Cryptographic techniques used to provide integrity of digital content in long-term storage

Size: px
Start display at page:

Download "Cryptographic techniques used to provide integrity of digital content in long-term storage"

Transcription

1 RB/3/2011 Crypographc echnques used o provde negry of dgal conen n long-erm sorage REPORT ON THE PROBLEM

2 Problem presened by Marn Šmka Paweł Wojcechowsk Polsh Secury Prnng Works (PWPW) 1

3 Repor auhors Małgorzaa Bladoszewska (Unversy of Warsaw) Tomasz Brożek (Warsaw School of Informaon Technology) Mchał Zając (Unversy of Warsaw) Conrbuors Lucyna Ceślk (Polsh Academy of Scences) Mara Donen-Bury (Unversy of Warsaw) Kaml Kulesza (Polsh Academy of Scence) John Ockendon (Unversy of Oxford) Łukasz Sener (Polsh Academy of Scences) Por Wojdyłło (Polsh Academy of Scences) Wladmr Zubkow (Unversy of Oxford) was jonly organsed by Sysem Research Insue of he Polsh Academy of Scences Insue of Mahemacs of he Polsh Academy of Scences Oxford Cenre for Collaborave Appled Mahemacs and was suppored by Sygny S.A. Indusral Developmen Agency Jon Sock Company under he honorary paronage of The Brsh Embassy n Poland 2

4 Execuve Summary The man objecve of he projec was o oban advanced mahemacal mehods o guaranee he verfcaon ha a requred level of daa negry s mananed n long-erm sorage. The secondary objecve was o provde mehods for he evaluaon of daa loss and recovery. Addonally, we have provded he followng nal consrans for he problem: a lmaon of addonal sorage space, a mnmal hreshold for desred level of daa negry and a defned probably of a sngle-b corrupon. Wh regard o he man objecve, he sudy group focused on he exploraon mehods based on hash values. I has been ndcaed ha n he case of gh consrans, suggesed by PWPW, s no possble o provde any mehod based only on he hash values. Ths observaon sems from he fac ha he hgh probably of b corrupon leads o unaccepably large number of broken hashes, whch n urn sands n conradcon wh he lmaon for addonal sorage space. However, havng loosened he nal consrans o some exen, he sudy group has proposed wo mehods ha use only he hash values. The frs mehod, based on a smple scheme of daa subdvson n dsjon subses, has been provded as a benchmark for oher mehods dscussed n hs repor. The second mehod ( hypercube mehod), nroduced as a ype of he wder class of clever-subdvson mehods, s bul on he concep of rewrng daa-sream no a n-dmensonal hypercube and calculang hash values for some parcular (overlappng) secons of he cube. We have obaned neresng resuls by combnng hash value mehods wh error-correcon echnques. The proposed framework, based on he BCH codes, appears o have promsng properes, hence furher research n hs feld s srongly recommended. As a par of he repor we have also presened feaures of secre sharng mehods for he benef of novel dsrbued daa-sorage scenaros. We have provded an overvew of some neresng aspecs of secre sharng echnques and several examples of possble applcaons. 3

5 Table of conens 1 INTRODUCTION PROBLEM DESCRIPTION PROBLEM BREAKDOWN HASH FUNCTIONS BASICS RESTRICTIONS ON USING HASH FUNCTIONS ALTERNATIVE DIVISION METHOD HASH CODES WITH ERROR CORRECTION SECURE SECRET SHARING METHOD BASIC CAPABILITIES EXTENDED CAPABILITIES COMBINING PROPERTIES ADDITIONAL CONSIDERATIONS OPEN QUESTIONS CONCLUSION AND PROPOSALS FOR FURTHER RESEARCH HASH FUNCTIONS SECRET SHARING METHOD OTHER POSSIBILITIES BIBLIOGRAPHY APPENDIX HYPERCUBE MODEL

6 1 Inroducon 1.1 Problem descrpon (1.1.1) The ncrease n he amoun of daa, boh creaed and sored elecroncally, enals he necessy o consruc varous daa sorage sysems. In he vew of dfferen requesed sorage perods, we dvde sysems no: shor-erm sorage perod no longer han 3 years, medum-erm sorage perod beween 3 and 10 years, long-erm sorage perod longer han 10 years, bu wh a specfed end-dae, unlmed sorage perod longer han 10 years wh no specfed end-dae. (1.1.2) The unlmed sorage s somemes called eernal. In hs case we have o pay specal aenon o he negry of he sored dgal conen. For hs reason, varous dgal markng echnques are used, so ha even afer a long me one should be able o verfy he negry of sored daa. (1.1.3) The man objecve s o use advanced mahemacal mehods, especally crypographc echnques appled n he process of dgal markng of he conen. These echnques ough o guaranee verfcaon and negry of he long-ermsored dgal conen. (1.1.4) Proposed mehods should ake no accoun manly: dfferen knds (classes) of sored conen, e.g. culural herage, cour documenaon, accounng documenaon ec., lmaons of daabase sze, ancpaed frequency of access o sored resources. (1.1.5) Anoher very mporan aspec of he problem consss of fndng he lms on applcaons of advanced mahemacal mehods, especally hose based on crypographc echnques and checkng her applcably n he evaluaon of daa losses (e.g. due o he "corroson" of meda) as well as n a poenal daa recovery. Orgnal daa s marked as daa n me 0, whle daa ha mgh be corruped (because of corroson ) as daa n me 1. (1.1.6) Specal aenon should be pad o: Sysems and schemes of codng, whch allow for a deecon and correcon of wre errors Crypographc echnques, such as: publc-key and asymmerc encrypon, secre sharng mehods, secure mulpary compuaons. 1.2 Problem breakdown (1.2.1) A few assumpons and consrans have been proposed by he PWPW Represenave when dscussng he problem: T - amoun of sored daa R - amoun of addonal dsk space we can use, n order o provde proof of daa correcness we assume ha R 0. 1T r - b error rae (BER), we assume ha r s abou 0.01,.e. a me of esng negry of daa, 1% of all bs s corruped. 5

