 or H0 : θ = 1 against
obvious alternatives to determine whether one is better off
deviating, respectively, from either
the BAM or the IDM.
There is an alternative, perhaps simpler, way of presenting the
GAM by using the following
transformation: ṽ0 = v0 + w(N) and ṽk = vk −wk,k ∈ N. For S
∈ N, let Ṽ (S) =
∑
j∈S ṽj.
With this notation the GAM becomes:
14. πj(S) =
vj
ṽ0 + Ṽ (S)
∀ j ∈ S and π0(S) = 1 −π(S). (3)
For S ⊂ T we will use the notation πS+ (T) =
∑
j∈ S+ πj(T).
Gallego, Ratliff and Shebalov [9] proposed the following
generalization to the Luce Axioms:
• Axiom 1’: If πi({i}) ∈ (0, 1) for all i ∈ T, then for any non-
negative R ⊂ S ⊂ T
πR(T)
πR(S)
= 1 −
∑
j∈ T−S
(1 −θj)πj(T)
for some set of values θj ∈ [0, 1],j ∈ N.
• Axiom 2: If πi({i}) = 0 for some i ∈ T, then for any S ⊂ T
such that i ∈ S
πS(T) = πS−{i}(T −{i}).
They call the set of Axioms 1’ and 2 the Generalized Luce
Axioms (GLA). The special
case θj = 0 for all j recovers the original Luce Axiom 1,
15. resulting in the BAM, while the
case θj = 1 for all j reduces to the IDM. Gallego et al [9]
establish the following connection
between the GLA and the GAM. The proof of Theorem 1 can be
found in the Appendix.
Theorem 1 A Discrete Choice Model satisfies the GLA if and
only if is of the GAM form.
We will now show that the GAM also arises as the limit of the
nested logit (NL) model.
The NL model was originally proposed in Domencich and
McFadden (1975) [5], and later
refined in McFadden(1978) [15], where it is shown that it
belongs to the class of Generalized
Extreme Value (GEV) family of models. Under the nested
choice model, customers first select
a nest and then an offering within the nest. The nests may
correspond to product categories
6
and the offerings within a nest may correspond to different
variants of the product category.
As an example, the product categories may be the different
modes of transportation (car vs.
bus) and the variants may be the different alternatives for each
mode of transportation (e.g.,
the blue and the red buses). As an alternative, a product
category may consist of a single
product, and the variants may be different offerings of the same
product by different vendors.
We are interested in the case where the random utility of the
different variants of a product
16. category are highly correlated. The NL model, allows for
correlations for variants in nest i
through the dissimilarity parameter γi. Indeed, if ρi is the
correlation between the random
utilities of nest i offerings, then γi =
√
1 −ρi is the dissimilarity parameter for the nest. The
case γi = 1 corresponds to uncorrelated products, and to a BAM.
The MNL is the special
case where the idiosyncratic part of the utilities are independent
and identically distributed
Gumbel random variables.
Consider now a NL model where the nests corresponds to
individual products offered in
the market. Customers first select a product, and then one of the
vendors offering the selected
product. Let Ok be the set of vendors offering product k, Sl be
the set of products offered
by vendor l, and vkl be the attraction value of product k offered
by vendor l. Under the NL
model, the probability that a customer selects product i ∈ Sj is
given by
πi(Sj) =
(∑
l∈ Oi v
1/γi
il
)γi
v0 +
17. ∑
k
(∑
l∈ Ok v
1/γk
kl
)γk v
1/γi
ij∑
l∈ Oi v
1/γi
il
, (4)
where the first term is the probability that product i is selected
and the second term the
probability that vendor j is selected. Many authors, e.g.,
[Greene(1984)], use what is know
as the non-normalized nested models where vijs are not raised
to the power 1/γi. This is
sometimes done for convenience by simply redefining vkl ← v
1/γk
kl . There is no danger in using
this transformation as long as the γs are fixed. However, the
normalized model presented here
is consistent with random utility models, see [Train(2002)], and
we use the explicit formulation
because we will be taking limits as the γs go to zero.
18. It is easy to see that πi(Sj) is a BAM for each j, when γi = 1 for
all i. This case can be
viewed as a random utility model, where an independent
Gumbel random variable is associated
with each product and each vendor. Consider now the case
where γi ↓ 0 for all i. At γi = 0, the
random utilities of the different offerings of product i are
perfectly and positively correlated.
This makes sense when the products are identical and price and
location are the only things
differentiating vendors. When these differences are captured by
the deterministic part of the
utility, then a single Gumbel random variable is associated with
each product. In the limit,
customers select among available products and then buy from
the most attractive vendor. If
several vendors offer the same attraction value, then customers
select randomly among such
vendors. The next result shows that a GAM arises for each
vendor, as γi ↓ 0 for all i.
Theorem 2 The limit of (4) as γl ↓ 0 for all l is a GAM. More
precisely, there are attraction
values akj, ãkj ∈ [0,akj], and ã0j ≥ 0, such that
πi(Sj) =
aij
ã0j +
∑
k∈Sj ãkj
∀ i ∈ Sj ∀ j.
7
19. This shows that if customers first select the product and then
the vendor, then the NL
choice model becomes a GAM for each vendor as the
dissimilarity parameters are driven down
to zero. The proof of this result is in the Appendix. Theorem 2
justifies using a GAM when
some or all of the products offered by a vendor are also offered
by other vendors, and customers
have a good idea of the price and convenience of buying from
different vendors. The model
may also be a reasonable approximation when products in a nest
are close substitutes, e.g.,
when the correlations are high but not equal to one. Although
we have cast the justification
as a model that arises from external competition, the GAM also
arises as the limit of a NL
model where a firm has multiple versions of products in a nest.
At the limit, customers go
for the product with the highest attraction within each nest.
Removing the product with the
highest attraction from a nest shifts part of the demand to the
product with the second highest
attraction , and part to the no-purchase alternative.
Consequently a GAM of this form can
be used in Revenue Management to model buy up behavior
when there are no fences, and
customers either buy the lowest available fare for each product
or do not purchase.
2.4 Mixtures of BAMs
It can be shown that any discrete choice model that arrises from
a random utility model can
20. be approximated to any degree of accuracy by a mixture of
BAMs, see McFadden and Train
(2000) [17]. Unfortunately, as we will later see, the mixture of
logits model leads to difficulties
in optimization when used in RM or assortment planning.
2.5 Markov Driven Discrete Choice Models
Blanchet, Gallego and Goyal (2013), see [2], consider a Markov
Driven Discrete Choice Model
(MDDCM) that is characterized by the probability distribution
qi = πi(N), i ∈ N+ and by a
product substitution matrix Q = (qij), i,j ∈ N+. The vector q of
probabilities (known as first
choice probabilities) corresponding to the choice distribution
that arises when all the products
are available. The substitution probability qij is the probability
that a customer whose first
choice demand is i will substitute to product j when i is
unavailable, with qii = 0 for i 6= 0.
For i 6= 0, qi0 representing the probability that the customer
substitutes i for the no-purchase
alternative. We define q0i = 0 for all i 6= 0 and q00 = 1 as there
is no substitution from the
no-purchase alternative. Mathematically, we can define the
substitution matrix for i,j ∈ N,
i 6= j, via the equation qij = (πj(N − i) − qj)/qi, where N − i = {j
∈ N : j 6= i}. Notice that
qij is the rate at which customers substitute to j when the find i
unavailable. A discrete choice
model arises under the Markovian assumption that if j is also
unavailable, then the customer
(who originally preferred i) will now substitute according to qjk
for k 6= j. As we will explain
later, it is relatively easy to compute the sales rate π(S) and the
revenue rate r(S) associated
21. with any subset S ⊂ N. Moreover, it is also easy to find the
assortment that maximizes r(S).
One advantage of the MDDCM is that it is very easy to do
assortment planning and RM
optimization with it. Also, the MDDCM can be used to
accurately approximate the behavior
of a mixture of BAMs. This approximation, together with the
ease of optimization, allows for
efficient heuristics for RM and assortment planning for the
mixture of BAMs.
8
2.6 Revenues and Efficient Assortments
We assume without loss of generality that the products are
labeled so that their associated
fares are decreasing1 in j. More precisely, the fares are given by
p1 ≥ p2 ≥ . . . ≥ pn. For any
subset S ⊂ N, let r(S) =
∑
k∈ S pkπk(S) denote the expected revenue when set S is offered.
We will now present a number of examples, and for each
example, we will look into the
collection (π(S),r(S)),S ⊂ N, representing the sales probability
and the expected revenue
from offering set S ⊂ N. Certain of these sets will be special
and play an important role in
revenue management.
Example 1. (BAM) Assume that customers have linear
sensitivities to price and quality:
22. βp = −1 and βq = 1000. Then a product with price p and quality
q has mean utility
µ = βpp + βqq = −p + 1000q. If φ = .01 then the attractiveness
of the product is v =
exp(.01(−p + 1000q)). Table 1 shows the price and quality of
three different products as well
as µ and v. Table 2 shows the sale probability π(S) and the
expected revenue r(S) of all
the eight subsets, in increasing order of π(S) assuming that v0 =
0. Some subsets in Table 2
are in bold and correspond to the efficient sets: E0 = ∅ , E1 =
{1} and E2 = {1, 2}. We
will later give a precise definition of efficiency but roughly
speaking the efficient sets can be
graphically represented as those that lie in the least, increasing
concave majorant of the graph
(π(S),r(S)),S ⊂ N as can be seen in Figure 1, where a graph of
the (π(S),r(S)) in increasing
order of π(S) as well as the upper concave majorant that goes
through the efficient sets.
(p1,q1) (p2,q2) (p3,q3)
(1000, 1) (850, 0.9) (650, 0.5)
(µ1,v1) (µ2,v2) (µ3,v3)
(0, 1.0) (50, 1.65) (−150, 0.22)
Table 1: Parameters of MNL model with βp = −1, βq = 1000 and
v0 = 1
S π(S) r(S)
∅ 0% $0.00
{3} 18% $118.58
{1} 50% $500.00
{1,3} 55% $515.06
{2} 62% $529.09
{2,3} 65% $538.48
23. {1,2} 73% $658.15
{1,2,3} 74% $657.68
Table 2: Sets, Sale Rates and Revenue Rates (Efficient Sets are
in Bold)
Example 2. (GAM) We reconsider Example 1 with w1 = 0, w2 =
0.5 and w3 = 0.2. This
means that there are negative externalities associated with not
offering products 2 and 3. The
sales rates and revenue rates are given by Table 3 and also in
Figure 2. The efficient sets are
now E0 = ∅ and Ei = Si = {1, . . . , i} for i = 1, 2, 3. It is
interesting to contrast Tables 2
1We will use increasing and decreasing in the weak sense unless
noted otherwise.
9
$0.00
$100.00
$200.00
$300.00
$400.00
25. Rate
Revenue
Efficient
Fron<er
Figure 1: Example 1: The inefficient sets are the diamonds
below the curve
and 3. For the BAM of Table 2 offering set S2 = {1, 2} results
in revenue r(S2) = $658.15.
