1,333 research outputs found

    Commodity prices, commodity currencies, and global economic developments

    Get PDF
    In this paper we seek to produce forecasts of commodity price movements that can systematically improve on naive statistical benchmarks, and revisit the forecasting performance of changes in commodity currencies as efficient predictors of commodity prices, a view emphasized in the recent literature. In addition, we consider different types of factor-augmented models that use information from a large data set containing a variety of indicators of supply and demand conditions across major developed and developing countries. These factor-augmented models use either standard principal components or partial least squares (PLS) regression to extract dynamic factors from the data set. Our forecasting analysis considers ten alternative indices and sub-indices of spot prices for three different commodity classes across different periods. We .find that the exchange rate-based model and especially the PLS factor-augmented model are more prone to outperform the naive statistical benchmarks. However, across our range of commodity price indices we are not able to generate out-of-sample forecasts that, on average, are systematically more accurate than predictions based on a random walk or autoregressive specifications.

    Productivity Spillovers, Terms of Trade and the "Home Market Effect"

    Get PDF
    This paper analyzes the welfare implications of international spillovers related to productivity gains, changes in market size, or government spending. We introduce trade costs and endogenous varieties in a two-country general-equilibrium model with monopolistic competition, drawing a distinction between productivity gains that enhance manufacturing efficiency, and gains that lower the cost of firms' entry and product differentiation. Our model suggests that countries with lower manufacturing costs have higher GDP but supply a smaller number of goods at a lower international price. Countries with lower entry and differentiation costs also have higher GDP, but supply a larger array of goods at improved terms of trade. The sign of the international welfare spillovers depends on terms of trade, but also on consumers' taste for variety. Higher domestic demand has macroeconomic implications that are similar to those of a reduction in firms' entry costs.

    A Center-Periphery Model of Monetary Coordination and Exchange Rate Crises

    Get PDF
    The paper analyzes the modalities and consequences of a breakdown of cooperation between the monetary authorities of inflation-prone Periphery Countries that use an exchange rate peg as an anti- inflationary device, when the Center is hit by an aggregate demand shock. Cooperation in the Periphery is constrained to be symmetric: costs and benefits must be equal for all. Our model suggests that there are at least two ways in which a generalized crisis of the exchange rate system may emerge. The first is when the constrained cooperative response of the Periphery is a moderate common devaluation while the non-cooperative equilibrium has large devaluations by a few countries. An exchange rate crisis emerges if Periphery countries give in to their individual incentives to renege on the cooperative agreement. In the second case, the Center shock is not large enough to trigger a general devaluation in the constrained cooperative equilibrium; yet some of the Periphery countries would devalue in the Nash equilibrium, making the monetary stance in the system more expansionary. In this case, reversion to Nash is collectively rational. We offer this model as a useful parable for interpreting the collapse of the EMR in 1992-93.

    Perforate and Imperforate Currency Bands: Exchange Rate Management and the Term Structure of Interest Rate Differentials

    Get PDF

    Waterborne GPR survey for estimating bottom-sediment variability: A survey on the Po River, Turin, Italy

    Get PDF
    We conducted an integrated geophysical survey on a stretch of the river Po in order to check the GPR ability to discriminate the variability of riverbed sediments through an analysis of the bottom reflection amplitudes. We conducted continuous profiles with a 200-MHzGPR system and a handheld broadband EM sensor.Aconductivity meter and a TDR provided punctual measurements of water conductivity, permittivity, and temperature. The processing and interpretation of the GEM-2 and GPR data were enhanced by reciprocal results and by integration with the punctual measurements of the EM properties of the water. We used a processing flow that improved the radargram images and preserved the amplitude ratios among the different profiles and the frequency content at the bottom reflection signal.We derived the water attenuation coefficient both from the punctual measurements using the Maxwell formulas and from the interpretation of the GPR data, finding an optimal matching between the two values. The GPR measurements provided maps of the bathymetry and of the bottom reflection amplitude. The high reflectivity of the riverbed, derived from the GPR interpretation, agreed with the results of the direct sampling campaign that followed the geophysical survey. The variability of the bottom-reflection-amplitudes map, which was not confirmed by the direct sampling, could also have been caused by scattering phenomena due to the riverbed clasts which are dimensionally comparable to the wavelength of the radar pulse

    CoSMed: a confidentiality-verified social media platform

    Get PDF
    This paper describes progress with our agenda of formal verification of information flow security for realistic systems. We present CoSMed, a social media platform with verified document confidentiality. The system’s kernel is implemented and verified in the proof assistant Isabelle/HOL. For verification, we employ the framework of Bounded-De- ducibility (BD) Security, previously introduced for the conference system CoCon. CoSMed is a second major case study in this framework. For CoSMed, the static topology of declas- sification bounds and triggers that characterized previous instances of BD Security has to give way to a dynamic integration of the triggers as part of the bounds. We also show that, from a theoretical viewpoint, the removal of triggers from the notion of BD Security does not restrict its expressiveness

    CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees

    Get PDF
    We present the design, implementation and information flow verification of CoSMeDis, a distributed social media platform. The system consists of an arbitrary number of communicating nodes, deployable at different locations over the Internet. Its registered users can post content and establish intra-node and inter-node friendships, used to regulate access control over the posts. The system’s kernel has been verified in the proof assistant Isabelle/HOL and automatically extracted as Scala code. We formalized a framework for composing a class of information flow security guarantees in a distributed system, applicable to input/output automata. We instantiated this framework to confidentiality properties for CoSMeDis’s sources of information: posts, friendship requests, and friendship status
    corecore