Showing papers by "Hal R. Varian published in 2012"
••
TL;DR: This paper used search engine data to forecast near-term values of economic indicators, such as automobile sales, unemployment claims, travel destination planning, and consumer confidence, and showed how to use this information to forecast future economic indicators.
Abstract: In this paper we show how to use search engine data to forecast near-term values of economic indicators. Examples include automobile sales, unemployment claims, travel destination planning and consumer confidence.
1,619 citations
••
TL;DR: A short history of the foundations of revealed preference analysis can be found in this paper, where the authors emphasise the intellectual influence of Sydney Afriat, and present a few novel applications drawn from some areas of applied economics.
Abstract: This note contains a short history of my work on the foundations of revealed preference, emphasising the intellectual influence of Sydney Afriat. I also present a few ‘novel’ applications of revealed preference analysis drawn from some areas of applied economics.
61 citations
•
29 Jun 2012TL;DR: In this article, a network access device directs an electronic device to display graphical user interface (GUI) consisting of a self-identification user interface, which enables access to a communications network, in accordance with the application of one or more logging rules corresponding to the selected user.
Abstract: A network access device directs an electronic device, distinct from the network access device, to display graphical user interface, the graphical user interface comprising a network access self-identification user interface. The network access device obtains a selection of a user identification option, through the self-identification user interface. In accordance with a determination that the selected user identification option corresponds to a registered user (e.g., a registered user in a research panel), of a previously defined set of registered users of the network access device, the network access device enables access to a communications network, in accordance with the application of one or more logging rules corresponding to the selected user. Further, in accordance with a determination that the selected user identification option corresponds to an unregistered, guest user, the network access device enables access to the communications network, without the application of any logging rules.
6 citations