1,953 research outputs found
Transparency and Credibility: Monetary Policy with Unobservable Goals
We define and study transparency, credibility, and reputation in a model where the central bank's characteristics are unobservable to the private sector and are inferred from the policy outcome. A low-credibility bank optimally conducts a more inflationary policy than a high-credibility bank, in the sense that it induces higher inflation, but a less expansionary policy in the sense that it induces lower inflation and employment than expected. Increased transparency makes the bank's reputation and credibility more sensitive to its actions. This has a moderating influence on the bank's policy. Full transparency of the central bank's intentions is generally socially beneficial, but frequently not in the interest of the bank. Somewhat paradoxically, direct observability of idiosyncratic central bank goals removes the moderating incentive on the bank and leads to the worst equilibrium.
Daily Stress Recognition from Mobile Phone Data, Weather Conditions and Individual Traits
Research has proven that stress reduces quality of life and causes many
diseases. For this reason, several researchers devised stress detection systems
based on physiological parameters. However, these systems require that
obtrusive sensors are continuously carried by the user. In our paper, we
propose an alternative approach providing evidence that daily stress can be
reliably recognized based on behavioral metrics, derived from the user's mobile
phone activity and from additional indicators, such as the weather conditions
(data pertaining to transitory properties of the environment) and the
personality traits (data concerning permanent dispositions of individuals). Our
multifactorial statistical model, which is person-independent, obtains the
accuracy score of 72.28% for a 2-class daily stress recognition problem. The
model is efficient to implement for most of multimedia applications due to
highly reduced low-dimensional feature space (32d). Moreover, we identify and
discuss the indicators which have strong predictive power.Comment: ACM Multimedia 2014, November 3-7, 2014, Orlando, Florida, US
Formal and model driven design of the bright light therapy system Luxamet
Seasonal depression seriously diminishes the quality of life for many patients. To improve their condition, we propose LUXAMET, a bright light therapy system. This system has the potential to relieve patients from some of the symptoms caused by seasonal depression. The system was designed with a formal and model driven design methodology. This methodology enabled us to minimize systemic hazards, like blinding patients with an unhealthy dose of light. This was achieved by controlling race conditions and memory leaks, during design time. We prove that the system specification is deadlock as well as livelock free and there are no invariant violations. These proofs, together with the similarity between specification model and implementation code, make us confident that the implemented system is a reliable tool which can help patients during seasonal depression
Cross-species pathogen spillover across ecosystem boundaries: mechanisms and theory
Pathogen spillover between different host species is the trigger for many infectious disease outbreaks and emergence events, and ecosystem boundary areas have been suggested as spatial hotspots of spillover. This hypothesis is largely based on suspected higher rates of zoonotic disease spillover and emergence in fragmented landscapes and other areas where humans live in close vicinity to wildlife. For example, Ebola virus outbreaks have been linked to contacts between humans and infected wildlife at the rural-forest border, and spillover of yellow fever via mosquito vectors happens at the interface between forest and human settlements. Because spillover involves complex interactions between multiple species and is difficult to observe directly, empirical studies are scarce, particularly those that quantify underlying mechanisms. In this review, we identify and explore potential ecological mechanisms affecting spillover of pathogens (and parasites in general) at ecosystem boundaries. We borrow the concept of ‘permeability’ from animal movement ecology as a measure of the likelihood that hosts and parasites are present in an ecosystem boundary region. We then discuss how different mechanisms operating at the levels of organisms and ecosystems might affect permeability and spillover. This review is a step towards developing a general theory of cross-species parasite spillover across ecosystem boundaries with the eventual aim of improving predictions of spillover risk in heterogeneous landscapes
Predictable arguments of knowledge
We initiate a formal investigation on the power of predictability for argument of knowledge systems for NP. Specifically, we consider private-coin argument systems where the answer of the prover can be predicted, given the private randomness of the verifier; we call such protocols Predictable Arguments of Knowledge (PAoK).
Our study encompasses a full characterization of PAoK, showing that such arguments can be made extremely laconic, with the prover sending a single bit, and assumed to have only one round (i.e., two messages) of communication without loss of generality.
We additionally explore PAoK satisfying additional properties (including zero-knowledge and the possibility of re-using the same challenge across multiple executions with the prover), present several constructions of PAoK relying on different cryptographic tools, and discuss applications to cryptography
Chosen-ciphertext security from subset sum
We construct a public-key encryption (PKE) scheme whose
security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012
The Iowa Homemaker vol.5, no.7
Table of Contents
The True Spirit of Christmas by Dr. O. H. Cessna, page 1
Something Different for Christmas Greetings by Elizabeth Johnson, page 2
The Purchase Price of Beauty by Dr, Elizabeth Hoyt, page 3
Can You Visualize Your Hat Problem by Florence Faust, page 4
Decorating the Christmas Tree by Margaret Ericson, page 5
Christmas – For Him by Dorothy Harp and Louise Corsaut, page 5
With Iowa State Home Economics Association, page 6
Preparing the Girl for Motherhood by Dr. Florence Brown Sherborn, page 7
Girls’ 4-H Clubs, page 10
Fuel Economy in the Kitchen by Miriam Rapp, page 11
When We Are Very Young by Anna Johnson, page 12
Editorial, page 13
Who’s There and Where, page 14
Eternal Question, page 16
If You Would Have Health by Margaret Whistler, page 1
New calibration techniques for the Airborne Visible/Infrared Imaging Spectrometer (AVIRIS)
Recent laboratory calibrations of the Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) include new methods for the characterization of the geometric, spectral, temporal and radiometric properties of the sensor. New techniques are desired in order to: (1) increase measurement accuracy and precision, (2) minimize measurement time and expense, (3) prototype new field and inflight calibration systems, (4) resolve measurement ambiguities, and (5) add new measurement dimensions. One of the common features of these new methods is the use of the full data collection and processing power of the AVIRIS instrument and data facility. This allows the collection of large amounts of calibration data in a short period of time and is well suited to modular data analysis routines
- …