7 g - accuracy of gven proof of correcness, we assume ha g s abou 0.01, ha s T Tr Tg our proof should show ha a leas of daa s correc. T 0 - me of sorng he orgnal daa 1 - me of esng he negry of daa (1.2.2) The problem les n fndng such a mehod ha can be used o deermne a me 1, wh gven accuracy, he rao of he correc daa, sored a me 0 o he all daa avalable. Furhermore, s expeced ha he mehod allows assessng wheher daa s false. (1.2.3) I would be useful f he mehod proved ha daa s no corruped above a ceran hreshold value of BER. (1.2.4) Durng he alk wh he PWPW Represenave we made he followng assumpons and remarks: Errors canno be avoded. A carrer whch sores our daa s mperfec, so we can be sure ha here wll be errors n daa over long me horzon. The b error rae, amounng up o 1% of daa, s very hgh. For example, le us assume ha we have a book n whch every sngle leer s coded wh 8 bs. Due o he error rao, we ancpae abou 1 error n every sequence of 100 bs, so n every sequence of 12 leers we shall expec a wrong leer. Therefore, n hs paper we would lke o presen some soluons n whch our nal assumpons were less consraned and hs rao s assumed o be smaller. Sored daa s organzed n fles and we know he ype of every fle, lke documen, vdeo, audo, archve fles. Neverheless, we can rea daa as a sequence of bs (raw daa approach). (1.2.5) The PWPW Represenave presened an dea of usng hash funcons so as o provde a proof of correcness of parcular pars of daa. Our work shows ha he use of hash funcon only s no suffcen o complee our ask, so hash funcons wh addonal mehods of correcng errors have been consdered. We have also aken no accoun anoher way of dealng wh hashes. I s based on he dea of compung a number of hashes from dfferen dvsons of daa no blocks (a.k.a. hypercube mehod). (1.2.6) We do no have any nformaon abou physcal properes of daa carrers, so we added an assumpon of unformly dsrbuon of errors. If furher deals abou dsrbuon are avalable, our mehods can be calbraed o deal wh whou any loss of usably. (1.2.7) Havng deal wh hash funcons, we focused on a soluon based on secre sharng mehod. Due o me lmaons, however, could no have been compleed durng he workshop. Therefore, we have presened a helcoper vew of he funconales provded by secre sharng schemes. 2 Hash funcons The sarng pon for our research was a mehod based on hash funcons. In hs chaper we wll show resrcons of usng hash funcons and descrbe he man deas of exenson of such approach. 6

8 2.1 Bascs The erms and noaon used n hs secon comes, unless saed oherwse, from Handbook of Appled Crypography ( [1]). (2.1.1) The hash funcon s a well known crypographc ool, wdely appled n provdng daa negry check. The dea behnd s use n he dscussed problem s very smple we compue he value of he hash funcon for gven daa wce: a he begnnng and a he end of he sorage process. If daa s changed (loss of negry), hen hese wo hash values would mos lkely dffer, oherwse boh values reman he same. (2.1.2) In a more formal way, we can say ha hash funcon h s a funcon from k { 0,1} o l { 0,1}, whch has he followng properes 1 : A mnor change of he npu srng alers he oupu n a leas l / 2 bs. Probably of fndng a b-sream of he same hash value as anoher gven bsream s neglgble 2. Probably of fndng a b-sream of a gven hash value s neglgble. (2.1.3) In order o nroduce he noaon used n furher secons, we shall descrbe he negry check process n a more formal way: We descrbe daa by s and hash value by v, where v = h(s) a he begnnng of sorng perod (me 0 ). Afer sorage (me 1 ) daa may dffer a lle (e.g. due o he corroson), so we descrbe by s ' and he correspondng hash value by v ' = h( s' ). If v = v' hen he daa s correc wh probably almos 1, oherwse we conclude ha daa s corruped. Unforunaely, we do no know he percenage of corruped bs even f only one b changes, he whole block s corruped. 2.2 Resrcons on usng hash funcons (2.2.1) The use of hash funcons n a way presened above has some lmaons. We shall presen hem wh he followng algorhm: le us assume ha we have dvded daa no k blocks of he same lengh. For every block we compue he hash value a he begnnng and a he end of he sorage perod. Le us say ha we have deeced l corruped blocks (he approprae hash values dffer). Then he rao l / k descrbes he upper bound of he b-corrupon rao. (2.2.2) More formally, we can descrbe he procedure above n hs way: We dvde a sequence of bs s no blocks a 1,a 2,,a k of he same lengh. For = 1,2,..., k we calculae and save he value v = h( a ). Nex, we compare wh he value v' = h( a' ), ha s wh he hash funcon value compued on he block afer sorage perod. If probably almos 1, ha here were no corruped bs n he par cases we have o assume ha every b mgh be corruped. v = v', we know wh a. In oher 1 Where l < k. Secure hash funcons should have he lengh of oupu l >= 256 bs. 2 Tha s expeced me needed o oban wo b-sreams wh he same has value s exponenal o he lengh of oupu of consdered funcon. 7

