scispace - formally typeset
Search or ask a question

Showing papers by "Hal R. Varian published in 2012"


Journal ArticleDOI
Hyunyoung Choi1, Hal R. Varian1
TL;DR: This paper used search engine data to forecast near-term values of economic indicators, such as automobile sales, unemployment claims, travel destination planning, and consumer confidence, and showed how to use this information to forecast future economic indicators.
Abstract: In this paper we show how to use search engine data to forecast near-term values of economic indicators. Examples include automobile sales, unemployment claims, travel destination planning and consumer confidence.

1,619 citations


Journal ArticleDOI
TL;DR: A short history of the foundations of revealed preference analysis can be found in this paper, where the authors emphasise the intellectual influence of Sydney Afriat, and present a few novel applications drawn from some areas of applied economics.
Abstract: This note contains a short history of my work on the foundations of revealed preference, emphasising the intellectual influence of Sydney Afriat. I also present a few ‘novel’ applications of revealed preference analysis drawn from some areas of applied economics.

61 citations


Patent
Swaminathan Krishnamurthy1, Robert On1, Elissa Lee1, Shrikant S. Kelkar1, Hal R. Varian1 
29 Jun 2012
TL;DR: In this article, a network access device directs an electronic device to display graphical user interface (GUI) consisting of a self-identification user interface, which enables access to a communications network, in accordance with the application of one or more logging rules corresponding to the selected user.
Abstract: A network access device directs an electronic device, distinct from the network access device, to display graphical user interface, the graphical user interface comprising a network access self-identification user interface. The network access device obtains a selection of a user identification option, through the self-identification user interface. In accordance with a determination that the selected user identification option corresponds to a registered user (e.g., a registered user in a research panel), of a previously defined set of registered users of the network access device, the network access device enables access to a communications network, in accordance with the application of one or more logging rules corresponding to the selected user. Further, in accordance with a determination that the selected user identification option corresponds to an unregistered, guest user, the network access device enables access to the communications network, without the application of any logging rules.

6 citations