On detectable and non-detectable structural change
نویسندگان
چکیده
منابع مشابه
On Detectable and Non-detectable Structural Change
A range of parameter changes in I(1) cointegrated time series are not reflected in econometric models thereof, in that many shifts are not easily detected by conventional tests. The breaks in question are changes that leave the unconditional expectations of the I(0) components unaltered. Thus, dynamics, adjustment speeds etc. may alter without detection. However, shifts in long-run means are ge...
متن کاملobservationally detectable ?
Using recent observational constraints on cosmological density parameters, together with recent mathematical results concerning small volume hyperbolic manifolds, we argue that, by employing pattern repetitions, the topology of nearly flat small hyperbolic universes can be observationally undetectable. This is important in view of the facts that quantum cosmology may favour hyperbolic universes...
متن کاملOn Detectable and Meaningful Speech-Intelligibility Benefits.
The most important parameter that affects the ability to hear and understand speech in the presence of background noise is the signal-to-noise ratio (SNR). Despite decades of research in speech intelligibility, it is not currently known how much improvement in SNR is needed to provide a meaningful benefit to someone. We propose that the underlying psychophysical basis to a meaningful benefit sh...
متن کاملCommunication with Detectable Deceit
We analyze a model of communication with an extreme conflict of interest in which deceit is detectable with positive probability. The sender observes (possibly imprecise) information about his type, and can send any message to the receiver at no cost. If he lies---either by claiming more precise information or a false type---his message ends up incoherent with positive probability. In any infor...
متن کاملReport on “Honeywords: Making Password-Cracking Detectable”
Passwords are a notoriously weak authentication mechanism. Users frequently choose poor passwords. Paper focuses on "Stolen files of password hashes" scenario where an adversary has obtained a copy of the file F of usernames and associated hashed passwords, and has obtained the values of the salt or other parameters required to compute the hash function H. In this scenario, the adversary can pe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Structural Change and Economic Dynamics
سال: 2000
ISSN: 0954-349X
DOI: 10.1016/s0954-349x(00)00020-5