9 We compue l = { {,... k} : } 1,2 v v' and denoe he value l / k as b. (2.2.3) In order o deermne he usefulness of hash funcons we calculae he expeced value of he rao l / k under consrans gven n (1.1.2). Snce bs are corruped ndependenly (as we have assumed above), we have he followng probably ha -h b s no corruped: P a ( v v' ) = (1 r) =. (1) The expeced value of he l / k reads: 1 k a E( b) = (1 P( v ' )) 1 (1 ) 1 = v = r. k = (2) As menoned n (2.1.2), he lengh of hash funcon oupu s abou 256 bs. Snce he addonal space for hash codes s R = 0. 1T, he lengh of a for = 1,2,..., k should be a leas 2560 bs long. Therefore, n hs case he expeced value of b error rae s: E ( b) = 1 (0.99) = , (3) whch s unaccepably hgh. (2.2.4) In concluson, dvdng daa no dsjon blocks and compung a hash value for each of hem o check he negry of daa s no parcularly useful when assumng he consrans gven n (1.2.1). Such consrans requre blocks o be que bg, whch makes he probably of block corrupon equal almos 1. However, removng some of consrans and usng smaller oupu blocks (e.g. 100 bs long) resuls n lower performance of he hash funcon. 2.3 Alernave dvson mehod Inroducon (2.3.1) In paragraph 2.2, we have dscussed he scheme of dvdng daa no dsjon blocks of equal lengh. Naurally, hs s no he only possble approach o he gven problem: a sngle b needs no o be only n one block and blocks may have dfferen lengh. I ranspres ha dvdng daa no blocks n a clever way leads o a beer esmaon of a corrupon rao, so ha he upper bound for he rao s closer o real value of rao. (2.3.2) Our frs sep o consruc such a clever dvson was o arrange bs n a square (as n he Fgure 1. In hs case he blocks for whch we calculae hash codes are composed as rows and columns n a square. Therefore, each b s ncluded n 2 blocks (1 row and 1 column, cf. Fgure 1). 8

10 Fgure 1 Example of arrangng daa n a square, 12 hash values are calculaed and saved 6 for rows ( v 1,1, v1,2,..., v1, 6 ) and 6 for columns ( v 2,1, v2,2,..., v2, 6 ). (2.3.3) A frs glance, seems o make no sense o dvde daa no overlappng blocks blocks would need o be longer so as o sasfy he requremen R = 0. 1T, whch ncreases he probably of corrupng a hash value. Neverheless, such an approach may provde a very good upper lm of errors n he daa f ceran assumpons are fulflled. Consder he suaon presened n he Fgure 2. Fgure 2 Vsualzaon of he gven daa afer sorage. Blocks, for whch hash value has changed, are hghlghed. As every corruped b changes he hash value eher for row and column, all poenally corruped bs are locaed on he nersecons of he hghlghed rows and columns. Le p 1, p2 be he percenages of corruped hash values n respecvely rows and columns. The percenage of corruped hash values for all blocks equals p 1 + p p 2 h = (4) 2 However, he upper bound of corruped bs s generally smaller and reads: b = p 1 p 2. (5) In he case presened n he Fgure 2 p h = 0.417, b = 0.167, r Generalzaon he hypercube mehod (2.3.4) A generalzaon of he mehod presened n (2.3.2) can be obaned by arrangng daa n a d -dmensonal hypercube (cf. Fgure 3 for 3-dmensonal case). 9

11 Fgure 3 3-dmensonal hypercube conssng of 64 cells (grey). Every cell represens 1 b of daa. Block s a subse of bs formng a secon (red, green). In hs case here are 3 16 = 48 blocks. In hs general case, f he percenages of corruped hash values n dmensons 1,2,...,d equal p 1, p2,..., pd respecvely, hen we have he followng upper bound of b error rae: b = d 1 p1 p2... pd. (6) Calculaons and opmzaon for hypercube mehod (2.3.5) I was our am o fnd such parameers of he hypercube ha he obaned upper bound of corruped bs s he bes (he lowes). A he same me, we opmzed he number of dmensons d and he sze (number of cells) S of he hypercube (dealed calculaons are presened n he Appendx). We decded o dvde he daa no pars, each conssng of S bs and make a hypercube for each of hem separaely. (2.3.6) For he purpose of calculang he expeced value of b, we assumed ha he dsrbuon of errors n he daa s unform and bs are corruped. (2.3.7) We calculaed ha hs mehod does no work for nal consrans: r = 0.01, R = 0. 1T and 256-b-long hash codes. The reason for hs dscovery s analogous o he one descrbed n Secon 2.2: for large blocks he probably of corrupng s hash value s very hgh. Therefore, we decded o change some of our assumpons. Frsly, we chose r = Secondly, we decded o use 100-b-long hash codes. Resuls (2.3.8) For he assumpons made n 2.3.7, he opmal dmenson of a hypercube s equal o 6 2 and each par consss of 4 10 bs (see Appendx). In hs mehod he expeced value of he upper bound of corruped bs s smaller han We would lke o emphasze ha dvdng daa no dsjon blocks of bs (mehod descrbed n 2.2.1) under he same assumpons would gve he expeced upper bound of corruped bs equal o The hypercube mehod lowers he upper bound of errors more han 1.6 mes. 10

