1,953 research outputs found

    Transparency and Credibility: Monetary Policy with Unobservable Goals

    Get PDF
    We define and study transparency, credibility, and reputation in a model where the central bank's characteristics are unobservable to the private sector and are inferred from the policy outcome. A low-credibility bank optimally conducts a more inflationary policy than a high-credibility bank, in the sense that it induces higher inflation, but a less expansionary policy in the sense that it induces lower inflation and employment than expected. Increased transparency makes the bank's reputation and credibility more sensitive to its actions. This has a moderating influence on the bank's policy. Full transparency of the central bank's intentions is generally socially beneficial, but frequently not in the interest of the bank. Somewhat paradoxically, direct observability of idiosyncratic central bank goals removes the moderating incentive on the bank and leads to the worst equilibrium.

    Daily Stress Recognition from Mobile Phone Data, Weather Conditions and Individual Traits

    Full text link
    Research has proven that stress reduces quality of life and causes many diseases. For this reason, several researchers devised stress detection systems based on physiological parameters. However, these systems require that obtrusive sensors are continuously carried by the user. In our paper, we propose an alternative approach providing evidence that daily stress can be reliably recognized based on behavioral metrics, derived from the user's mobile phone activity and from additional indicators, such as the weather conditions (data pertaining to transitory properties of the environment) and the personality traits (data concerning permanent dispositions of individuals). Our multifactorial statistical model, which is person-independent, obtains the accuracy score of 72.28% for a 2-class daily stress recognition problem. The model is efficient to implement for most of multimedia applications due to highly reduced low-dimensional feature space (32d). Moreover, we identify and discuss the indicators which have strong predictive power.Comment: ACM Multimedia 2014, November 3-7, 2014, Orlando, Florida, US

    Formal and model driven design of the bright light therapy system Luxamet

    Get PDF
    Seasonal depression seriously diminishes the quality of life for many patients. To improve their condition, we propose LUXAMET, a bright light therapy system. This system has the potential to relieve patients from some of the symptoms caused by seasonal depression. The system was designed with a formal and model driven design methodology. This methodology enabled us to minimize systemic hazards, like blinding patients with an unhealthy dose of light. This was achieved by controlling race conditions and memory leaks, during design time. We prove that the system specification is deadlock as well as livelock free and there are no invariant violations. These proofs, together with the similarity between specification model and implementation code, make us confident that the implemented system is a reliable tool which can help patients during seasonal depression

    Cross-species pathogen spillover across ecosystem boundaries: mechanisms and theory

    Get PDF
    Pathogen spillover between different host species is the trigger for many infectious disease outbreaks and emergence events, and ecosystem boundary areas have been suggested as spatial hotspots of spillover. This hypothesis is largely based on suspected higher rates of zoonotic disease spillover and emergence in fragmented landscapes and other areas where humans live in close vicinity to wildlife. For example, Ebola virus outbreaks have been linked to contacts between humans and infected wildlife at the rural-forest border, and spillover of yellow fever via mosquito vectors happens at the interface between forest and human settlements. Because spillover involves complex interactions between multiple species and is difficult to observe directly, empirical studies are scarce, particularly those that quantify underlying mechanisms. In this review, we identify and explore potential ecological mechanisms affecting spillover of pathogens (and parasites in general) at ecosystem boundaries. We borrow the concept of ‘permeability’ from animal movement ecology as a measure of the likelihood that hosts and parasites are present in an ecosystem boundary region. We then discuss how different mechanisms operating at the levels of organisms and ecosystems might affect permeability and spillover. This review is a step towards developing a general theory of cross-species parasite spillover across ecosystem boundaries with the eventual aim of improving predictions of spillover risk in heterogeneous landscapes

    Predictable arguments of knowledge

    Get PDF
    We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK). Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality. We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography

    Chosen-ciphertext security from subset sum

    Get PDF
    We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012

    The Iowa Homemaker vol.5, no.7

    Get PDF
    Table of Contents The True Spirit of Christmas by Dr. O. H. Cessna, page 1 Something Different for Christmas Greetings by Elizabeth Johnson, page 2 The Purchase Price of Beauty by Dr, Elizabeth Hoyt, page 3 Can You Visualize Your Hat Problem by Florence Faust, page 4 Decorating the Christmas Tree by Margaret Ericson, page 5 Christmas – For Him by Dorothy Harp and Louise Corsaut, page 5 With Iowa State Home Economics Association, page 6 Preparing the Girl for Motherhood by Dr. Florence Brown Sherborn, page 7 Girls’ 4-H Clubs, page 10 Fuel Economy in the Kitchen by Miriam Rapp, page 11 When We Are Very Young by Anna Johnson, page 12 Editorial, page 13 Who’s There and Where, page 14 Eternal Question, page 16 If You Would Have Health by Margaret Whistler, page 1

    New calibration techniques for the Airborne Visible/Infrared Imaging Spectrometer (AVIRIS)

    Get PDF
    Recent laboratory calibrations of the Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) include new methods for the characterization of the geometric, spectral, temporal and radiometric properties of the sensor. New techniques are desired in order to: (1) increase measurement accuracy and precision, (2) minimize measurement time and expense, (3) prototype new field and inflight calibration systems, (4) resolve measurement ambiguities, and (5) add new measurement dimensions. One of the common features of these new methods is the use of the full data collection and processing power of the AVIRIS instrument and data facility. This allows the collection of large amounts of calibration data in a short period of time and is well suited to modular data analysis routines

    Fast and VLSI efficient binary-to-CSD encoder using bypass signal

    Full text link
    • …
    corecore