However offering S2 = {1, 2} in Example 2 results in a
significant reduction of revenue since
more of the demand from Product 3 is lost under the GAM than
under the BAM. Notice that
offering set S3 = {1, 2, 3} hurts revenues, relative to offering
set S2, under the BAM but helps
under the GAM. This is because under the BAM the incremental
revenue from adding fare 3
to set S2 is smaller than the loss from demand cannibalization.
In contrast, under the GAM,
the incremental revenue from adding fare 3 to set S2 is larger
than the loss from demand
cannibalization.
S π(S) r(S)
∅ 0% $0.00
{3} 13% $84.17
{1} 37% $370.37
{1,3} 45% $420.48
{2} 58% $491.94
{2,3} 65% $538.48
{1,2} 69% $623.95
{1,2,3} 74% $657.68
26. Table 3: Sets, Sale Rates and Revenue Rates (Efficient Sets are
in Bold)
Figure 1 shows a graph of the (π(S),r(S)) in increasing order of
π(S) as well as the efficient
frontier (upper concave majorant that goes through the efficient
sets).
Example 3. (Mixtures of BAMs) Consider the following mixture
of BAMs with three products
and two customer classes taken from Rusmevichientong,
Shmoys and Topaloglu [18]. The fares
are p1 = 80,p2 = 40 and p3 = 30. An arriving customer may
follow one of two BAMs, each
with probability 0.5. BAM-1 has attractiveness (1, 5, 20, 1),
respectively, for the no-purchase
alternative and for the three products. BAM-2 has attractiveness
(5, 1, 50, 50), respectively,
for the no-purchase alternative and for the three products. Let
πi(S) and ri(S) denote,
respectively, the sales probability and the expected revenue
associated with BAM-i, for i =
1, 2. Given any offer set S, let π(S) = 0.5π1(S) + 0.5π2(S) be
the probability of sale for the
10
$-‐
29. mixture of the two BAMs and r(S) = 0.5r1(S) + 0.5r2(S) be the
expected revenue for the
mixture of the two BAMs. Table 4 shows (S,π(S),r(S)) for all S
⊂{1, 2, 3}. Notice that the
efficient sets are E0 = ∅ , E1 = {1} and E2 = {1, 3}. Figure 3
shows a graph of the (π(S),r(S))
in increasing order of π(S) as well as the efficient frontier.
S π(S) r(S)
∅ 0% $0.00
{1} 50% $40.00
{3} 70% $21.14
{1,3} 88% $44.82
{2} 93% $37.23
{1,2} 94% $41.65
{2,3} 95% $35.53
{1,2,3} 96% $39.66
Table 4: Sets, Sale Rates and Revenue Rates for Example 3
Here is another example of a mixture of BAMs where the
efficient sets are not nested.
Example 4. (Mixtures of BAMs) Consider the following mixture
with four products and
three customer classes. The fares are p1 = 11.50, p2 = 11.00, p3
= 10.80 and p4 = 10.75. The
attractiveness of the BAMs are, respectively, (1, 5, 2, 300, 1),
(1, 6, 4, 300, 1) and (1, 0, 1, 300, 7),
with the first component representing the attractiveness of the
no-purchase alternative. An
arriving customer has 1/6 probability of belonging to market
segment 1, 1/3 probability to
30. market segment 2 and 1/2 probability of belonging to market
segment 3. Table 5 lists the
efficient sets and the corresponding sales and revenue rates. The
efficient sets are E0 = ∅ ,
E1 = {1}, E2 = {1, 2}, E3 = {1, 4}, E4 = {1, 2, 4} and E5 = {1,
2, 3}. Notice that E3 does
not contain E2 and E5 does not contain E4. Moreover, this is an
instance where the number
of efficient sets m = 5 > n = 4.
11
$-‐
$5.00
$10.00
$15.00
$20.00
33. Table 5: Sets, Sale Rates and Revenue Rates for Example 4
3 Efficient Sets and Assortment Optimization
In this section we formally define efficient sets and show that
for certain choice models the
efficient sets have desirable properties such as being nested or
nested by fares. We also look
at assortment optimization, which is essentially the problem of
finding the assortment S ⊂ N
with highest revenue r(S). The reader not interested in the
technical details may skip this
section on first reading.
For any ρ ∈ [0, 1] consider the linear program
R(ρ) = max
∑
S⊂N
r(S)t(S) (5)
subject to
∑
S⊂N
π(S)t(S) ≤ ρ
∑
S⊂N
t(S) = 1
t(S) ≥ 0 ∀ S ⊂ N.
The linear program selects a convex combination of all possible
actions (subsets of N) to
34. maximize the expected revenue that can be obtained subject to
the bound ρ on the probability
of sale. Later we will see that ΛR(c/Λ) is an upper bound on the
expected revenue when we
12
expect Λ customers to arrive and the capacity is c. Thus the
ratio of capacity to potential
demand c/Λ will play the role of ρ.
The decision variables in the linear program (5) are the
proportion of time t(S) ≥ 0 that
each subset S ⊂ N is offered for sale. The following results
follow from the standard theory
of parametric linear programming.
Proposition 1 R(ρ) is increasing, concave, and piece-wise linear.
We can trace the efficient frontier (ρ,R(ρ)), 0 ≤ ρ ≤ 1, by
solving the linear program (5)
parametrically (perhaps using the dual formulation and column
generation), for all 0 ≤ ρ ≤ 1.
In some cases the column generation step may be NP-hard, but
for now we will assume that
it is possible to solve the problem for all ρ ∈ [0, 1]. Sets S ⊂ N
such that r(S) < R(π(S)) are
said to be inefficient as the lie below the efficient frontier
(ρ,R(ρ)) at ρ = π(S). Sets S such
that R(π(S)) = r(S) are said to be efficient as the pair (π(S),r(S))
lies in the efficient frontier
at ρ = π(S). Equivalently, a set S is efficient if t(S) = 1 is an
optimal solution to the linear
program for ρ = π(S), as then R(ρ) = r(S). For any choice model,
35. let C = {E0,E1, . . . ,Em}
be the collection of efficient sets. Let πj = π(Ej) and rj = r(Ej)
for all j ∈ M = {0, 1, . . . ,m}.
We will assume from now on that the efficient sets are sorted in
increasing order of πj,j ∈ M.
Let uj = (rj − rj−1)/(πj −πj−1) be the slope joining (πj−1,rj−1)
and (πj,rj). Because R(ρ)
is increasing concave and linear between the points (πj,rj), it
follows that u1 > u2 > ... >
um ≥ 0, and that
R(ρ) = rj−1 + uj(ρ−πj−1) ∀ ρ ∈ [πj−1,πj] ∀ j = 1, 2, . . . ,m.
Notice also that R(ρ) = R(πm) = rm for all ρ > πm, so the
definition of R(ρ) can be extended
to all ρ ≥ 0.The upper concave envelopes of Figures 1, 2 and 3
are all of these form.
When Ej−1 ⊂ Ej, then uj is the marginal contribution to revenue
of the fare or fares added
to Ej−1 to form Ej. It is possible to show, through dual
feasibility, that Ej+1 is a maximizer
of the ratio (r(S) − rj)/(π(S) −πj) over all sets S such that π(S) >
πj if the resulting ratio
is non-negative (otherwise Ej = Em is the last efficient set).
Let us reconsider the choice models of the previous section to
look more closely into the
efficient sets. For Example 1, the efficient sets are E0 = ∅ , E1 =
{1} and E2 = {1, 2}. For
Example 2, the efficient sets are E0 = ∅ , E1 = {1}, E2 = {1, 2}
and E3 = {1, 2, 3}, while for
Example 3, the efficient sets are E0 = ∅ , E1 = {1} and E2 = {1,
3}. Notice that in these
examples the efficient sets are nested, and in Examples 1 and 2
the efficient sets are also
36. nested-by-fare. In Example 3, the efficient sets are not nested-
by fare since the efficient set
E2 = {1, 3} skips product 2 with p2 > p3. Notice that the
number of efficient sets is at most
n in Examples 1,2 and 3. In contrast, the efficient sets of
Example 4 are E0 = ∅ , E1 = {1},
E2 = {1, 2}, E3 = {1, 4}, E4 = {1, 2, 4} and E5 = {1, 2, 3}, so
the efficient sets are not nested
and the number of efficient sets is greater than n.
Talluri and van Ryzin [19], who first identified efficient sets for
discrete choice models, used
a slightly different definition. Under their definition, a set S is
inefficient, if it is possible to
form a convex combination of other sets that result in a strictly
higher revenue with the same
sale probability or if it is possible to form a convex
combination of other sets that results in
13
a strictly lower sale probability but the same revenue. They
define efficient sets as those that
are not inefficient. The two definitions are essentially
equivalent, although it is possible for
our definition to include sets that would be deemed inefficient
by the definition in [19]. As an
example, suppose that rm = rm−1 with πm > πm−1. Then
(πm,rm) is in the efficient frontier,
but it is deemed inefficient by [19], because the same revenue
rm−1 = rm can be obtained
with a lower sale probability. This is an innocuous subtlety,
because in this case the efficient
set Em will not be selected by an optimization algorithm unless
37. we specify that we want to
provide better customer service without sacrificing revenue.
The following result is key in simplifying the optimization
problem resulting from the
dynamic programs in the next section. In essence it reduces the
optimization from 2n subsets
S ⊂ N to just m, the number of efficient sets.
Theorem 3 For any z ≥ 0,
max
S⊂N
[r(S) −zπ(S)] = max
S∈ C
[r(S) −zπ(S)] = max
j∈ M
[rj −zπj].
Proof: It is enough to show that any maximizer of [r(S)−zπ(S)]
must be efficient. Suppose
for a contradiction that r(T) − zπ(T) > r(S) − zπ(S) for all S 6=
T ⊂ N and that T is
not an efficient set. Then there exist a set of non-negative
weights t(S) : S ⊂ N such
that R(π(T)) =
∑
S⊂N t(S)r(S) > r(T) with
∑
S⊂N t(S) = 1 and
38. ∑
S⊂N t(S)π(S) ≤ π(T).
Consequently,
r(T) −zπ(T) < R(π(T)) −zπ(T) ≤
∑
S⊂N
[r(S) −zπ(S)]t(S) < r(T) −zπ(T),
where the first inequality follows from the inefficiency of T, the
second from
∑
S⊂N t(S)π(S) ≤
π(T) and the third from the claimed optimality of T and the fact
that t(T) < 1 as T is not
efficient. Since the displayed equation is a contradiction, it
must be that T is efficient, and
consequently we can restrict the maximization to C resulting in
maxS∈ C[r(S) − zπ(S)] =
maxj∈ M [rj −zπj].
Theorem 3 tell us that to find the best set to offer when the
marginal cost is z, we should
search for an efficient set with the largest value of rj − zπj. Now
rj − zπj > rj−1 − zπj−1 if
and only if z < uj, where uj is the slope joining (πj−1,rj−1) and
(πj,rj). From Proposition 1
the uj’s are non-negative and decreasing in j = 1, . . . ,m. To
visualize this graphically, draw
the efficient points (πj,rj),j ∈ M and a line with slope z ≥ 0
from the origin. An optimal
solution is to select the efficient set with index
39. j(z) = max{j ∈ M : uj > z}.