12 Remarks & furher research (2.3.9) As ndcaed n (2.3.6), we assumed unform dsrbuon of errors n daa. We suspec ha hs mehod may work very badly for a specfc dsrbuon of errors. However, we beleve ha hs problem s manageable. (2.3.10) The mehod s based on arrangng daa n a hypercube and calculang hash values for secons. Generally, here mgh be oher accepable ways of dvdng daa no blocks, gvng lower expeced value of b under he same assumpons. Frsly, we can arrange daa n a hypercube and calculae hash values for oher subses of bs, for example hyper-planes. Secondly, we can abandon he dea of he hypercube and nven a compleely dfferen dvson. (2.3.11) Ths mehod does no gve a sasfyng upper bound of corruped bs for r = 0. 01, whch makes useless n some real-world applcaons. On he oher hand, f we had a mehod of measurng he level of he negry of he daa based on dvdng daa no blocks, we mgh mprove he expeced value of b by dvdng daa e.g. n a way presened n We recommend as a supporng ool. 2.4 Hash codes wh error correcon Inroducon (2.4.1) The major lmaon of he hash funcons n solvng he problem s a very hgh probably of hash value corrupon for long blocks. As menoned before, he analyss of he hash values enables us only o say wheher here are any corruped bs n a block. To calculae he upper bound, we have o assume ha all bs from he block marked as corruped may have changed. If we recognzed whch blocks are corruped only a b and whch are more corruped, hen we would be able o measure he level of he negry of daa more precsely. (2.4.2) For he purpose of such recognon, we decded o use error correcng codes. Generally, error correcng codes are bs added o orgnal daa (or par of daa), wh he am of correcng a predeermned number of errors. In our problem, we use hem n he followng way (example n he Fgure 4): 1. We dvde daa no blocks and calculae hash values for each of hem. 2. We add codes correcng up o d errors o each block. 3. Afer sorage we correc errors usng error correcng codes. 4. Afer correcon we compare saved and new hash values. If here are more han d errors n a parcular block, hen sored and calculaed hash values dffer. Oherwse, hey wll reman he same. Based on he nformaon of how many hash values are changed, we can calculae he upper lm of corruped bs. 11

13 Fgure 4 Exemplary vsualsaon of he proposed mehod. There are 4 blocks of 5 bs each. We add codes correcng 1 error (grey). Some errors occur n daa afer sorage (3.) (red). We use codes o correc hem. Fnally, we calculae hash values agan. If a number of errors n a block was bgger han 1 (lke n a second block), hen no all errors were correced and he hash value s changed. (2.4.3) In order o grasp he sgnfcance of hs mehod, consder a suaon presened n he Fgure 4. Afer he sorage here are 4 errors: 2 n orgnal daa and 2 n he added bs. If we used mehod presened n 2.2, wo blocks would be corruped. Snce we use error correcng codes, we can recognze ha n he fourh block only 1 b has changed. Moreover, we can correc hs error, whch s an added value of he mehod. Furhermore, he errors whch occur n added bs are also correced. I means ha we do no need o deal wh hem addonally. Theory (2.4.4) Durng our research we focused only on he BCH error correcng codes. We would lke o quoe he heorem, whch enabled us o make some calculaons. We wll use he followng erms: word sequence of bs; coded word a word whch we would lke o correc; conrol symbols addonal symbols (bs) used o correc errors n a coded word; codng word a coded word wh conrol symbols. (2.4.5) Below we shall presen he heorem of he BCH codes (proof n [2]): m 2 2 For each d, m Z+, d < here exss such a BCH code ha all followng m saemens are rue: Codng words are 2 m 1 long. Ths code correcs d errors n a codng word. The number of conrol symbols s d m. m Ths means ha he lengh of a coded word s 2 dm 1. 12

14 (2.4.6) One of he mos mporan conclusons of hs heorem s ha we do no need a lo of addonal space for conrol symbols. If he sze of a block s A, we need approxmaely d log A of addonal space o correc d errors. Resuls (2.4.7) We were neresed wheher we overcame he major lmaon of usng hash funcons, so we calculaed he probably of corrupng hash value. I ranspred ha usng error correcng codes combned wh hash funcons would gve sasfyng upper bound of corruped bs for r We made calculaons for dfferen values of r and R and red o choose he bes parameers m, d for hem. We assumed ha we know he BCH code correcng d errors n he 2 m 1 bs long codng word. We decded o use 100-b-long hash codes. Resuls are presened n he Table 1. Table 1. Probably of corrupng hash code dependng on he values of m, d, r, R. m d r R Probably of corrupng hash code % 0.185T < 0.1% % 0.1T < 0.01% % 0.1T < 0.7% % 0.1T < 0.4% % 0.1T < 0.5% % 0.1T < 1.6% Remarks & furher research (2.4.8) For he purpose of calculaons we assumed ha he dsrbuon of errors n he daa s unform (lke n he paragraph 2.3). Once more nformaon of error dsrbuon s avalable (e.g. he specfc sorage hardware s seleced), obaned resuls can be adaped accordngly, possbly wh mproved performance. (2.4.9) The man advanage of hs mehod s ha no only measures he level of he negry of sored daa, bu also mproves. I can also be combned wh error codes ha are already used by PWPW wh he am of enhancng performance. (2.4.10) We would lke o emphasze ha he heorem (2.4.5) guaranees only he exsence of he BCH code sasfyng some requremens. We do no know wheher effecve algorhms of consrucng such a code or codng and decodng words exs. Moreover, canno be ruled ou ha here are some oher error correcng codes whch mgh be more useful n a real world applcaon. Ths area s open for furher sudy. 3 Secure Secre Sharng Mehod Havng nvesgaed hash funcons, we shall now check a dfferen approach. Apar from ordnary verfcaon of he negry of long-erm-sored dgal conen, mgh provde some addonal feaures, namely: 13

