On detectable and non-detectable structural change

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Detectable and Non-detectable Structural Change

A range of parameter changes in I(1) cointegrated time series are not reflected in econometric models thereof, in that many shifts are not easily detected by conventional tests. The breaks in question are changes that leave the unconditional expectations of the I(0) components unaltered. Thus, dynamics, adjustment speeds etc. may alter without detection. However, shifts in long-run means are ge...

متن کامل

observationally detectable ?

Using recent observational constraints on cosmological density parameters, together with recent mathematical results concerning small volume hyperbolic manifolds, we argue that, by employing pattern repetitions, the topology of nearly flat small hyperbolic universes can be observationally undetectable. This is important in view of the facts that quantum cosmology may favour hyperbolic universes...

متن کامل

On Detectable and Meaningful Speech-Intelligibility Benefits.

The most important parameter that affects the ability to hear and understand speech in the presence of background noise is the signal-to-noise ratio (SNR). Despite decades of research in speech intelligibility, it is not currently known how much improvement in SNR is needed to provide a meaningful benefit to someone. We propose that the underlying psychophysical basis to a meaningful benefit sh...

متن کامل

Communication with Detectable Deceit

We analyze a model of communication with an extreme conflict of interest in which deceit is detectable with positive probability. The sender observes (possibly imprecise) information about his type, and can send any message to the receiver at no cost. If he lies---either by claiming more precise information or a false type---his message ends up incoherent with positive probability. In any infor...

متن کامل

Report on “Honeywords: Making Password-Cracking Detectable”

Passwords are a notoriously weak authentication mechanism. Users frequently choose poor passwords. Paper focuses on "Stolen files of password hashes" scenario where an adversary has obtained a copy of the file F of usernames and associated hashed passwords, and has obtained the values of the salt or other parameters required to compute the hash function H. In this scenario, the adversary can pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Structural Change and Economic Dynamics

سال: 2000

ISSN: 0954-349X

DOI: 10.1016/s0954-349x(00)00020-5