From this it is clear that j(z) < m for all z ≥ 0 whenever rm =
rm−1, because um = 0 ≤ z.
This shows that it is indeed innocuous to use our more liberal
definition of efficient sets,
which is more consistent with the definition of efficiency used
in portfolio theory in Finance.
However, if z = 0, we may want to offer Em instead of Em−1
when the slope um = 0. This is
because more customers are served by offering Em resulting in
the same revenue as Em−1. To
do this, we just modify the definition of j(z) to j(z) = max{j ∈
M : uj ≥ z}.
14
Consider the linear program
RC(ρ) = max
∑
j∈ M
rjtj
subject to
∑
j∈ M
πjtj ≤ ρ
∑
j∈ M
tj = 1
40. tj ≥ 0 ∀ j ∈ M.
Clearly RC(ρ) ≤ R(ρ) for all ρ ∈ [0, 1] as the linear program
RC(ρ) is more restricted. The
next result shows that in fact RC(ρ) = R(ρ) so the optimization
problem can be reduces to
the collection C of efficient sets.
Theorem 4 RC(ρ) = R(ρ) for all ρ ∈ [0, 1].
Proof: Consider the dual of the linear program defining R(ρ) in
terms of variables z and β.
The problem is to minimize ρz +β subject to π(S)z +β ≥ r(S),
∀ S ⊂ N, z ≥ 0. The solution
in terms of β is to set β = maxS⊂N [r(S) − zπ(S)]. By Theorem
3, β = maxj∈ M [rj − zπj], so
the dual problem is reduced to minimizing ρz + β subject to πjz
+ β ≥ rj,j ∈ M. The result
follows by recognizing that this is the dual of the liner program
defining RC(ρ).
3.1 Nested-by-Fare Efficient Sets
A choice model is said to have the nested-by-fare property if p1
> p2 > .. . > pn and the
collection of efficient sets C is contained in the collection
{S0,S1, . . . ,Sn} where S0 = ∅ and
Sj = {1, . . . ,j} for j = 1, . . . ,n. The next theorem, due to
Talluri and van Ryzin [19],
provides necessary and sufficient conditions for the nested-by-
fare property to hold. This
result is important because it justifies in some important cases
the optimality of the nested-
by-fare structure and because it reduces the number of efficient
fares to at most n. The
41. theorem requires the following simple idea that compares the
revenue performance of two
n-dimensional vectors x and y with the same sums x[1,n] =
y[1,n] = ρ, where we use the
notation x[1, i] =
∑i
j=1 xj. It turns out that if the partial sums of x dominate the
partial
sums of y, then p′x ≥ p′y for all vectors p with decreasing
components. More precisely, if
x[1, i] ≥ y[1, i] for all i = 1, . . . ,n − 1, and p1 ≥ p2 ≥ . . . ≥ pn,
then
∑n
i=1 pixi ≥
∑n
i=1 piyi.
This idea is related to the powerful concept of majorization
popularized by Marshal and Olkin
[14]. Here we will use it to compare the revenues associated
with the sale probability vector
yi = πi(T), i = 1, . . . ,n induced by a set T ⊂ N to the sales
induced by a convex combination of
the nested sets S0,S1, . . . ,Sn. More precisely, consider a
convex combination α0,α1, . . . ,αn of
non-negative values adding to one such that
∑n
k=0 αkπ(Sk) = π(T) and let xi =
∑n
k=0 αkπi(Sk)
42. be the sale of product i induced by this combination. Then x[1,
i] ≥ y[1, i] i = 1, . . . ,n − 1
and x[1,n] = y[1,n] imply that the revenue from the convex
combination will dominate the
revenue under set T.
15
Theorem 5 (Taluri and van Ryzin [19])A choice model has the
nested-by-fare order property
if and only if π(S) is increasing in S, and for every subset T
there is a convex combination
of π(S0),π(S1), . . . ,π(Sn) with partial sums of sales that
dominate the partial sums of sales
under T with total sales equal to total sales under T .
When such a convex combination exists, it favors sales at
higher fares and thus results in
higher expected revenues. Talluri and van Ryzin [19] show that
the conditions of Theorem 5
are satisfied by the MNL and the independent demand model.
Here we show that the nested-
by-fare property holds more generally by showing that it holds
for the parsimonious GAM
model (P-GAM) with wi = θvi for all i ∈ N for some θ ∈ [0, 1].
This model reduces to the
BAM when θ = 0 and to the IDM when θ = 1. The proof of this
result is in the Appendix.
Proposition 2 The efficient sets are nested-by-fares for the P-
GAM.
While Theorem 5 assures us that C ⊂ {S0,S1, . . . ,Sn}, the
43. converse does not necessarily
hold as there may be some sets in the collection C that are not
efficient.
Proposition 3 Consider the P-GAM for a system with strictly
decreasing fares p1 > p2 >
... > pn. Then a necessary and sufficient condition for all nested
sets to be efficient is
pn ≥ (1 −θ)r(Sn−1).
Proof: Consider the plot (π(Sj),r(Sj)),j = 0, . . . ,n. For the P-
GAM model we can write
r(Sj) as a convex combination of r(Sj−1) and pj/(1−θ) of the
form r(Sj) = αjr(Sj−1) + (1−
αj)pj/(1 −θ), where αj = (ṽ0 + Ṽ (Sj−1))/(ṽ0 + Ṽ (Sj)).
Consequently r(Sj) ≥ r(Sj−1) if and
only if pj ≥ (1 − θ)r(Sj−1). Suppose now that pn ≥ (1 −
θ)r(Sn−1). We will first show that
the plot is increasing, or equivalently that pj ≥ (1 − θ)r(Sj−1)
for all j. Suppose that there
is a j such that pj < (1 − θ)r(Sj−1). Then pj/(1 − θ) < r(Sj) <
r(Sj−1) and consequently
pj+1 < pj < (1 −θ)r(Sj). We can then repeat the argument to
show that pk < (1 −θ)r(Sk−1)
for all k ≥ j, but for k = n, this contradicts pn ≥ (1 −θ)r(Sn−1).
Now, π(Sj) = αjπ(Sj−1) + (1−αj)/(1−θ). This allow us to write
the marginal revenue as
uj =
r(Sj) − r(Sj−1)
π(Sj) −π(Sj−1)
=
pj − (1 −θ)r(Sj−1)
1 − (1 −θ)π(Sj−1)
44. (6)
To establish concavity, it is enough to show that uj is
decreasing in j. By using the known
convex combinations of r(Sj) and of π(Sj) we see that
uj+1 = uj −
pj −pj+1
αj(1 −πj−1)
< uj
where the inequality follows from pj > pj+1.
16
For the BAM, Proposition 3 implies that all nested sets are
efficient as long as pn ≥ r(Sn−1).
At the other extreme, for the IDM all nested sets are efficient as
long as pn ≥ 0. Another
consequence is that for the P-GAM, the efficient sets are S0,S1,
. . . ,Sj∗ where
j∗ = max{j ∈ N : pj ≥ (1 −θ)r(Sj−1)}.
All fares pj,j > j
∗ are inefficient and need not be considered.
3.2 Assortment Optimization under the MDDCM
Suppose we want to an offer set S that maximizes r(S) − zπ(S)
over all S ⊂ N, where the
choice model is the MDDCM characterized by (q,Q). This
45. Markovian assumption greatly
simplifies the optimization problem and allows the use of
successive approximations to find
the optimal revenues and the optimal offer set under the
Markovian assumption. Indeed, let
g0i = pi − z for i = 1, . . . ,n, where for convenience we define
g00 = p0 = 0. Now consider
the successive approximation scheme gk+1 = max(Qgk,p),
where now p is the vector of fares
with p0 = 0. Blanchet, Gallego and Goyal [2] show that g
k is monotonically increasing and
converges to a vector g. The vector g represents the maximum
revenue that can be obtained
from each customer request under the Markov Chain discrete
choice model. Blanchet, Gallego
and Goyal [2] show that under the Markovian assumption an
optimal offer set is is given by
S = {i : gi = g0i}, and that q′g = r(S) −zπ(S). This method can
be used to identify efficient
sets by solving the problem for all z ≥ 0, resulting in Ej,j ∈ M.
The method can be used as
a heuristic to approximately compute the collection of efficient
sets for discrete choice models,
such as the mixture of BAMs, for which the optimization is NP-
hard.
4 Dynamic Capacity Allocation Models
In this section we consider models where time is considered
explicitly. Modeling time explicitly
allows for time-varying arrival rates and time-varying discrete
choice models. We assume that
customers arrive to the system according to a time heterogenous
Poisson process with intensity
λt, 0 ≤ t ≤ T where T is the length of the horizon, and t
46. represents the time-to-go. Then the
number of customers that arrive during the last t units of time,
say Nt, is a Poisson random
variable with mean Λt =
∫ t
0 λsds.
We assume that customers arriving at time t select product k
from the offered set, say
S with probability πkt(S) given by the discrete choice model
prevalent at time-to-go t. Let
V (t,x) denote the maximum expected revenue that can be
attained over the last t units of the
sale horizon with x units of capacity. Assume that at time t we
offer set S ⊂ N = {1, . . . ,n}
and keep this set of fares open for δt units of time. If λtδt << 1,
the probability that a
customer arrives and requests product k ∈ S is approximately
λtπkt(S)δt so
V (t,x) = max
S⊂N
∑
k∈ S
{λtδtπkt(S)[pk + V (t− δt,x− 1)] + (1 −λtδt
∑
k∈ S
πkt(S))V (t− δt,x)} + o(δt)
17
47. = V (t− δt,x) + λtδt max
S⊂N
∑
k∈ S
πkt(S)[pk − ∆V (t− δt,x)] + o(δt)
= V (t− δt,x) + λtδt max
S⊂N
[rt(S) − ∆V (t− δt,x)πt(S)] + o(δt) (7)
for x ≥ 1 with boundary conditions V (t, 0) = V (0,x) = 0, t ≥ 0,
x ∈ N where rt(S) =∑
k∈ S pkπkt(S), πt(S) =
∑
k∈ S πkt(S) and ∆V (t− δt,x) = V (t− δt,x) −V (t− δt,x− 1).
The value function V (t,x) is often computed approximately by
solving a discrete time
dynamic program based on (7) that involves rescaling time and
the arrival rates, using δt = 1,
and dropping the o(δt) term. Time can be rescaled by a positive
real number, say a, such
that T ← aT is an integer by setting λt ← 1aλt/a, πjt(S) ←
πj,t/a(S). The resulting dynamic
program is given by
V (t,x) = V (t− 1,x) + λt max
S⊂N
[rt(S) − ∆V (t− 1,x)πt(S)], (8)
48. with the same boundary conditions. Formulation (8) is due to
Talluri and van Ryzin [19].