15 exended capables n: verfcaon of he negry, recovery of corruped bs, desgn of he access srucure o he sored dgal conen; an opporuny o opmze he PWPW s requremens concernng sorage. All he feaures lsed above and many ohers can be provded by secre sharng proocols. In crypography, Secure Secre Sharng (SSS) scheme [4] s undersood as a mehod of he dsrbuon of a secre among a group of parcpans, all of hem havng her own share n he secre. The secre can be reconsruced only when auhorzed parcpans combne her shares. 3.1 Basc capables (3.1.1) By usng Secre Sharng Schemes one can sore daa dsrbued n some nsecure locaons n a secure 3 way ([3]). (3.1.2) Threshold secre sharng. A hreshold s a mnmal number of parcpans whch have o co-operae o reconsruc he secre. A scheme, where a leas ou of n players s necessary o reveal he secre s descrbed as a (, n) hreshold scheme. I allows placng securely 1 shares ousde secure locaons (e.g. own rused sysems), say, lerally dsrbue 1 shares over he Inerne. (3.1.3) Schemes for whch we can provde verfcaon of he negry of secres are called Verfable Secre Sharng (VSS). (3.1.4) A proper desgn of he access srucure mproves he funconaly of secre sharng. One of he smples access srucures was presened above every se of a leas ou of n parcpans s allowed o reconsruc he secre. More advanced srucures can be mplemened as follows: P = P,..., P } s a se of parcpans akng par n sharng. { 1 n Every famly R of subses of P can be an access srucure. We can provde dfferen levels of access for dfferen parcpans. For example, he man parcpan (PWPW) has more rghs han a rused ousder (e.g. governmenal nsuons), whch n urn has more rghs han a no rused parcpan (e.g. ones usng shares from he Inerne). Example 1 (generalsed access srucure) Our ask s o guaranee verfcaon of he negry of long-erm-sored dgal conen. For example, le us consder recordngs of speeches of famous polcans. One can dsrbue a secre among some governmenal nsuons and se he condon under whch he secre can be revealed, e.g. a leas 5 nsuons from 5 dfferen mnsres have o collaborae n order o reconsruc he secre and so on. By usng addonal parcpans wh dfferen levels of prvleges we can mnmse he probably of leakng or losng he daa. 3 In he secre sharng, here are a leas wo noons of secury: nformaon-heorecal and compuaonal secury. There are sgnfcan dfferences beween he wo ypes, ye, s raher beyond he scope of hs paper. In order o smplfy furher dscusson whou losng s generaly, we wll smply dscuss secure or perfecly secure secre sharng schemes. 14

16 3.2 Exended capables (3.2.1) Now exended capables of secre sharng schemes shall be presened. (3.2.2) Pre-posoned secre sharng. A pre-posoned secre sharng s an example of an access srucure where all daa requesed o reconsruc he secre s known excep for a sngle crucal share whch has o be gven laer. For example, he PWPW can dsrbue he whole daa over he Inerne by a pre-posoned secre sharng scheme wh a shor, crucal share kep locally. Le us explore a dfference beween secre sharng and smple encrypon of daa n hs model. The advanages wll be clear once more exended capables are oulned. Example 2 (scheme wh an acvang share) Le us assume ha we have a suaon descrbed n he Example 1 daa s sored locally on he servers of PWPW and n a few places all over he world n he Uned Saes, Chna, Russa ec. By means of a pre-posoned scheme foregn nsuons can parake n gven shares (a share made ou of a share s called a subshare) beyond unauhorsed parcpans who canno reconsruc nsuonal shares unl foregn and rused pares cooperae, because her shares are crucal. (3.2.3) Proacve Secre Sharng (PSS) has he followng feaures: One can change (perodcally renew) parcpans' shares n a secre whou revealng or changng. One can recover corruped shares (hese shares correspond o dshones parcpans). In our case we can perodcally check he conssency of shares and recover corruped ones. Anoher reason o use pro-acve secre sharng s he fac ha f we fnd a corruped share durng he verfcaon process (by e.g. VSS scheme), we can easly replace a broken share wh a correc one. So here s a smple way o manan negry of shares perodcally, whch mples negry of daa. (3.2.4) Mul-secre shares have he followng feaures: A scheme where any subse of se of parcpans shares anoher secre s avalable. I seems ha a sngle share can be used n a few secres, opmzng sorage space. Example 3 (mul-secre scheme) In he presened case we can use a mul-secre scheme. We do no need o creae a separae shares and secres for all fles. We can make jus a sngle sharng scheme wh such a propery ha dfferen subses of foregn nsuons can reconsruc speeches of dfferen polcans and all speeches reconsruced n hs way make up a collecon. 3.3 Combnng properes (3.3.1) One of he mos desred properes of secre sharng schemes s s flexbly n combnng funconales descrbed above. Furher research s requred o descrbe whch properes can be combned wh each oher. (3.3.2) In our case we mgh conduc research amed a developng a scheme whch s e.g. perfecly secure, pro-acve, negry-provdng and acvaed by a share from he PWPW. a mul-secre scheme where any subse of parcpans has s own secre ha canno be revealed whou he share from he PWPW. 15

