• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 568
Next 10 →

Resurrecting the (C)CAPM: A Cross-Sectional Test When Risk Premia Are Time-Varying

by Martin Lettau, Sydney Ludvigson, John Heaton, Ravi Jagannathan, Timothy Simin, Robert Vishny - Journal of Political Economy , 2001
"... This paper explores the ability of conditional versions of the CAPM and the consumption CAPM—jointly the (C)CAPM—to explain the cross section of average stock returns. Central to our approach is the use of the log consumption–wealth ratio as a conditioning variable. We demonstrate that such conditio ..."
Abstract - Cited by 246 (10 self) - Add to MetaCart
that such conditional models perform far better than unconditional specifications and about as well as the Fama-French three-factor model on portfolios sorted by size and book-to-market characteristics. The conditional consumption CAPM can account for the difference in returns between low-book-to-market and high

Unconditional Convergence in Manufacturing

by Dani Rodrik - Quarterly Journal of Economics , 2013
"... Unlike economies as a whole, manufacturing industries exhibit strong un-conditional convergence in labor productivity. The article documents this at various levels of disaggregation for a large sample covering more than 100 countries over recent decades. The result is highly robust to changes in the ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
in the sample and specification. The coefficient of unconditional convergence is esti-mated quite precisely and is large, at between 2–3 % in most specifications and 2.9 % a year in the baseline specification covering 118 countries. The article also finds substantial sigma-convergence at the two-digit level

The neural basis of unconditional love

by Mario Beauregard , Jérôme Courtemanche , Vincent Paquette , Évelyne Landry , St-Pierre - Psychiatry Research , 2009
"... Functional neuroimaging studies have shown that romantic love and maternal love are mediated by regions specific to each, as well as overlapping regions in the brain's reward system. Nothing is known yet regarding the neural underpinnings of unconditional love. The main goal of this functional ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Functional neuroimaging studies have shown that romantic love and maternal love are mediated by regions specific to each, as well as overlapping regions in the brain's reward system. Nothing is known yet regarding the neural underpinnings of unconditional love. The main goal

Quantum bit commitment and unconditional security

by Horace P. Yuen , 2002
"... It is generally believed that unconditionally secure quantum bit commitment is impossible, due to widespread acceptance of an impossibility proof that utilizes quantum entaglement cheating. In this paper, we delineate how the impossibiliy proof formulation misses various types of quantum bit commitm ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
is described and proved unconditionally secure. The security proof of a specific Type 2 protocol is also sketched. The security of Type 3 protocols is as yet open.

Unconditionally Secure Quantum Payment System

by Essam Al-daoud
"... Abstract—A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors

Unconditional characterizations of non-interactive zeroknowledge

by Rafael Pass, Abhi Shelat - In Advances in Cryptology--CRYPTO '05 , 2005
"... Abstract. Non-interactive zero-knowledge (NIZK) proofs have been investigated in two models: the Public Parameter model and the Secret Parameter model. In the former, a public string is “ideally ” chosen according to some efficiently samplable distribution and made available to both the Prover and V ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
and Verifier. In the latter, the parties instead obtain correlated (possibly different) private strings. To add further choice, the definition of zero-knowledge in these settings can either be non-adaptive or adaptive. In this paper, we obtain several unconditional characterizations of computational

Unconditionally Secure Quantum Payment System

by unknown authors
"... serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fun ..."
Abstract - Add to MetaCart
of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction

Unconditionally secure digital signature schemes admitting transferability

by Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai - In Proc. ASIACRYPT’00, Kyoto, December 3–7 , 2000
"... Abstract. A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices such as quantum computers. Therefore while these signature schemes represent an e ..."
Abstract - Cited by 9 (5 self) - Add to MetaCart
. More specifically, we establish a model for unconditionally secure digital signatures in a group, and demonstrate practical schemes in that model. An added advantage of the schemes is that they allow unlimited transfer of signatures without compromising the security of the schemes. Our scheme

Artin’s conjecture -- Unconditional approach and elliptic analogue

by Sourav Sen Gupta - MASTER’S THESIS , 2008
"... In this thesis, I have explored the different approaches towards proving Artin’s ‘primitive root ’ conjecture unconditionally and the elliptic curve analogue of the same. This conjecture was posed by E. Artin in the year 1927, and it still remains an open problem. In 1967, C. Hooley proved the con ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
the conjecture based on the assumption of the generalized Riemann hypothesis. Thereafter, the mathematicians tried to get rid of the assumption and it seemed quite a daunting task. In 1983, the pioneering attempt was made by R. Gupta and M. Ram Murty, who proved unconditionally that there exists a specific set

Policy Brief: Impacts of Unconditional Cash Transfers ∗

by Johannes Haushofer, Jeremy Shapiro , 2013
"... Direct transfers are a common approach to poverty reduction. Historically, such programs have often made in-kind transfers, as in the case of food aid, asset transfers (e.g. livestock), or the provision of medical care. 1 In recent years, cash transfers have garnered attention as a potential alterna ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
alternative poverty alleviation strategy, and cash transfer programs in developing countries now reach up to a billion people. 2 However, the majority of these transfers are conditional, or targeted at specific groups of individuals. 3 Truly unconditional cash transfers to general populations are relatively
Next 10 →
Results 1 - 10 of 568
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University