It reduces to the Lee and Hersh [11] model when demands are
independent. Alternatively,
instead of rescaling (7) we can subtract V (t−δt,x) from both
sides of equation (7), divide by
δt and take limits as δt ↓ 0 to obtain the Hamilton-Jacobi-
Bellman equation:
∂V (t,x)
∂t
= λt max
S⊂N
[rt(S) − ∆V (t,x)πt(S)] (9)
with the same boundary conditions.
The generic optimization problem in formulations (8) and (9) is
of the form
max
S⊂N
[rt(S) −zπt(S)]
where z ≥ 0 is the marginal value of capacity. Since there are 2n
subsets S ⊂ N = {1, . . . ,n}
the optimization requires the evaluation of a large number of
subsets, and the problem has
to be solved for different values of z as the marginal value of
capacity changes with the state
(t,x) of the system. One may wonder if there is a way to
simplify the problem by reducing the
number of subsets that we need to look at. From Theorem 3, we
49. know that the optimization
problem can be reduces to maxj∈ Mt [rjt − zπjt], where Mt is the
index of the collection of
efficient sets at time t, rjt = rt(Ejt) and πjt = πt(Ejt) and Ejt is
the jth efficient for the
discrete choice model prevalent at time-to-go t. This greatly
simplifies the optimization step
in the dynamic programs (8) and (9). For convenience we will
refer to action j when offering
efficient set Ejt,j ∈ Mt. If the problem of finding the efficient
sets is NP-hard, then the
Markov Chain approximation suggested in [2] can be used for
positive values of z ≥ 0, to
heuristically identify a collection of sets that are nearly
efficient and then use this collection
in the calculation.
Using the notion of efficient sets, formulation (8) reduces to
V (t,x) = V (t− 1,x) + λt max
j∈ Mt
[rjt − ∆V (t− 1,x)πjt], (10)
18
while formulation (9) reduces to
∂V (t,x)
∂t
= λt max
j∈ Mt
50. [rjt − ∆V (t,x)πjt]. (11)
Just as in the case of the independent demand model, the
marginal value ∆V (t,x) is
increasing in t and decreasing in x. For formulation (10), let
a(t,x) = arg max
j∈ Mt
[rjt − ∆V (t− 1,x)πjt]. (12)
For formulation (11) the definition of a(t,x) is the same except
that we use ∆V (t,x) instead
of ∆V (t− 1,x) in the right hand side.
Notice that rjt − ∆V (t − 1,x) > rj−1,t − ∆V (t − 1,x), so offering
action j (set Ejt) is
better than offering action j−1 if and only if ujt =
(rjt−rj−1,t)/(πj,t−πj−1,t) > ∆V (t−1,x).
Moreover, since the ujts are non-negative and decreasing in j, it
follows that it is optimal to
offer action
a(t,x) = max{j : ujt > ∆V (t− 1,x)},
for formulation (8). The formula for a(t,x) for formulation (9)
requires ∆V (t,x) instead of
∆V (t− 1,x). The following result is valid for both formulations
(10) and (11).
Theorem 6 (Taluri and van Ryzin ([19])) It is optimal to offer
action j = a(t,x) (efficient
set Ea(t,x),t) at state (t,x). Moreover, a(t,x) is decreasing in t
and increasing in x over every
time interval where the choice model is time invariant.
51. As t increases ∆V (t− 1,x) increases and the optimal solution
shifts to efficient sets with
a smaller sale probability. In contrast, as x increases, ∆V
(t−1,x) decreases, and the optimal
solutions shifts to efficient sets with larger sale probability. In
general, we cannot say that
we close lower fares when t is large (or open lower fares when x
is large) because the efficient
sets need not be nested-by-fare. There is a large class of choice
models, however, for which
the efficient sets are nested-by-fare. We have shown in Section
3 that for the parsimonious
GAM (p-GAM) with wj = θvj,j ∈ N, θ ∈ [0, 1], the efficient
sets are of the form Ej = Sj =
{1, . . . ,j} for j = 0, . . . ,m ≤ n, so the efficient sets are nested-
by-fares. Since the IDM and
the BAM correspond to the cases θ = 0 and θ = 1, this implies
that the collection of efficient
sets are nested-by-fares for both the IDM and the BAM. If the
efficient sets are nested-by-
fare, then we can talk of opening and closing fares as the state
dynamics change with the
understanding that if a fare is open, then all higher fares will be
open at the same time.
4.1 Dynamic Pricing Formulation with a Finite Price Menu
While πjt and rjt are respectively, the sales rate and the revenue
rate under action j at time t,
the average fare per unit sold under action j is qjt = rjt/qjt,
where for convenience we define
q0t = 0 for E0 = ∅ . From the increasing concavity of R(ρ), it
follows that qjt is decreasing in
j ∈ Mt. This suggest that if t is large relative to x we should
offer action 1 as this maximizes
52. 19
the revenue per unit of capacity. However, offering action 1
may result in very slow sales and
may lead to capacity spoilage. At the other extreme, offering
action m, maximizes the revenue
rate and this is optimal when capacity is abundant as this
maximizes the revenue over the
sales horizon. For other cases, a tradeoff is needed between the
average sales price qjt and
the demand rate λtπjt associated with action j that takes into
account the marginal value of
capacity at state (t,x). This leads to the following equivalent
pricing formulation:
Then
V (t,x) = V (t− 1,x) + max
j∈ Mt
λtπjt[qjt − ∆V (t− 1,x)]. (13)
The equivalent formulation for the continuous time model (11)
is
∂V (t,x)
∂t
= max
j∈ Mt
λtπjt[qjt − ∆V (t,x)] (14)
These formulation suggest that we are selecting among actions j
∈ Mt to maximize the
53. sales rate λtπjt times the average fare qjt net of the marginal
value of capacity. We can think
of λtπjt as the demand rate associated with average fare qjt,
which reduces dynamic capacity
allocation models to dynamic pricing models with finite price
menus.
5 Formulation as an Independent Demand Model
Recall from Chapter 1, that the discrete-time, independent
demand, formulation with n fares
pt1 > pt2 > .. . > ptn and demand rates λ1t, . . . ,λtn, is of the
form:
V (t,x) = V (t− 1,x) +
n∑
j=1
λjt[ptj − ∆V (t− 1,x)]+, (15)
with boundary conditions V (t, 0) = V (0,x) = 0. One may
wonder, whether it is possible to
transform formulation (10) for dependent demands into
formulation (15) for demand formula-
tion, by transforming data λt and (πjt,rjt), j = 0, 1, . . . ,m for
the dependent demand model
into data (p̂ jt, λ̂tj), j = 1, . . . ,m for the independent demand
model.
One reason to wish for this is that such a transformation would
allow computer codes
available to solve (15) to solve (10). Another may be to try to
use the transformed data as
input to static models and then use static solutions or heuristics
such as the EMSR-b.
54. While it is indeed possible to do the transformation from (10)
into (15), there are really
no computational benefits as the running time of both (10) and
(15) are O(nct). Moreover,
as we shall see later, using the transformed data as input for the
static model is fraught with
problems.
The data transformation is to set λ̂jt = λt[πjt −πj−1,t] and p̂ jt =
ujt = (rjt −rj−1,t)/(πjt −
πj−1,t) for j ∈ Mt. The reader can verify that
∑j
k=1 λ̂jt = λtπjt and that
∑j
k=1 λ̂jtp̂ jt = λtrjt.
This transformation is in effect creating artificial products with
independent demands λ̂jt and
20
prices p̂ jt for j ∈ Mt.
Theorem 7 Formulation (10) is equivalent to
V (t,x) = V (t− 1,x) +
∑
j∈ Mt
λ̂jt[p̂ jt − ∆V (t− 1,x)]+ (16)
55. with boundary conditions V (t, 0) = V (0,x) = 0.
Proof of Theorem 7: Let k(t,x) = max{j : p̂ jt > ∆V (t − 1,x)}. It
is therefore optimal
to accept all of the artificial products such that j ≤ k(t,x). Notice
that a(t,x) = k(t,x) on
account of p̂ jt = ujt. Aggregating artificial products 1, . . .
,a(t,x), results in action k(t,x) =
a(t,x), corresponding to efficient set Ea(t,x),t. More precisely,
∑
j∈ Mt
λ̂jt[p̂ jt − ∆V (t− 1,x)]+ =
∑
j≤k(t,x)
λ̂jt[p̂ jt − ∆V (t− 1,x)]
=
∑
j≤a(t,x)
λ̂jt[p̂ jt − ∆V (t− 1,x)]
= ra(t,x),t −πa(t,x),t)∆V (t− 1,x)
= max
j∈ Mt
[rjt −πjt∆V (t− 1,x)].
Consequently,
V (t,x) = V (t− 1,x) +
∑
j∈ Mt
56. λ̂jt[p̂ jt − ∆V (t− 1,x)]+ = V (t− 1,x) + λt max
j∈ Mt
[rjt −πjt∆V (t,x)].
The fare and demand transformations that map λt and (πjt,rjt),j
∈ Mt into (p̂ jt, λ̂jt),j ∈
M have appeared in many papers but the original ideas go back
to Kincaid and Darlin [10] as
documented in Walczack et al. [20]. The fact that the
transformation works for the dynamic
program has lead some practitioners to conclude that the
transformed data can be used as an
input to static models where demands are treated as
independent. In particular, Fiig et al. [6],
and Walczack et al. [20], proposed feeding the transformed data
and applying the EMSR-b
heuristic, treating demands as independent under the low-to-
high arrival pattern assumption.
While this is a tempting heuristic, it would be wrong to expect
that controls obtained this way
will be close to optimal if demand dependencies are ignored. In
particular, the low-to-high
demand arrival pattern, is tantamount to assuming that Poisson
demands with parameters
λ̂jt will arrive low-to-high, but this are artificial demands from
customers willing to buy under
action j but not under action j−1. When capacity is allocated to
this marginal customers, we
cannot prevent some degree of demand cannibalization from
customers willing to buy under
action j − 1 into some of the fares in action j. We will return to
this issue in Section 8.
21
57. 6 Upper Bound on the Value Function
We will present an an upper bound on the value functions (7) an
(8) for the case where the
choice models are time invariant. The idea is based on
approximate dynamic programming
(ADP) using affine functions and it can be easily extended to
the case where the choice models
vary over time. It is well known that a dynamic program can be
solved as a mathematical pro-
gram by making the value function at each state a decision
variable. This leads to the formula-
tion V (T,c) = min F(T,c) subject to the constraints ∂F (t,x)/∂t ≥
λt[rj−∆F(t,x)πj] ∀ (t,x)
for all j ∈ M, where the decision variables are the class of non-
negative functions F(t,x) that
are differential in x with boundary conditions F(t, 0) = F(0,x) =
0 for all t ∈ [0,T] and all
x ∈ {0, 1, . . . ,c}.
While this formulation is daunting, it becomes easier once we
restrict the functions to
be of the affine form F̃(t,x) =
∫ t
0 βs(x)ds + xzt, zt ≥ 0. We will restrict ourselves to the
case βs(x) = βs for x > 0, βs(0) = 0, zt = z for t > 0 and z0 = 0.
