منابع مشابه
Labor Market Search, Sticky Prices, and Interest Rate Policies
What accounts for the significant real effects of monetary policy shocks? And what accounts for the persistent and hump shaped responses of output and inflation in response to such shocks? These questions are investigated in a model that incorporates labor market search, habit persistence, sticky prices, and policy inertia. While habit persistence and price stickiness are important for the hump...
متن کاملAdverse Selection, Search Costs and Sticky Credit Card Rates
Several scholars of financial economics observed that during the 1980s, market interest rates declined continuously with little or no impact on credit card rates. Recently, Meyercord (1994), Sinkey and Nash (1993), and Sullivan and Worden (1995) recorded sigmficant changes in the credit card market intffcating an increased level of competition. This study represents an attempt to determine the ...
متن کاملSticky Prices vs . Sticky Information
The working papers published in the Series constitute work in progress circulated to stimulate discussion and critical comments. Views expressed represent exclusively the authors' own opinions and do not necessarily refl ect those of the editors. Die Deutsche Bibliothek verzeichnet diese Publikation in der deutschen National-bibliografi e; detaillierte bibliografi sche Daten sind im Internet üb...
متن کاملOn Private Similarity Search Protocols
In a private similarity search (PSS) protocol, a client receives from the database the entry, closest to her query, without either the client or the database getting to know more information than necessary. PSS protocols have potentially wide application in areas like bioinformatics, where precise queries might be impossible. We show that the previously proposed PSS protocols by Du and Atallah ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Cell Biology
سال: 2002
ISSN: 1465-7392,1476-4679
DOI: 10.1038/ncb0402-e80