Author List: Pick, Roger Alan; Whinston, Andrew B.;
Journal of Management Information Systems, 1989, Volume 6, Issue 1, Page 87-100.
The development of effective techniques for allocating computer resources is a major concern in computer center management. Most proposals, while based on concepts originally developed by economists, are based on the assumption that participants provide truthful information. Over the past twenty years, researchers in economics have explored truth-revealing mechanisms. We apply these ideas to charging for computing resources within an organization. The resulting mechanism provides an incentive for users to tell the system administrator their true valuation of a given configuration. Applications of this mechanism to both long-term and short-term situations are outlined. The long-term situation demonstrates how an appropriate computer configuration can be derived from information obtained from its future users. The short-term situation involves setting priorities among jobs.
Keywords: computer charging; computing equipment selection.; queuing; Transfer pricing; truthful voting
Algorithm:

List of Topics

#170 0.180 information processing needs based lead make exchange situation examined ownership analytical improved situations changes informational examine developed receive perceptions facilitates
#125 0.138 framework model used conceptual proposed given particular general concept frameworks literature developed develop providing paper developing guidelines concepts appropriate set
#208 0.105 feedback mechanisms mechanism ratings efficiency role effective study economic design potential economics discuss profile recent component granularity turn compared using
#231 0.098 information management data processing systems corporate article communications organization control distributed department capacity departments major user hardware cost applications expansion
#214 0.087 resource resources allocation chargeback manager effectiveness problem firms case gap allocating diverse dependence just bridge cooperative criticality acquisition duplication extent
#134 0.059 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct future selection ability help software
#68 0.055 business units study unit executives functional managers technology linkage need areas information long-term operations plans mission large understand knowledge current
#73 0.055 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate