1,391 research outputs found
Recommended from our members
Inferring informal risk-sharing regimes: Evidence from rural Tanzania
This paper studies informal risk-sharing regimes in a unified framework by examining intertemporal consumption behavior of rural households in Tanzania. We exploit a theoretically-consistent link between interest rates and cross-sectional consumption moments to test alternative risk-sharing models without requiring data on interest rates or assuming a restriction to eliminate the need for such data, which are often unavailable in developing economies. We specify tests that allow us to distinguish among models even with temporal dependence in income shocks. Our analysis shows that the consumption pattern in rural Tanzania is consistent with the self-insurance regime, and that risk aversion varies substantially across districts. Imposing a strict condition on interest rates, as often done in prior literature, misses their intertemporal heterogeneity and biases the estimation of risk aversion
Recommended from our members
Inferring Informal Risk-Sharing Regimes: Evidence from Rural Tanzania
This paper studies informal risk-sharing regimes in a unified framework by examining intertemporal consumption behavior of rural households in Tanzania. We exploit a theoretically-consistent link between interest rates and cross-sectional consumption moments to test alternative risk-sharing models without requiring data on interest rates or assuming a restriction to eliminate the need for such data, which are often unavailable in developing economies. We specify tests that allow us to distinguish among models even with temporal dependence in income shocks. Our analysis shows that the consumption pattern in rural Tanzania is consistent with the self-insurance regime, and that risk aversion varies substantially across districts. Imposing a strict condition on interest rates, as often done in prior literature, misses their intertemporal heterogeneity and biases the estimation of risk aversion
Transversals in a collections of trees
Let be a fixed family of graphs on vertex set and
be a collection of elements in . We investigated the
transversal problem of finding the maximum value of when
contains no rainbow elements in . Specifically, we
determine the exact values when is a family of stars or a family
of trees of the same order with dividing . Further, all the
extremal cases for are characterized.Comment: 16pages,2figure
Federated Linear Contextual Bandits with Heterogeneous Clients
The demand for collaborative and private bandit learning across multiple
agents is surging due to the growing quantity of data generated from
distributed systems. Federated bandit learning has emerged as a promising
framework for private, efficient, and decentralized online learning. However,
almost all previous works rely on strong assumptions of client homogeneity,
i.e., all participating clients shall share the same bandit model; otherwise,
they all would suffer linear regret. This greatly restricts the application of
federated bandit learning in practice. In this work, we introduce a new
approach for federated bandits for heterogeneous clients, which clusters
clients for collaborative bandit learning under the federated learning setting.
Our proposed algorithm achieves non-trivial sub-linear regret and communication
cost for all clients, subject to the communication protocol under federated
learning that at anytime only one model can be shared by the server
NetSec: Real-time and Scalable Malware Traffic Detection within IoT Networks
Detecting malicious network traffic in real time has become a crucial requirement at smart communities for elderly care and medical facilities with the prevalence of Internet-of-things (IoT) devices. Existing machine learning based solutions for network traffic malware detection often fail to scale with the exponential increase of IoT devices at the facility and to detect malicious traffic with desirable low latency. In this paper we seek to fill the gap by designing a scalable end-to-end network traffic analyzing system that permits real-time malware detection. By leveraging distributed systems such as Apache Kafka and Apache Spark, the system has demonstrated scalable performance as the number of IoT devices grow. Using Intel’s oneAPI software stack for both machine learning and deep learning models, the model inference speed is boosted by three-fold
- …