6 research outputs found

    Were the 1982 Merger Guidelines Old News?

    Full text link
    This paper examines the impact of the 1982 Department of Justice Merger Guidelines on the stock market prices of publicly traded firms in the United States. We argue that those Guidelines were perceived by the market as a real change in enforcement policy that would result in substantial deregulation of mergers throughout the economy. We conduct an event study of S&P 500 firms to test this hypothesis and find evidence of a significant positive effect on the stock prices of firms in moderately concentrated industries subject to antitrust regulation, the firms for which the 1982 Guidelines articulate a substantially less intrusive enforcement policy. However, the announcement does not have any significant effect on firms in less concentrated industries or those that are highly concentrated. These results are robust to a number of different sensitivity analyses and thus we conclude that market actors believed the 1982 Guidelines contained new information

    A CONTENT-ADDRESSABLE-MEMORY ASSISTED INTRUSION PREVENTION EXPERT SYSTEM FOR GIGABIT NETWORKS

    Get PDF
    Cyber intrusions have become a serious problem with growing frequency and complexity. Current Intrusion Detection/Prevention Systems (IDS/IPS) are deficient in speed and/or accuracy. Expert systems are one functionally effective IDS/IPS method. However, they are in general computationally intensive and too slow for real time requirements. This poor performance prohibits expert system's applications in gigabit networks. This dissertation describes a novel intrusion prevention expert system architecture that utilizes the parallel search capability of Content Addressable Memory (CAM) to perform intrusion detection at gigabit/second wire speed. A CAM is a parallel search memory that compares all of its entries against input data in parallel. This parallel search is much faster than the serial search operation in Random Access Memory (RAM). The major contribution of this thesis is to accelerate the expert system's performance bottleneck "match" processes using the parallel search power of a CAM, thereby enabling the expert systems for wire speed network IDS/IPS applications. To map an expert system's Match process into a CAM, this research introduces a novel "Contextual Rule" (C-Rule) method that fundamentally changes expert systems' computational structures without changing its functionality for the IDS/IPS problem domain. This "Contextual Rule" method combines expert system rules and current network states into a new type of dynamic rule that exists only under specific network state conditions. This method converts the conventional two-database match process into a one-database search process. Therefore it enables the core functionality of the expert system to be mapped into a CAM and take advantage of its search parallelism.This thesis also introduces the CAM-Assisted Intrusion Prevention Expert System (CAIPES) architecture and shows how it can support the vast majority of the rules in the 1999 Lincoln Lab's DARPA Intrusion Detection Evaluation data set, and rules in the open source IDS "Snort". Supported rules are able to detect single-packet attacks, abusive traffic and packet flooding attacks, sequences of packets attacks, and flooding of sequences attacks. Prototyping and simulation have been performed to demonstrate the detection capability of these four types of attacks. Hardware simulation of an existing CAM shows that the CAIPES architecture enables gigabit/s IDS/IPS

    Action planning and assessment in guidance contexts: how can I understand and support these processes while working with colleagues in Further Education colleges and career service provision in Avon?

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN008437 / BLDSC - British Library Document Supply CentreGBUnited Kingdo
    corecore