1,168 research outputs found

    The management of de-cumulation risks in a defined contribution environment

    Get PDF
    The aim of the paper is to lay the theoretical foundations for the construction of a flexible tool that can be used by pensioners to find optimal investment and consumption choices in the distribution phase of a defined contribution pension scheme. The investment/consumption plan is adopted until the time of compulsory annuitization, taking into account the possibility of earlier death. The effect of the bequest motive and the desire to buy a higher annuity than the one purchasable at retirement are included in the objective function. The mathematical tools provided by dynamic programming techniques are applied to find closed form solutions: numer-ical examples are also presented. In the model, the trade-off between the different desires of the individual regarding consumption and final annuity can be dealt with by choosing appropriate weights for these factors in the setting of the problem. Conclusions are twofold. Firstly, we find that there is a natural time-varying target for the size of the fund, which acts as a sort of safety level for the needs of the pensioner. Secondly, the personal preferences of the pensioner can be translated into optimal choices, which in turn affect the distribution of the consumption path and of the final annuity

    Classification of cryptocurrency coins and tokens by the dynamics of their market capitalisations

    Full text link
    We empirically verify that the market capitalisations of coins and tokens in the cryptocurrency universe follow power-law distributions with significantly different values, with the tail exponent falling between 0.5 and 0.7 for coins, and between 1.0 and 1.3 for tokens. We provide a rationale for this, based on a simple proportional growth with birth & death model previously employed to describe the size distribution of firms, cities, webpages, etc. We empirically validate the model and its main predictions, in terms of proportional growth (Gibrat's law) of the coins and tokens. Estimating the main parameters of the model, the theoretical predictions for the power-law exponents of coin and token distributions are in remarkable agreement with the empirical estimations, given the simplicity of the model. Our results clearly characterize coins as being "entrenched incumbents" and tokens as an "explosive immature ecosystem", largely due to massive and exuberant Initial Coin Offering activity in the token space. The theory predicts that the exponent for tokens should converge to 1 in the future, reflecting a more reasonable rate of new entrants associated with genuine technological innovations

    Towards Detecting Compromised Accounts on Social Networks

    Get PDF
    Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our previous work, we demonstrated how we can detect large-scale compromises (i.e., so-called campaigns) of regular online social network users. In this work, we show how we can use similar techniques to identify compromises of individual high-profile accounts. High-profile accounts frequently have one characteristic that makes this detection reliable -- they show consistent behavior over time. We show that our system, were it deployed, would have been able to detect and prevent three real-world attacks against popular companies and news agencies. Furthermore, our system, in contrast to popular media, would not have fallen for a staged compromise instigated by a US restaurant chain for publicity reasons

    From Theory to Practice: Plug and Play with Succinct Data Structures

    Full text link
    Engineering efficient implementations of compact and succinct structures is a time-consuming and challenging task, since there is no standard library of easy-to- use, highly optimized, and composable components. One consequence is that measuring the practical impact of new theoretical proposals is a difficult task, since older base- line implementations may not rely on the same basic components, and reimplementing from scratch can be very time-consuming. In this paper we present a framework for experimentation with succinct data structures, providing a large set of configurable components, together with tests, benchmarks, and tools to analyze resource requirements. We demonstrate the functionality of the framework by recomposing succinct solutions for document retrieval.Comment: 10 pages, 4 figures, 3 table

    Laser thermal ablation to treat a recurrent soft-tissue sarcoma of the leg : A case report

    Get PDF
    We present the case of a 52-year-old male patient with recurrence of a soft-tissue sarcoma of the left leg treated with percutaneous laser ablation. The patient received the diagnosis of sarcoma for the first time in 2011; further local recurrences and a pulmonary metastatic spread occurred during follow-up, so the patient has been treated several times with chemotherapy, limb-sparing surgery and radiotherapy. In September 2017, a new local recurrence of sarcoma occurred, for which limb amputation was proposed but refused by the patient. Laser ablation with ultrasound guidance was performed, with complete ablation at 6 months and limb salvage

    Pancreatic ablation : minimally invasive treatment options

    Get PDF
    Despite the significant improvement of knowledge and technologies in tumor treatments, pancreatic tumor remains a complex disease still characterized by a poor prognosis. The increasing role of minimally invasive techniques started to drive the effort of scientific medicine to evaluate the possibilities of application of these techniques to pancreatic cancer. The purpose of this paper is to present a brief summary of the different ablative techniques available and proposed for pancreatic tumor treatment considering invasive, noninvasive, thermal and non-thermal techniques

    The SU(3) deconfining phase transition with Symanzik action

    Get PDF
    We report on the determination of the deconfining temperature in SU(3) pure gauge theory, using the Symanzik tree level improved action, on lattices of size 3 x 12^3, 4 x 16^3, 5 x 20^3, 6 x24^3. We find that the asymptotic scaling violation pattern is similar to the one observed using the Wilson action. We conclude that the irrelevant operators do not affect, in the range of couplings considered, the lattice beta function. An analysis based on an effective coupling formulation shows an apparent improvement.Comment: 8 pages, report IFUP-TH 12/9

    Évolutions récentes de la productivité : accélération structurelle dans la zone euro et ralentissement structurel aux États-Unis ?

    Get PDF
    La croissance de la productivité dans la zone euro et aux États-Unis a connu sur la période récente des inflexions significatives, respectivement à la hausse et à la baisse, qui sembleraient relever en partie d’évolutions structurelles.Productivité, technologies de l’information et de la communication (TIC), dynamique sectorielle, évolutions structurelles.

    Drops for stuff: An analysis of reshipping mule scams

    Get PDF
    Credit card fraud has seen rampant increase in the past years, as customers use credit cards and similar financial instruments frequently. Both online and brick-and-mortar outfits repeatedly fall victim to cybercriminals who siphon off credit card information in bulk. Despite the many and creative ways that attackers use to steal and trade credit card information, the stolen information can rarely be used to withdraw money directly, due to protection mechanisms such as PINs and cash advance limits. As such, cybercriminals have had to devise more advanced monetization schemes towork around the current restrictions. One monetization scheme that has been steadily gaining traction are reshipping scams. In such scams, cybercriminals purchase high-value or highly-demanded products from online merchants using stolen payment instruments, and then ship the items to a credulous citizen. This person, who has been recruited by the scammer under the guise of "work-from-home" opportunities, then forwards the received products to the cybercriminals, most of whom are located overseas. Once the goods reach the cybercriminals, they are then resold on the black market for an illicit profit. Due to the intricacies of this kind of scam, it is exceedingly difficult to trace, stop, and return shipments, which is why reshipping scams have become a common means for miscreants to turn stolen credit cards into cash. In this paper, we report on the first large-scale analysis of reshipping scams, based on information that we obtained from multiple reshipping scam websites. We provide insights into the underground economy behind reshipping scams, such as the relationships among the various actors involved, the market size of this kind of scam, and the associated operational churn. We find that there exist prolific reshipping scam operations, with one having shipped nearly 6,000 packages in just 9 months of operation, exceeding 7.3 million US dollars in yearly revenue, contributing to an overall reshipping scam revenue of an estimated 1.8 billion US dollars per year. Finally, we propose possible approaches to intervene and disrupt reshipping scam services
    • …
    corecore