With this restriction,
the partial derivative and marginal value of capacity have
simple forms and the boundary
conditions are satisfied. More precisely, ∂F̃(t,x)/∂t = βt for x >
0, ∆F̃(t,x) = z, for t > 0,
58. F̃(t, 0) = F̃(0, t) = 0. This reduces the program to Ṽ (T,c) = min
F̃(T,c) = min
∫T
0 βtdt + cz,
subject to βt ≥ λt[rj − zπj] ∀ j ∈ M. Since we have restricted the
set of functions F(t,x)
to be affine, it follows that V (T,c) ≤ Ṽ (T,c). Since this is a
minimization problem, the
optimal choice for βt is βt = λt maxj∈ M [rj − zπij] = λtg(z)
where g(z) = maxj∈ M [rj − zπj]
is a decreasing convex, non-negative, piecewise linear function
of z. Consequently the overall
problem reduces to
Ṽ (T,c) = min
z≥0
[
∫ T
0
λtg(z)dt + cz] = min
z≥0
[ΛTg(z) + cz], (17)
where ΛT =
∫T
0 λtdt is the aggregate arrival rate over the sales horizon [0,T].
Notice that
ΛTg(z) + cz is convex in z. If the discrete choice model is time
varying, then gt(z) =
maxj∈ Mt [rjt −zπjt], result in
59. V
̄ (T,c) = min
z≥0
[∫ T
0
λtgt(z)dt + cz
]
,
where the objective function is also convex in z.
We can linearize (17) by introducing a new variable, say y, such
that y ≥ rj − zπj for all
j ∈ M and z ≥ 0, which results in the linear program:
Ṽ (T,c) = min
z≥0
[ΛTy + cz],
subject to ΛTy + ΛTπjzj ≥ ΛTrj j ∈ M
z ≥ 0,
where for convenience we have multiplied the constraints y +
πjz ≥ rj,j ∈ M by ΛT > 0.
22
The dual of this problem is given by
Ṽ (T,c) = ΛT max
∑
60. j∈ M
rjtj
subject to ΛT
∑
j∈ M
πjtj ≤ c
∑
j∈ M
tj = 1
tj ≥ 0 ∀ j ∈ M.
This linear program decides the proportion of time , tj ∈ [0, 1],
that each efficient set Ej is
offered to maximize the revenue subject to the capacity
constraint. The reader can verify that
Ṽ (T,c) is closely related to the functions RC(ρ) and R(ρ) used
to define efficient sets. The
following result establishes this relationship.
Proposition 4
Ṽ (T,c) = ΛTRC(c/ΛT ) = ΛTR(c/ΛT ).
Example 5 Suppose that p1 = 1000,p2 = 600 and a BAM with v0
= v1 = v2 = e
1. We will
assume that the aggregate arrival rate over the sales horizon
[0,T] = [0, 1] is ΛT = 40. We
know that for this problem the efficient sets are E0 = ∅ ,E1 =
{1} and E2 = {1, 2}. For c = 24,
the optimal solution is t1 = 6/15 and t2 = 9/15 with 8 units of
61. sales under action S1 and 16
units of sales under action S2 and revenue $20,800. Table 6
provides the upper bound Ṽ (T,c)
for different values of c. Notice that sales under action S1, first
increase and then decrease as
c increases. Table 6 also reports sales under fare 1 and fare 2,
and the reader can see that
sales under fare 1 first increase and then decrease.
c Ṽ (T,c) t1 t2 sales S1 sales S2 fare 1 sales fare 2 sales
12 12,000 0.6 0.0 12 0 12 0
16 16,000 0.8 0.0 16 0 16 0
20 20,000 1.0 0.0 20 0 20 0
22 20,400 0.7 0.3 14 8 18 4
24 20,800 0.4 0.6 8 16 16 8
26 21,200 0.1 0.9 2 24 14 12
28 21,333 0.0 1.0 0 26.6 13.3 13.3
32 21,333 0.0 1.0 0 26.6 13.3 13.3
Table 6: Upper Bound and Optimal Actions for Fluid Model
7 Uni-directional Dynamic Programming Models
Like the Lee and Hersh model, formulations (8) and (9),
implicitly assume that the capacity
provider can offer any subset of fares at any state (t,x). This
flexibility works well if customers
are not strategic. Otherwise, customers may anticipate the
possibility of lower fares and
23
postpone their purchases in the hope of being offered lower
fares at a later time. If customers
62. act strategically, the capacity provider may counter by imposing
restrictions that do not allow
lower fares to reopen once they are closed. Actions to limit
strategic customer behavior are
commonly employed by revenue management practitioners.
Let VS(t,x) be the optimal expected revenue when the state is
(t,x), we are allowed
to use any subset U ⊂ S of fares and fares cannot be offered
once they are closed. The
system starts at state (T,c) and S = N. If a strict subset U of S is
used then all fares in
U ′ = {j ∈ N : j /∈ U} are permanently closed and cannot be
offered at a later state regardless
of the evolution of sales. To obtain a discrete time counterpart
to (8), let
WU (t,x) = VU (t− 1,x) + λt[rt(U) −πt(U)∆VU (t− 1,x)].
Then the dynamic program is given by
VS(t,x) = max
U⊂S
WU (t,x) (18)
with boundary conditions VS(t, 0) = VS(0,x) = 0 for all t ≥ 0, x
∈ N and S ⊂ N. The goal
of this formulation is to find VN (T,c) and the corresponding
optimal control policy.
Notice that formally the state of the system has been expanded
to (S,t,x) where S is
the last offered set and (t,x) are, as usual, the time-to-go and the
remaining inventory. For-
mulation (8) requires optimizing over all subsets S ⊂ N, while
63. formulation (18) requires an
optimization over all subsets U ⊂ S for any given S ⊂ N.
Obviously the complexity of these
formulations is large if the number of fares is more than a
handful. Airlines typically have over
twenty different fares so the number of possible subsets gets
large very quickly. Fortunately,
in many cases we do not need to do the optimization over all
possible subsets. As we have
seen, the optimization can be reduced to the set of efficient
fares Ct at time t. For the p-GAM,
we know that Ct ⊂ {S0,S1, . . . ,Sn} where Sj = {1, . . . ,j} are
the nested-by-fares sets. For
the p-GAM, and any other model for which the nested-by-fare
property holds, the state of
the system reduces to (j,t,x) where Sj is the last offered set at
(t,x). For such models the
formulation (18) reduces to
Vj(t,x) = max
k≤j
Wk(t,x) (19)
where Vj(t,x) = VSj (t,x) and
Wk(t,x) = Vk(t− 1,x) + λt[rkt −πkt∆Vk(t− 1,x)],
rkt =
∑
l∈ Sk plπlt(Sk) and πkt =
∑
l∈ Sk πlt(Sk).
The structural results obtained for the Independent Demand
64. Model carry on to the p-
GAM model and for other models where the efficient sets have
the nested-by-fare property.
Let
aj(t,x) = max{k ≤ j : Wk(t,x) = Vj(t,x)}. (20)
Theorem 8 At state (j,t,x) it is optimal to offer set Saj (t,x) =
{1, . . . ,aj(t,x)}, where
aj(t,x), given by (20), is decreasing in t and increasing in x over
time intervals where the
choice model is time invariant.
24
The proof of this results follows the sample path arguments of
the corresponding proof in
the independent demand chapter. Clearly V1(t,x) ≤ V2(t,x) ≤
Vn(t,x) ≤ V (t,x) ≤ Ṽ (t,x) as
V (t,x) is not restricted, as Vj(t,x) is, to monotone offerings.
c Load Factor V3(T,c) V (T,c) Ṽ (T,c)
4 4.59 3,769 3,871 4,000
6 3.06 5,356 5,534 6,000
8 2.30 6,897 7,013 7,477
10 1.84 8,259 8,335 8,950
12 1.53 9,304 9,382 10,423
14 1.31 9,976 10,111 10,846
16 1.15 10,418 10,583 11,146
18 1.02 10,803 10,908 11,447
20 0.92 11,099 11,154 11,504
22 0.84 11,296 11,322 11,504
24 0.77 11,409 11,420 11,504
65. 26 0.71 11,466 11,470 11,504
28 0.66 11,490 11,492 11,504
Table 7: Value Functions for Dynamic Allocation Policies
Example 6 Table 7 presents the value functions V3(T,c), V (T,c)
and the upper bound Ṽ (T,c)
that result from solving the dynamic programs (10) and (19) for
the MNL model with fares
p1 = $1, 000,p2 = $800,p3 = $500 with price sensitivity βp =
−0.0035, schedule quality
si = 200 for i = 1, 2, 3 with quality sensitivity βs = 0.005, and
an outside alternative with
p0 = $1, 100 and schedule quality s0 = 500, Gumbel parameter
φ = 1, arrival rate λ = 25
and T = 1. Recall that for the MNL model, the attractiveness vi
= e
φµi where µi is the
mean utility. In this case µi = βppi + βssi. The computations
were done with time rescaled
by a factor a = 25, 000. Not surprisingly V3(T,c) ≤ V (T,c) as
V3(T,c) constraints fares to
remain closed once they are closed for the first time. However,
the difference in revenues is
relatively small except for load factors around 1.15 where the
difference can be as large as
1.5% in revenues.
8 Static Capacity Allocation Models
We will assume that we are working with a choice model with
efficient sets that are nested:
E0 ⊂ E1 . . . ⊂ Em, even if they are not nested by fare. We
continue using the notation πj =∑
k∈ Ej πk(Ej) and rj =
66. ∑
k∈ Ej pkπk(Ej), so the slopes uj = (rj−rj−1)/(πj−πj−1),j = 1, . . .
,m
are positive and decreasing. We will denote by qj = rj/πj the
average fare, conditioned on a
sale, under efficient set Ej (action j) for j > 1 and define q0 = 0.
Suppose that the total number of potential customers over the
selling horizon is a random
variable D. For example, D can be Poisson with parameter Λ.
Let Dj be the total demand if
only set Ej is offered. Then Dj is conditionally binomial with
parameters D and πj, so if D
is Poisson with parameter Λ, then Dj is Poisson with parameter
Λπj.
25
We will present an exact solution for the two fare class capacity
allocation problem and
a heuristic for the multi-fare case. The solution to the two fare
class problem is, in effect,
an extension of Littlewood’s rule for discrete choice models.
The heuristic for the multi-fare
problem applies the two fare result to each pair of consecutive
actions, say j and j + 1 just as
in the case of independent demands.
8.1 Two Fare Classes
While capacity is available, the capacity provider will offer
either action 2 associated with
67. efficient set E2 = {1, 2}, or action 1, associated with efficient
set E1 = {1}. If the provider
runs out of inventory he offers action 0, corresponding to E0 =
{0}, which is equivalent to
stop selling. We will assume action 2 will be offered first and
that y ∈ {0, . . . ,c} units of
capacity will be protected for sale under action 1.
