23,324 research outputs found
Choices under Risk in Rural Peru
This paper estimates the risk preferences of cotton farmers in Southern Peru, using the results from a multiple-price-list lottery game. Assuming that preferences conform to two of the leading models of decision under risk--Expected Utility Theory (EUT) and Cumulative Prospect Theory (CPT)--we find strong evidence of moderate risk aversion. Once we include individual characteristics in the estimation of risk parameters, we observe that farmers use subjective nonlinear probability weighting, a behavior consistent with CPT. Interestingly, when we allow for preference heterogeneity via the estimation of mixture models--where the proportion of subjects who behave according to EUT or to CPT is endogenously determined--we find that the majority of farmers' choices are best explained by CPT. We further hypothesize that the multiple switching behavior observed in our sample can be explained by nonlinear probability weighting made in a context of large random calculation mistakes; the evidence found on this regard is mixed. Finally, we find that attaining higher education is the single most important individual characteristic correlated with risk preferences, a result that suggests a connection between cognitive abilities and behavior towards risk.
Foreign Direct Investment in a Late Industrialising Country: The Portuguese IDP Revisited
This article uses the investment development path to analyse the evolution of Portugal’s competitiveness in recent years. This is interpreted as the country’s capacity to both attract and engage in foreign direct investment. The estimation of the Portuguese IDP confirms previous claims that Portugal has joined other late industrialising countries as a 'stage 4' country, but that this position may not be consolidated. Outward FDI, albeit limited in terms of the number of firms and destinations, seems to show most characteristics expected at this stage of development. However, the fading of export-oriented inward FDI during the 1990s represents a danger in a country where FDI has been critical for market access and industrial diversification despite a much smaller weight in the economy than in other OECD countries.Investment Development Path, Inward FDI, Outward FDI, Portugal
Some results on rational surfaces and Fano varieties
The goal of this article is to study the equations and syzygies of embeddings
of rational surfaces and certain Fano varieties. Given a rational surface X and
an ample and base-point-free line bundle L on X, we give an optimal numerical
criterion for L to satisfy property Np. This criterion turns out to be a
characterization of property Np if X is anticanonical. We also prove syzygy
results for adjunction bundles and a Reider type theorem for higher syzygies.
For certain Fano varieties we also prove results on very ampleness and higher
syzygies.Comment: 26 pages, AMSTe
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
In this work we present and formally analyze CHAT-SRP (CHAos based
Tickets-Secure Registration Protocol), a protocol to provide interactive and
collaborative platforms with a cryptographically robust solution to classical
security issues. Namely, we focus on the secrecy and authenticity properties
while keeping a high usability. In this sense, users are forced to blindly
trust the system administrators and developers. Moreover, as far as we know,
the use of formal methodologies for the verification of security properties of
communication protocols isn't yet a common practice. We propose here a
methodology to fill this gap, i.e., to analyse both the security of the
proposed protocol and the pertinence of the underlying premises. In this
concern, we propose the definition and formal evaluation of a protocol for the
distribution of digital identities. Once distributed, these identities can be
used to verify integrity and source of information. We base our security
analysis on tools for automatic verification of security protocols widely
accepted by the scientific community, and on the principles they are based
upon. In addition, it is assumed perfect cryptographic primitives in order to
focus the analysis on the exchange of protocol messages. The main property of
our protocol is the incorporation of tickets, created using digests of chaos
based nonces (numbers used only once) and users' personal data. Combined with a
multichannel authentication scheme with some previous knowledge, these tickets
provide security during the whole protocol by univocally linking each
registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl
- …