Showing 31 - 40 of 1,621
Malawi and other countries do not provide quarterly data on Gross Domestic Product (GDP) and other economic variables. The paper serves to address this problem by providing the reader with knowledge on how to carry out the interpolation of quarterly data from yearly aggregates
Persistent link: https://www.econbiz.de/10013005845
. We also provide a companion package and replication code that implements the method in R …
Persistent link: https://www.econbiz.de/10013035069
Persistent link: https://www.econbiz.de/10011901169
Persistent link: https://www.econbiz.de/10013409113
In regression analysis, the presence of outliers in the data set can strongly distort the classical least squares estimator and lead to unreliable results. To deal with this, several robust-to-outliers methods have been proposed in the statistical literature. In Stata, some of these methods are...
Persistent link: https://www.econbiz.de/10014209543
Treatment effects may vary with the observed characteristics of the treated, often with important implications. In the context of experimental data, a growing literature deals with the problem of specifying treatment interaction terms that most effectively capture this variation. Some of the...
Persistent link: https://www.econbiz.de/10013094279
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071
information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT … discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research … literature so far. Second, we conduct a detailed security analysis of the most influential standard Object Naming Service (ONS …
Persistent link: https://www.econbiz.de/10009467072
Rapide Fortschritte in der Netzwerk- und Speichertechnologie haben dazu geführt, dass Informationen über viele verschiedene Quellen wie z.B. Personal Computer oder Datenbanken verstreut sind. Weil diese Informationen oft auch sehr heterogen sind, wurde gleichzeitig die Entwicklung effektiver...
Persistent link: https://www.econbiz.de/10009467121