Under action 2, sales are min(D2,c−y) and expected revenues
are q2E min(D2,c−y) as
q2 is the average fare per unit sold under action 2. Of the (D2 −
c + y)+ customers denied
bookings, a fraction β = π1/π2 will be willing to purchase under
action 1. Thus, the demand
under action 1 will be a conditionally binomial random variable,
say U(y), with a random
number (D2 − c + y)+ of trials and success probability β. The
expected revenue that results
from allowing up to c−y bookings under action 2 is given by
W2(y,c) = q1E min(U(y), max(y,c−D2)) + q2E min(D2,c−y),
where the first term corresponds to the revenue under action 1.
Notice that if D2 ≤ c − y
then U(y) = 0 since U(y) is a binomial random variable with
zero trials. Conditioning the
first term on the event D2 > c−y, allow us to write
W2(y,c) = q1E[min(U(y),y)|D2 ≥ c−y)]P(D2 > c−y) + q2E
min(D2,c−y).
The reader may be tempted to follow the marginal analysis idea
presented in Chapter 1 for the
independent demand case. In the independent demand case, the
marginal value of protecting
one more unit of capacity is realized only if the marginal unit is
68. sold. The counterpart here
would be P(U(y) ≥ y|D2 > c−y) and a naive application of
marginal analysis would protect
the yth unit whenever q1P(U(y) ≥ y|D2 > c−y) > q2.
However, with dependent demands, protecting one more unit of
capacity also increases
the potential demand under action 1 by one unit. This is because
an additional customer
is denied capacity under action 2 (when D2 > c − y) and this
customer may end up buying
a unit of capacity under action 1 even when not all the y units
are sold. Ignoring this
can lead to very different results in terms of protection levels.
The correct analysis is to
acknowledge that an extra unit of capacity is sold to the
marginal customer with probability
βP (U(y − 1) < y − 1|D2 > c−y). This suggest protecting the yth
unit whenever
q1[P(U(y) ≥ y|D2 > c−y) + βP (U(y − 1) < y − 1|D2 > c−y)] >
q2.
To simplify the left hand side, notice that conditioning on the
decision of the marginal customer
26
results in
P(U(y) ≥ y|D2 > c−y) = βP (U(y−1) ≥ y−1|D2 >
c−y)+(1−β)P(U(y−1) ≥ y|D2 > c−y).
Combining terms leads to protecting the yth unit whenever
69. q1[β + (1 −β)P(U(y − 1) ≥ y|D2 > c−y)] > q2.
Let
r = u2/q1 =
q2 −βq1
(1 −β)q1
, (21)
denote the critical fare ratio. In industry, the ratio r given by
(21) is know as fare adjusted
ratio, in contrast to the unadjusted ratio q2/q1 that results when
β = 0.
The arguments above suggests that the optimal protection level
can be obtained by se-
lecting the largest y ∈ {1, . . . ,c} such that P(U(y − 1) ≥ y|D2 >
c − y) > r provided that
P(U(0) ≥ 1|D2 ≥ c) > r and to set y = 0 otherwise.
To summarize, an optimal protection can be obtain by setting
y(c) = 0 if P(U(0) ≥ 1|D2 >
c) ≤ r and setting
y(c) = max{y ∈ {1, . . . ,c} : P(U(y − 1) ≥ y|D2 > c−y) > r}
otherwise. (22)
Formula (22) is due to Gallego, Lin and Ratliff [7]. This is
essentially a reinterpretation
of the main result in Brumelle et al. originally developed for
fares instead of actions.
One important observation is that for dependent demands the
optimal protection level
70. y(c) depends in c in a more complicated way than in the
independent demand model. For the
dependent demand model y(c) is first increasing and then
decreasing in c. The reason is that
for low capacity it is optimal to protect all the inventory for
sale under action 1. However, for
high capacity it is optimal to allocate all the capacity to action
2. The intuition is that action
2 has a higher revenue rate, so with high capacity we give up
trying to sell under action 1.
This is clearly seen in Table 6 of Example 5. Heuristic solutions
that propose protection levels
of the form min(yh,c), which are based on independent demand
logic, are bound to do poorly
when c is close to Λπ2. In particular, the heuristics developed
by Belobaba and Weatherford
[1], and more recently by Fiig et al. [6] and by Walczak et al.
[20] are of this form and are
therefore not recommended.
One can derive Littlewood’s rule for discrete choice models
(22) formally by analyzing
∆W2(y,c) = W2(y,c)−W2(y−1,c), the marginal value of
protecting the yth unit of capacity
for sale under action 1.
Proposition 5
∆W2(y,c) = [q1(β + (1 −β)P(U(y − 1) ≥ y|D2 > c−y) − q2]P(D2
> c−y). (23)
Moreover, the expression in brackets is decreasing in y ∈ {1, . .
. ,c}.
27
71. The proof of Proposition 5 is due to Gallego, Lin and Ratliff [7]
and can be found in the
Appendix. As a consequence, ∆W2(y,c) has at most one sign
change. If it does, then it must
be from positive to negative. W2(y,c) is then maximized by the
largest integer y ∈ {1, . . . ,c},
say y(c), such that ∆W2(y,c) is positive, and by y(c) = 0 if
∆W2(1,c) < 0. This confirms
Littlewood’s rule for discrete choice models (22).
8.2 Heuristic Protection Levels
In terms of computations, notice that
P(U(y − 1) ≥ y|D2 > c−y) = lim
L→∞
∑L
k=0 P(Bin(y + k,β) ≥ y)P(D2 = c + k + 1)
P(D2 > c−y)
,
where we have been careful to only include terms that can be
potentially positive in the
numerator. It is often enough to truncate the sum at a value, say
L, such that P(D2 >
L) ≤ �P(D2 > c − y) for some small �, as those terms do not
materially contribute to the
sum. While the computation of y(c) and V2(c) = W2(y(c),c) is
not numerically difficult, the
conditional probabilities involved may be difficult to
understand conceptually. Moreover, the
formulas do not provide intuition and do not generalize easily to
72. multiple fares. In this section
we develop a simple heuristic to find near-optimal protection
levels that provides some of the
intuition that is lacking in the computation of optimal
protection levels y(c). In addition, the
heuristic can easily be extended to multiple-fares.
The heuristic consists of approximating the conditional
binomial random variable U(y−1)
with parameters (D2−c+y−1)+ and β by its conditional
expectation, namely by (Bin(D2,β)−
β(c+ 1−y))+. Since Bin(D2,β) is just D1, the approximation
yields (D1−β(c+ 1−y))+. We
expect this approximation to be reasonable if ED1 ≥ β(c + 1−y).
In this case P(U(y−1) ≥
y|D2 > c−y) can be approximated by P(D1 ≥ (1 −β)y + β(c + 1)).
Let
yp = max{y ∈ N : P(D1 ≥ y) > r)}.
We think of yp = (1 − β)y + β(c + 1) as a pseudo-protection
level that will be modified
to obtain a heuristic protection level yh(c) when the
approximation is reasonable. Let y =
(yp −β(c + 1))/(1 −β). Then ED1 ≥ β(c + 1 −y)) is equivalent to
the condition
c < yp + d2
where d2 = E[D2] − E[D1] = Λ(π2 − π1) = Λπ2(1 − β), where
for convenience we write
β = β1 = π1/π2. Consequently, if c < y
p + d2 we set
yh(c) = max
73. {
y ∈ N : y ≤
yp −β(c + 1)
(1 −β)
}
∧ c.
When the condition c < yp +d2 fails, we set y
h(c) = 0. Thus, the heuristic will stop protecting
capacity for action 1 when c ≥ yp + d2. In a deterministic
setting yp = E[D1], so it stops
protecting when c ≥ E[D1] + d2 = E[D2], i.e., when there is
enough capacity to satisfy the
28
expected demand under action 2.
Notice that the heuristic involves three modifications to
Littlewood’s rule for independent
demands. First, instead of using the first choice demand D1,2
for fare 1, when both fares
are open, we use the stochastically larger demand D1 for fare 1,
when it is the only open
fare. Second, instead of using the ratio of the fares p2/p1 we use
the modified fare ratio
r = u2/q1 based on sell-up adjusted fare values. From this we
obtain a pseudo-protection level
yp that is then modified to obtain yh(c). Finally, we keep yh(c)
if c < yp +d2 and set y
74. h(c) = 0
otherwise. In summary, the heuristic involves a different
distribution, a fare adjustment, and a
modification to the pseudo-protection level. The following
example illustrates the performance
of the heuristic.
Example 7 Suppose that p1 = 1000,p2 = 600 and a BAM with v0
= v1 = v2 = e
1 and that
Λ = 40 as in Example 5. We report the optimal protection level
y(c), the heuristic protection
level yh(c), the upper bound V
̄ (c), the optimal expected
revenue V (c) of the uni-directional
formulation (18), the performance V2(c) of y(c) and the
performance V
h
2 (c) = W2(y
h(c),c)
of yh(c), and the percentage gap between (V2(c) − V h2
(c))/V2(c) in Table 8. Notice that the
performance of the statiheuristic, V h2 (c), is almost as good as
the performance V2(c) of the
optimal policy under the uni-directional formulation (18) where
fares classes cannot be opened
once they are closed.
c y(c) yh(c) V
̄ (c) V (c) V2(c) V
h
2 (c) Gap(%)
12 12 12 12,000 11,961 11,960 11,960 0.00
75. 16 16 16 16,000 15,610 15,593 15,593 0.00
20 20 20 20,000 18,324 18,223 18,223 0.00
24 21 24 20,800 19,848 19,526 19,512 0.07
28 9 12 21,333 20,668 20,414 20,391 0.11
32 4 0 21,333 21,116 21,036 20,982 0.26
36 3 0 21,333 21,283 21,267 21,258 0.05
40 2 0 21,333 21,325 21,333 21,322 0.01
Table 8: Performance of Heuristic for Two Fare Example
8.3 Theft versus Standard Nesting and Arrival Patterns
The types of inventory controls used in the airline’s reservation
system along with the demand
order of arrival are additional factors that must be considered in
revenue management opti-
mization. If y(c) < c, we allow up to c−y(c) bookings under
action 2 with all sales counting
against the booking limit c−y(c). In essence, the booking limit
is imposed on action 2 (rather
than on fare 2). This is known as theft nesting. Implementing
theft nesting controls may be
tricky if a capacity provider needs to exert controls through the
use of standard nesting, i.e.,
when booking limits are only imposed on the lowest open fare.
This modification may be
required either because the system is built on the philosophy of
standard nesting or because
users are accustomed to thinking of imposing booking limits on
the lowest open fare. Here
we explore how one can adapt protection levels and booking
limits for the dependent demand
model to situations where controls must be exerted through
standard nesting.
29
76. A fraction of sales under action 2 correspond to sales under fare
p2. This fraction is given
by ω = π2(E2)/π2. So if booking controls need to be exerted
directly on the sales at fare p2,
we can set booking limit ω(c−y(c)) on sales at fare p2. This is
equivalent to using the larger
protection level
ŷ(c) = (1 −ω)c + ωy(c) (24)
for sales at fare 1. This modification makes implementation
easier for systems designed for
standard nesting controls and it performs very well under a
variety of demand arrival patterns.
