Dynamic Speculative Attacks

نویسنده

  • Christophe Chamley
چکیده

The paper presents a model of rational Bayesian agents with speculative attacks in a regime of exchange rate which is pegged within a band. Speculators learn from the observation of the exchange rate within the band whether their mass is sufficiently large for a successful attack. Multiple periods are necessary for the existence of speculative attacks. Various defense policies are analyzed. A trading policy by the central bank may defend the peg if it is unobserved and diminishes the market’s information for the coordination of speculators.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effects of Economic Sanctions and Speculative Attacks on Inflation

This paper surveys the persian monetary crises due to economic sanctions and speculative attacks that leads to high inflation. Economic sanctions are associated with various forms of trade barriers and restriction on financial transactions. Among the most influential sanctions on Iran's oil export and central bank sanctions are noted that their Aims to reduce Iran's oil revenues and Devaluation...

متن کامل

Defending Against Speculative Attacks: Reputation, Learning, and Coordination

How does the central bank’s incentive to build a reputation affect speculators’ ability to coordinate and the likelihood of the devaluation outcome during speculative currency crises? What role does market information play in speculators’ coordination and the central bank’s reputation building? I address these questions in a dynamic regime change game that highlights the interaction between the...

متن کامل

SOM-based data analysis of speculative attacks' real effects

In some cases, currency crises are followed by strong recessions (e.g., recent Asian and Argentinean crises), but in other cases they are not. This paper uses Self-Organizing Maps (SOM) to search for meaningful associations between speculative attacks’ real effects and 28 variables that characterize the economic, financial, legal, and socio-political structure of the country at the onset of the...

متن کامل

Spectre Attacks: Exploiting Speculative Execution

Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002