17 (3.3.3) A scheme wh combned properes s no necessarly a exbook maeral avalable rgh away, bu has o be carefully engneered nsead. Hence, some addonal work mgh be requred before mplemenaon. 3.4 Addonal Consderaons (3.4.1) Reconsrucng orgnal daa from shares mgh occasonally need some compuaonal effor and daa may no always be avalable n real-me. Sll, ask complexy s polynomal n me, ye, usually feasble n pracce. (3.4.2) I seems ha once a perfecly secure secre sharng scheme s appled s users should be proeced agans fuure developmens n crypoanalyss, whch would affec he crypography based on compuaonal complexy (e.g. mos of he employed publckey cryposysems lke RSA). 3.5 Open quesons (3.5.1) As descrbed above, he secre sharng schemes provde many ools o deal wh he PWPW problem. Sll, here are some open quesons ha defnely need furher nvesgaon: Whch verfcaon echnques are opmal n solvng he problem of corruped shares and daa n he case of dgal conen of he PWPW neres? One should remember ha by usng secre sharng scheme, we can provde some verfcaon based on secure mul-pary compuaons. Furher effor should be expended o desgn an opmal access srucure for parcular ypes of sored fles. Varous ypes of fles have dfferen daa ha s crucal o her conssency. I seems ha we do no necessarly need o proec he whole daa, bu only some crucal pars. I s worh consderng whch fragmens are really mporan for each ype of fles. If we made hs classfcaon, we would be able o proec crucal pars only by means of secre sharng. 4 Concluson and proposals for furher research 4.1 Hash funcons (4.1.1) Le us recall he mehod proposed n secon 2.2. We dvded daa no dsjon blocks of he same lengh and compared wo hash values for each of hem he frs value was compued before he sorage, he second afer. Ths mehod was no consdered as a good way of dealng wh he gven problem. The probably ha n any block of daa for whch we compue he value of hash funcon wll reman he same afer some me s neglgble. (4.1.2) Wh some addonal assumpons, lke lmed daa sze and smaller b error rae, we have shown ha dvdng daa no blocks n a clever way may mprove he esmaon of corruped bs rao. However, due o s lmaons, hs mehod should be appled only as a supporng ool. (4.1.3) Hash funcons combned wh error correcon mehods may provde very good error esmaon. Under gven consrans concernng he b error rae and he maxmal amoun of addonal daa, here s a probably of ha no every error n a sngle code word wll be correced. (4.1.4) One of he mos convenen cases, for whch we can prove ha he upper bound of he number of corruped bs s small, s when errors are unformly dsrbued. 16

18 Neverheless, we beleve ha errors occur raher n blocks, n parcular pars of carrer of daa ec., bu no unformly. The queson s can we reorganze he bs o make he dsrbuon of errors unform? 4.2 Secre sharng mehod (4.2.1) Secre sharng mehod s an alernave way of hnkng abou daa sorng. I provdes a number of new funconales whch allow sorng of daa dvded among some local (rused) parcpans and some unrused pares (lke publc FTP servers or n general he Inerne ) n a secure way. (4.2.2) Dfferen parcpans akng par n daa sharng can enjoy a dfferen level of prvleges n daa access and recovery. I s mporan o deermne how many levels of prvleges should be desgned and how many parcpans should be on each level. I seems ha almos any access srucure can be mplemened by usng he secre sharng. (4.2.3) In many secre sharng mehods we assume ha shares sored locally (rused parcpans) are a leas of he sze of secre. I s worh nvesgang wheher s possble o delver a mehod whch would be boh: secure and space-savng (.e. local shares are smaller han a secre). We beleve ha such schemes can be obaned. (4.2.4) An mporan propery of secre sharng schemes s verfably of shares. I s especally crucal n our problem, n whch we deal wh corruped daa, as verfcaon proocols can play a role of correcng codes. I s worh explorng whch of hem would be opmal n our problem. (4.2.5) Dfferen secre sharng schemes have varous properes. We have descrbed properes of schemes whch are: pro-acve (we can perodcally change parcpans shares), pre-posoned (here s a crucal share whou whch a secre canno be revealed), mul-secre (a few dfferen secres are shared) or verfable (we can deermne whch shares were corruped and reveal a secre whou hem). The queson s: whch of he menoned properes can be combned? 4.3 Oher possbles (4.3.1) In hs secon, we wll oulne an addonal approach, whch was dscussed afer he 77 h ESGI, neverheless s worh furher research. There are check-dg schemes ha allow deermnng wheher a b-sream was corruped over a ceran hreshold, say, 1% of bs were changed. Should hs be a case, he check-dg scheme provdes nformaon ha corrupon has occurred. Usually he hreshold can be se ndvdually for a parcular applcaon. Furhermore, snce he man ask of he scheme s error deecon no error correcon, usually less addonal nformaon s sored (shorer checksum) han n error correcon codes. In general, he lengh of he checksum can even decreased furher, should sascal reasonng be nroduced, for nsance s allowed ha n a small number of cases scheme sensvy s dfferen from he se hreshold (no necessarly lower). In such a suaon, s even possble o decrease he raon of checksum s sze o he sze of nformaon sored wh he ncreasng volume of nformaon. A good example of such consrucon s graph colorng based on he check-dg scheme descrbed n [5]. I s recommended o research applcaons of check-dg schemes wh he characerscs oulned above for he purpose of he problem presened by PWPW and o revaluae resuls already obaned for hash funcons as well as o nvesgae a joned use of check-dg schemes wh secre sharng mehods. 17