It is possible to combine demand choice models with fare
arrival patterns by sorting cus-
tomers through their first choice demand and then assuming a
low-to-high demand arrival
pattern. For the two fare case, the first choice demands for fare
1 and fare 2 are Poisson
random variables with rates Λπ1(E2) and Λπ2(E2). Assume now
that customers whose first
choice demand is for fare 2 arrive first, perhaps because of
purchasing restrictions associated
with this fare. Customers whose first choice is fare 2 will
purchase this fare if available. They
will consider upgrading to fare 1 if fare 2 is not available. One
may wonder what kind of
control is effective to deal with this arrival pattern. It turns out
that setting protection level
ŷ(c) given by (24) for fare 1, with standard nesting, is optimal
for this arrival pattern and is
77. very robust to other (mixed) arrival patterns (Gallego, Li and
Ratliff [8]).
8.4 Multiple Fare Classes
For multiple fare classes, finding optimal protection levels can
be very complex. However, if
we limit our search to the best two consecutive efficient sets we
can easily adapt the results
from the two-fare class to deal with the multiple-fare class
problem. For any j ∈ {1, . . . ,n−1}
consider the problem of allocating capacity between actions j
(corresponding to efficient set
Ej) and action j + 1 (corresponding to efficient set Ej+1) where
action j + 1 is offered first.
In particular, suppose we want to protect y ≤ c units of capacity
for action j against action
j + 1. We will then sell min(Dj+1,c−y) units under action j + 1
at an average fare qj+1. We
will then move to action j with max(y,c−Dj+1) units of capacity
and residual demand Uj(y),
where Uj(y) is conditionally binomial with parameters (Dj+1 −
c + y)+ and βj = πj/πj+1.
Assuming we do not restrict sales under action j the expected
revenue under actions j + 1
and j will be given by
Wj+1(y,c) = qjE min(Uj(y), max(y,c−Dj+1)) + qj+1E
min(Dj+1,c−y). (25)
Notice that under action j we will either run out of capacity or
will run out of customers.
Indeed, if Uj(y) ≥ y then we run out of capacity, and if Uj(y) <
y then we run out of
customers. Let Wj+1(c) = maxy≤c Wj+1(y,c) and set W1(c) =
q1E min(D1,c). Clearly,
78. Vn(c) ≥ max
1≤j≤n
Wj(c), (26)
so a simple heuristic is to compute Wj(c) for each j ∈ {1, . . .
,n} and select j to maxi-
mize Wj(c). To find an optimal protection level for Ej against
Ej+1 we need to compute
∆Wj+1(y,c) = Wj+1(y,c)−Wj+1(y−1,c). For this we can repeat
the analysis of the two fare
case to show that an optimal protection level for action Ej
against action Ej+1 is given by
30
yj(c) = 0 if ∆Wj+1(1,c) < 0 and by
yj(c) = max{y ∈ {1, . . . ,c} : P(Uj(y − 1) ≥ y|Dj+1 > c−y) > rj},
(27)
where
rj =
uj+1
qj
=
qj+1 −βjqj
(1 −βj)qj
.
79. Alternatively, we can use the heuristic described in the two fare
section to approximate
Uj(y−1) by Dj−βj(c+ 1−y) and use this in turn to approximate
the conditional probability
in (27) by P(Dj ≥ y + β(c−y + 1)). This involves finding the
pseudo-protection level
y
p
j = max{y ∈ N : P(D1 ≥ y) > rj}.
If c < y
p
j + dj+1, then
yhj (c) = max
{
y ∈ N+ : y ≤
y
p
j −βj(c + 1)
1 −βj
}
∧ c, (28)
and set yh(c) = 0 if c ≥ ypj + dj+1.
We will let V hn (c) be the expected revenues resulting from
applying the protection levels.
Example 8 Consider now a three fare example with fares p1 =
1000,p2 = 800,p3 = 500,
80. schedule quality si = 200, i = 1, 2, 3, βp = −.0035, βs = .005, φ
= 1. Then v1 = .082,v2 =
0.165,v3 = 0.472. Assume that the outside alternative is a
product with price p0 = 1100 and
schedule quality s0 = 500 and that the expected number of
potential customers is Poisson with
parameter Λ = 25. Table 9 reports the protection levels yj(c)
and y
h
j (c) as well as V3(c) and
V h3 (c) for c ∈ {4, 6, . . . , 26, 28}. As shown in the Table, the
heuristic performs very well with
a maximum gap of 0.14% relative to V3(c) which was computed
through exhaustive search.
It is also instructive to see that V h3 (c) is not far from V3(c,T),
as reported in Table 7, for the
dynamic model. In fact, the average gap is less than 0.5% while
the largest gap is 1.0% for
c = 18.
Example 7 suggest that the heuristic for the static model works
almost as well as the
optimal dynamic program Vn(T,c) for the case where efficient
sets are nested-by-fare and
fares cannot be opened once they are closed for the first time.
Thus the multi-fare heuristic
described in this section works well to prevent strategic
customers from gaming the system
provided that the efficient fares are nested-by-fare as they are in
a number of important
applications. While the heuristic for the static model gives up a
bit in terms of performance
relative to the dynamic model, it has several advantages. First,
the static model does not
81. need the overall demand to be Poisson. Second, the static model
does not need as much detail
in terms of the arrival rates. These advantages are part of the
reason why people in industry
have a preference for static models, even thought dynamic
models are easier to understand,
easier to solve to optimality, and just as easy to implement.
31
c Load y1(c) y2(c) y
h
1 (c) y
h
2 (c) V3(c) V
h
3 (c) Gap(%)
4 4.59 4 4 4 4 3,769 3,769 0.00
6 3.06 3 6 3 6 5,310 5,310 0.00
8 2.30 1 8 1 8 6,845 6,845 0.00
10 1.84 0 10 0 10 8,217 8,217 0.00
12 1.53 0 12 0 12 9,288 9,288 0.00
14 1.31 0 14 0 14 9,971 9,971 0.00
16 1.15 0 13 0 14 10,357 10,354 0.02
18 1.02 0 9 0 10 10,700 10,694 0.05
20 0.92 0 5 0 6 11,019 11,019 0.00
22 0.84 0 4 0 2 11,254 11,238 0.14
24 0.77 0 3 0 0 11,391 11,388 0.03
26 0.71 0 2 0 0 11,458 11,450 0.08
28 0.66 0 2 0 0 11,488 11,485 0.03
82. Table 9: Performance of Heuristic for Three Fare Example
9 Acknowledgments
I acknowledge the feedback from my students and collaborators.
In particular, I would like
to recognize the contributions and feedback from Anrand Li,
Lin Li, Jing Dong and Richard
Ratliff.
32
10 Appendix
Proof of Theorem 1: If the choice model πj(S),j ∈ S satisfies
GAM then there exist constants
vi, i ∈ N+, ṽi ∈ [0,vi] i ∈ N and ṽ0 = v0 +
∑
j∈N (vj − ṽj) such that πR(S) = v(R)/(ṽ0 + Ṽ (S)
for all R ∈ S. For this choice model, the left hand side of
Axiom 1’ is (ṽ0 +Ṽ (S)/(ṽ0 +Ṽ (T)).
Let θj = 1−ṽj/vj. Then the right hand side of Axiom 1’ is given
by 1−
∑
j∈T−S(1−θj)vj/(ṽ0 +
Ṽ (T)) = (ṽ0 + Ṽ (S)/(ṽ0 + Ṽ (T)). This shows that the GAM
satisfies Axiom 1’. If πi({i}) = 0
then vi = 0 and consequently ṽi = 0. From this it follows that
πS−{i}(T −{i}) =
83. V (S)−vi
ṽ0+Ṽ (T)−ṽi
=
V (S)
ṽ0+Ṽ (T)
= πS(T), so Axiom 2 holds.
Conversely, suppose a choice model satisfies the GLA. Then by
selecting R = {i} ⊂ S ⊂
T = N we see from Axiom 1’ that
πi(S) =
πi(N)
1 −
∑
j/∈ S(1 −θj)πj(N)
.
Since π0(N) +
∑
j∈ N πj(N) = 1 the denominator can be written as π0(N) +
∑
j∈ N θjπj(N) +∑
j∈ S(1 −θj)πj(N), resulting in
πi(S) =
πi(N)
π0(N) +
84. ∑
j∈ N θjπj(N) +
∑
j∈ S(1 −θj)πj(N)
.
Letting vj = πj(N) for all j ∈ N+, ṽ0 = v0 +
∑
j∈N θjvj and ṽj = (1 −θj)vj ∈ [0, 1] for j ∈ N
the choice model can be written as
πi(S) =
vi
ṽ0 + ṽ(S)
,
so it satisfies the GAM.
Proof of Theorem 2: Let N ′ be the universe of products. The set
of vendors is M =
{1, . . . ,m}. Let vij be the attraction value of product i offered
by vendor j, and let Sj ⊂ N ′
be the products offered by vendor j ∈ M. Let Oi = {j ∈ M : i ∈
Sj} be the set of vendors
offering product i, and N = {i ∈ N ′ : Oi 6= ∅ } be the collection
of products that are offered.
We consider a NL model where customers first select a product
and then a vendor. Let γi
be the dissimilarity parameter of nest i. Under the nested model,
a nest i with Oi 6= ∅ , is
selected with probability (∑
85. l∈ Oi v
1/γi
il
)γi
v0 +
∑
k
(∑
l∈ Ok v
1/γk
kl
)γk . (29)
The conditional probability that a customer who selects nest i
will buy the product from
vendor j ∈ Oi is given by
v
1/γi
ij∑
l∈ Oi v
1/γi
il
. (30)
Consequently, the probability that a customer selects product i
∈ Sj from vendor j is given
33
86. by (∑
l∈ Oi v
1/γi
il
)γi
v0 +
∑
k
(∑
l∈ Ok v
1/γk
kl
)γk v
1/γi
ij∑
l∈ Oi v
1/γi
il
.
We are interested in the limit of these probabilities as γk ↓ 0 for
all k. For this purpose
we remark that well know fact: limγk↓0(
∑
87. l∈ Ok v
1/γk
il )
γk = maxl∈ Oi vil. The limit, say pij, of
equation (30) is equal to 1 if vendor j is the most attractive, i.e.,
if vij > vil for all l ∈ Oi,
l 6= j; pij = 0, if vij < maxl∈ Oi vil; and pij = 1/m if vij =
maxl∈ Oi vil but vendor j is tied with
other m− 1 vendors.
Now,
πi(Sj) =
pij maxl∈ Oi vil
v0 +
∑
k maxl∈ Ok vkl
.
For all k ∈ N, define V −kj = maxl∈ Ok,l 6=j vkl and Vkj =
maxl∈ Ok∪ {j} vkl. Then, for i ∈ Sj,
πi(Sj) =
Vijpij
v0 +
∑
k∈ Sj Vkj +
∑
k∈S
̄ j V
88. −
kj
,
where S
̄ j = {i ∈ N : i /∈ Sj}. The selection probability can be
written as
πi(Sj) =
Vijpij
v0 +
∑
k∈ N V
−
kj +
∑
k∈ Sj (Vkj −V
−
kj )
,
or equivalently, as
πi(Sj) =
Vijpij
v0 +
∑
k∈ N V
−
89. kj +
∑
k∈ Sj (Vkj −V
−
kj )pkj
,
since Vkj − V −kj = (Vkj − V
−
kj )pkj for all k. This is because pkj < 1 implies Vkj − V
−
kj = 0.
This shows that πi(Sj) corresponds to a GAM with ã0j = v0 +
∑
k∈ N V
−
kj , akj = pkjVkj, and
ãkj = (Vkj −V −kj )pkj.
Proof of Proposition 2: Notice that π(S) is increasing in S for
the GAM since V (S) ≥
Ṽ (S) ≥ 0 are both increasing in S. Since the P-GAM is a special
case π(S) is increasing in S.
Now, consider a set T that is not nested-by-fare and let ρ =
π(T). Then there exist an index
k such that πk < ρ ≤ πk+1. Let tk = (πk+1 −ρ)/(πk+1 −πk), tk+1
= 1 − tk and tj = 0 for all
other j. Then
90. ∑n
j=1 πjtj = tkπk + tk+1πk+1 = ρ. We will show that the vector x,
defined by
xj = tkπj(Sk) + tk+1πj(Sk+1),j = 1, . . . ,n majorizes the vector
πj(T), j = 1, . . .n. To do this
we will need to establish the following equation:
tkπi(Sk) + tk+1πi(Sk+1) =
vi
ṽ0 + Ṽ (T)
∀ i ≤ k. (31)
The result then follows, because for j ≤ k, equation (31) implies
that
x[1,j] =
v(Sj)
ṽ0 + Ṽ (T)
≥ πSj (T),
34
as not all elements in Sj need to be in T. On the other hand, for
j > k, we have
x[1,j] = π(T) ≥ πSj (T),
since again, not all elements in Sj need to be in T.
To verify equation (31) we will show that tk and tk+1 can be
written as
91. tk =
ṽ0 + ṽ(Sk)
ṽ0 + ṽ(T)
v(Sk + 1) −v(T)
v(Sk + 1) −v(Sk)
,
and
tk+1 =
ṽ0 + ṽ(Sk+1)
ṽ0 + ṽ(T)
v(T) −v(Sk)
v(Sk + 1) −v(Sk)
,
as then (31) follows from simple algebra. We know from
arguments in the proof of Proposi-
tion 2, that
πk+1 −πk = πk+1(Sk+1)
ṽ0
ṽ0 + ṽ(Sk)
,
so showing the result for tk is equivalent to showing that
πk+1 −ρ =
92. v(Sk + 1) −v(T)
ṽ0 + ṽ(Sk + 1)
ṽ0
ṽ0 + ṽ(T)
,
which follows from easily from the fact that ṽj = (1−θ)vj for all
j. The proof for tk+1 follows
along similar lines.
Proof of Proposition 5: We need to compute the difference
between E[min(U(y), max(y,c−
D2)) and E[min(U(y − 1), (y − 1,c− D2)]. Since both quantities
are zero when c − D2 ≥ y
and if c − D2 < y the difference reduces to E[min(U(y),y)] −
E[min(U(y − 1),y − 1)]. By
expressing the expectation as the sum of tail probabilities and
conditioning on the demand
from the potential customer we see that
E[min(U(y),y)] =
y∑
z=1
P(U(y) ≥ z)
= P(U(y) ≥ y) + β
y−1∑
z=1
P(U(y − 1) ≥ z − 1) + (1 −β)
y−1∑
z=1
93. P(U(y − 1) ≥ z).
We now use the fact that E[min(U(y − 1),y − 1)] =
∑y−1
z=1 P(U(y − 1) ≥ z), to express the
difference as
E[min(U(y),y)] −E[min(U(y − 1),y − 1)] = P(U(y) ≥ y) + βP
(U(y − 1) < y − 1).
Since P(U(y) ≥ y) = βP (U(y − 1) ≥ y − 1) + (1 −β)P(U(y − 1) ≥
y), we conclude that
E[min(U(y),y)]−E[min(U(y−1),y−1)] = [β+(1−β)P(U(y−1) ≥
y|D2 > c−y)]P(D2 > c−y).
35
On the other hand, E min(c−y,D2) −E min(c + 1 −y,D2)] =
−P(D2 > c−y). Therefore,
∆W2(c,y) = [q1(β + (1 −β)P(U(y − 1) ≥ y|D2 > c−y) − q2)]P(D2
> c−y)
as claimed.
36
References
[1] Belobaba, P. P., and L.R. Weatherford. (1996) “Comparing
94. Decision Rules that Incorpo-
rate Customer Diversion in Perishable Asset Revenue
Management Situations.” Decision
Sciences, 27, 343-363.
[2] Blanchet, J, Gallego, G., and V. Goyal (2013) “A Markov
Chain Approximation to
Discrete Choice Modeling.” Working paper, Columbia
University, New York, NY.
[3] Brumelle, S. L., J. I. McGill, T. H. Oum, M. W. Tretheway
and K. Sawaki. (1990)
“Allocation of Airline Seats Between Stochastically Dependent
Demands,” Transporation
Science, 24, 183-192.
[4] Cooper, W., Homem de Mello, T., and Kleywegt, A. (2006)
“Models of the spiral-down
effect in revenue management.” (Operations Research, 54, 968-
987.
[5] Domencich, T. A., and D. McFadden (1975) “Urban Travel
Demand : A behavioral
analysis,” North Holland Publishing Co., Amsterdam.
[6] Fiig, Thomas, Isler, K., Hopperstad, C., and P. Belobaba.
2010. “Optimization of Mixed
Fare Structures: Theory and Applications.” Journal of Revenue
and Pricing Manage-
ment. 9, 152-170.
[7] Gallego, G., L. Lin and R. Ratliff (2009) “Choice Based
EMSR methods for single-resource
revenue management with demand dependencies.” Journal of
Revenue and Pricing Man-
agement, 8, 207-240.
95. [8] Gallego, G., L. Lin and R. Ratliff (2009) “Demand Arrival
Order and RM Controls.”
AGIFORS Cargo and RM Study Group
[9] Gallego, G., Ratliff, R., and S. Shebalov (2010) “A General
Attraction Model and an
Efficient Formulation for the Network Revenue Management
Problem.” Submitted to
Operations Research.
[Green(1984)] Green, P. J. 1984. Journal of the Royal Statistical
Society. Series B, 46, 149-192.
[Greene(1984)] Greene, W.H. 2000. Econometric Analysis.
Fourth edition. London: Prentice
Hall.
[10] Kincaid, W.M. and Darling, D.A. (1963) “An inventory
pricing problem.” Journal of
Mathematical Analysis and Applications 7: 183208.
[11] Lee. C. T. and M. Hersh. (1993) “A Model for Dynamic
Airline Seat Inventory Control
with Multiple Seat Bookings,” Transportation Science, 27, 252–
265.
[12] Luce, R. D. (1959). “Individual Choice Behavior: A
Theoretical Analysis.” New York:
Wiley
[13] Luce, R.D. (1977) ”The Choice Axiom after Twenty
Years.” Journal of Mathematical
Psychology, 15, pp. 215-233.
37
96. [14] Marshall, A. W. and Olkin, I. (1979). Inequalities: Theory
of Majorization and Its Ap-
plications. Academic Press, New York, NY.
[15] McFadden, D. (1978) . Modelling the choice of residential
location, in A. Karlquist,
ed., Spatial Interaction Theory and Planning Models, North
Holland Publishing Co.,
Amsterdam, chapter 25, pp. 7596.
[16] McFadden, D. (1980). “Econometric models for
probabilistic choice among products.”
The Journal of Business. 53, 13-29.
[17] McFadden, D., K. Train. (2000). “Mixed mnl models for
discrete response.” Journal of
applied Econometrics. 15, 447470.
[18] Rusmevichientong, P., Shmoys, D. and H. Topaloglu.
(2010). “Assortment Optimization
with Mixtures of Logits.” Working paper, Cornell University.
[19] Talluri, K and G. van Ryzin. (2004) “Revenue Management
Under a General Discrete
Choice Model of Consumer Behavior.” Management Science,
50, 15-33.
[Train(2002)] Train, K. 2002. Discrete Choice Methods with
Simulation. Cambridge Univer-
sity Press.
[20] Walczack, D., S. Mardan, and Kallesen, R. 2010.
“Customer voice, fare adjustments and
97. the marginal expected revenue data transformation: A note on
using old yield manage-
ment techniques in the brave new world of pricing.” Journal of
Revenue and Pricing
Management, 9, 94-109.
38
Untitled.notebook
1
February 25, 2013
Untitled.notebook
2
February 25, 2013
Untitled.notebook
3
February 25, 2013
Untitled.notebook
98. 4
February 25, 2013
Page 1Page 2Page 3Page 4
Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Discrete Choice Models
Guillermo Gallego
Department of Industrial Engineering and Operations Research
Columbia University
Spring 2013
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model
99. Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
I Luce Model
I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
I Luce Model
100. I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
I Luce Model
I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
Overview
Introduction
101. Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
I Luce Model
I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
102. I Luce Model
I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Outline
I Introduction
I Neoclassical Theory
I Luce Model
I Random Utility Models
I Applications to Revenue Management
Guillermo Gallego Discrete Choice Models
103. Overview
Introduction
Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Introduction
Choice Modeling is a general purpose tool for making
probabilistic
predictions about human decision making behavior. It is
regarded
as the most suitable method for estimating consumers
willingness
to pay in multiple dimensions. The Nobel Prize for economics
was
awarded to Daniel McFadden in 2000 for his work in the area.
We will consider three theories about about how a rational
decision
maker decides among a discrete number of alternatives:
I Neoclassical choice model
I Luce choice model
I Random utility choice models
Guillermo Gallego Discrete Choice Models
Overview
Introduction
104. Neoclassical Choice Model
Luce Model
Random Utility Models
Applications to Revenue Management
Introduction
Choice Modeling is a general purpose tool for making
probabilistic
predictions about human decision making behavior. It is
regarded
as the most suitable method for estimating consumers
willingness
to pay in multiple dimensions. The Nobel Prize for economics
was
awarded to Daniel McFadden in 2000 for his work in the area.
We will consider three theories about about how a rational
decision
maker decides among a discrete number of alternatives:
I Neoclassical choice model
I Luce choice model
I Random utility choice models
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
105. Luce Model
Random Utility Models
Applications to Revenue Management
Introduction
Choice Modeling is a general purpose tool for making
probabilistic
predictions about human decision making behavior. It is
regarded
as the most suitable method for estimating consumers
willingness
to pay in multiple dimensions. The Nobel Prize for economics
was
awarded to Daniel McFadden in 2000 for his work in the area.
We will consider three theories about about how a rational
decision
maker decides among a discrete number of alternatives:
I Neoclassical choice model
I Luce choice model
I Random utility choice models
Guillermo Gallego Discrete Choice Models
Overview
Introduction
Neoclassical Choice Model
Luce Model