19 Bblography [1] Alfred J. Menzes, Paul van Oorscho, Sco A. Vansone, Handbook of Appled Crypography, hp:// (lnk acve: 2010/10/17) [2] Wold Lpsk, Wkor Marek. Analza kombnaoryczna. Bbloeka Maemayczna PWN, Warszawa [3] Ronald Cramer, Ivan Damgård, Jesper Buus Nelsen, Mulpary Compuaon, an Inroducon, Conemporary Crypology (Caalano/ Cramer/ Damgaard/ DCrescenzo/ Poncheval/ Takag), Advanced Courses n Mahemacs CRM Barcelona, Brkhauser, [4] Ad Shamr, How o share a secre, Communcaons of he ACM 22 (11), pages , 1979 [5] Kaml Kulesza, Zbgnew Koulsk, On a Check-Dg Mehod Based On Graph Colorng, Proceedng of IEEE Inernaonal Conference on Compuer as a Tool, EUROCON 2007, Warsaw, Sepember 9-12, pp , IEEE expolre. 5 Appendx 5.1 Hypercube model Inroducon (5.1.1) In hs paragraph we wll presen dealed calculaons for he specfc clever dvson based on a hypercube (he respecve dea and vsualzaon are presened n paragraph 2.3). Specfcaon (5.1.2) We wll use he followng noaon: he dmenson of hypercube H s d. Every b (cell) has d coordnaes ( x 1,x2, x3,..., xd ). The sze of daa S = 10, so he sde lengh of hypercube s d 10. d (5.1.3) A secon n H s a se of 10 cells such ha (d 1) of her coordnaes are he same. Secons are parallel o axes. Secon parallel o -h axs and meeng pon x 1,x 2,...,x d s defned below: ( ) S ( x,x 2,...,x d ) Dependences ( x,x,...,x ) 1 2 d H :(x1 = x1 ) (x2 = x 2 )... 1 = (7)... (x 1 = x 1 ) (x+ 1 = x+ 1 )... (xd = x d ) (5.1.4) Before sang anyhng abou he hypercube mehod, we shall dscuss he man dependences beween dfferen values descrbng he mehod, such as: addonal space R o remember hash values, he sze of daa S = 10, he dmenson of he hypercube d and so on. 18

20 (5.1.5) Frsly, we wll calculae how much of addonal space s necessary o remember he hash values. Every cell s n d secons and here are 10 cells. Every secon / d consss of 10 cells. As a resul, he oal amoun of secons n H s: d d = d 10 d 1 d. (8) Snce we use 100 bs long hash values, we need addonal space equal o: R d d = d 10 (5.1.6) I s also necessary o know he maxmal amoun of errors n daa, f here s a gven amoun of wrong hash codes. Suppose here are k errors n hash codes. Le (k,k, ,kd ) be he number of wrong hash codes n he frs, second, and d -h drecon respecvely. The followng upper bound of errors n he daa would be: d 1 k1 k 2... k d b. (9) 10 Moreover, s easy o show ha: d k k1 k2... kd. (10) d I means ha f here are k wrong hash codes: d k d 1 d b. (11) 10 The las hng we need s he maxmal amoun of wrong hash codes, f here are l corruped bs. Every b may corrup d hash codes, so he maxmal amoun of corruped hash codes s Opmzaon l d. (12) (5.1.7) Suppose ha afer sorage here are 10 4 errors n he daa (n oher words: r = ). Due o (12), we know ha hese bs are corruped a mos d 10 4 hash codes. Wh he nformaon ha a mos d 10 4 hash codes are wrong, we may calculae (from equaon #11) ha: d d 10 4 d 1 d b. (13) 10 We would lke o know ha no all of he bs are corruped ( b 1), so and d mus sasfy he nequaly: 19

21 d d d 10 4 d 1 Obvously, he lower, he more precse we mgh be. < 10 (14) < 4d. (15) 1 (5.1.8) As R = 0.1T = 10, we can creae addonal nequaly for and d d d 10 d 10 (16) d( log 10 d + 3 ). (17) So and d mus sasfy: d( log 10 d + 3) < 4d. (18) For < 40 such d can be found. As ndcaed before, he lower, he more precse we are. We decded o choose = d( log 10 d + 3 ). (19) (5.1.9) We would lke o fnd he value of d whch would make our predcon more precse. The frs sep was o fnd d, such ha nerval(d( log 10 d + 3 ),4d) s as bg as possble. We defned funcon g(d) = d( 1 log10d) (20) and found s maxmum, whch s approx Then we checked values of d such as 2,3,4,5 and calculaed ha predcon s he mos precse when d = 2. (5.1.10) We decded o prove ha predcon s he mos precse when d = 2 Case d = 2 = 2( log ) 6.6 (21) ( ) 10 = he possble number of errors < 4% - he maxmal rao of corruped daa Oher cases ( d 2 ). We calculaed ha he possble percenage of corruped daa s equal o 4d d (22) We would lke o be as small as possble. We calculaed ha for d > 1 hs funcon ncreases, so he opmum s d = 2. (5.1.11) We would lke o emphasze, ha b < only f r = We calculaed (usng compuer), ha f E ( r) = and bs corrup ndependenly wh probably , hen E ( b) <

22 (5.1.12) Noe ha dvdng daa n exclusve blocks of bs would gve a worse expeced upper bound of corruped bs, equal o

FITTING EXPONENTIAL MODELS TO DATA Supplement to Unit 9C MATH Q(t) = Q 0 (1 + r) t. Q(t) = Q 0 a t,

FITTING EXPONENTIAL MODELS TO DATA Supplement to Unit 9C MATH Q(t) = Q 0 (1 + r) t. Q(t) = Q 0 a t, FITTING EXPONENTIAL MODELS TO DATA Supplemen o Un 9C MATH 01 In he handou we wll learn how o fnd an exponenal model for daa ha s gven and use o make predcons. We wll also revew how o calculae he SSE and

More information

Normal Random Variable and its discriminant functions

Normal Random Variable and its discriminant functions Normal Random Varable and s dscrmnan funcons Oulne Normal Random Varable Properes Dscrmnan funcons Why Normal Random Varables? Analycally racable Works well when observaon comes form a corruped sngle prooype

More information

IFX-Cbonds Russian Corporate Bond Index Methodology

IFX-Cbonds Russian Corporate Bond Index Methodology Approved a he meeng of he Commee represenng ZAO Inerfax and OOO Cbonds.ru on ovember 1 2005 wh amendmens complan wh Agreemen # 545 as of ecember 17 2008. IFX-Cbonds Russan Corporae Bond Index Mehodology

More information

Michał Kolupa, Zbigniew Śleszyński SOME REMARKS ON COINCIDENCE OF AN ECONOMETRIC MODEL

Michał Kolupa, Zbigniew Śleszyński SOME REMARKS ON COINCIDENCE OF AN ECONOMETRIC MODEL M I S C E L L A N E A Mchał Kolupa, bgnew Śleszyńsk SOME EMAKS ON COINCIDENCE OF AN ECONOMETIC MODEL Absrac In hs paper concep of concdence of varable and mehods for checkng concdence of model and varables

More information

Section 6 Short Sales, Yield Curves, Duration, Immunization, Etc.

Section 6 Short Sales, Yield Curves, Duration, Immunization, Etc. More Tuoral a www.lledumbdocor.com age 1 of 9 Secon 6 Shor Sales, Yeld Curves, Duraon, Immunzaon, Ec. Shor Sales: Suppose you beleve ha Company X s sock s overprced. You would ceranly no buy any of Company

More information

Chain-linking and seasonal adjustment of the quarterly national accounts

Chain-linking and seasonal adjustment of the quarterly national accounts Sascs Denmark Naonal Accouns 6 July 00 Chan-lnkng and seasonal adjusmen of he uarerly naonal accouns The mehod of chan-lnkng he uarerly naonal accouns was changed wh he revsed complaon of daa hrd uarer

More information

SOCIETY OF ACTUARIES FINANCIAL MATHEMATICS. EXAM FM SAMPLE SOLUTIONS Interest Theory

SOCIETY OF ACTUARIES FINANCIAL MATHEMATICS. EXAM FM SAMPLE SOLUTIONS Interest Theory SOCIETY OF ACTUARIES EXAM FM FINANCIAL MATHEMATICS EXAM FM SAMPLE SOLUTIONS Ineres Theory Ths page ndcaes changes made o Sudy Noe FM-09-05. January 4, 04: Quesons and soluons 58 60 were added. June, 04

More information

The Financial System. Instructor: Prof. Menzie Chinn UW Madison

The Financial System. Instructor: Prof. Menzie Chinn UW Madison Economcs 435 The Fnancal Sysem (2/13/13) Insrucor: Prof. Menze Chnn UW Madson Sprng 2013 Fuure Value and Presen Value If he presen value s $100 and he neres rae s 5%, hen he fuure value one year from now

More information

Lab 10 OLS Regressions II

Lab 10 OLS Regressions II Lab 10 OLS Regressons II Ths lab wll cover how o perform a smple OLS regresson usng dfferen funconal forms. LAB 10 QUICK VIEW Non-lnear relaonshps beween varables nclude: o Log-Ln: o Ln-Log: o Log-Log:

More information

Noise and Expected Return in Chinese A-share Stock Market. By Chong QIAN Chien-Ting LIN

Noise and Expected Return in Chinese A-share Stock Market. By Chong QIAN Chien-Ting LIN Nose and Expeced Reurn n Chnese A-share Sock Marke By Chong QIAN Chen-Tng LIN 1 } Capal Asse Prcng Model (CAPM) by Sharpe (1964), Lnner (1965) and Mossn (1966) E ( R, ) R f, + [ E( Rm, ) R f, = β ] + ε

More information

Accuracy of the intelligent dynamic models of relational fuzzy cognitive maps

Accuracy of the intelligent dynamic models of relational fuzzy cognitive maps Compuer Applcaons n Elecrcal Engneerng Accuracy of he nellgen dynamc models of relaonal fuzzy cognve maps Aleksander Jasrebow, Grzegorz Słoń Kelce Unversy of Technology 25-314 Kelce, Al. Tysącleca P. P.

More information

Network Security Risk Assessment Based on Node Correlation

Network Security Risk Assessment Based on Node Correlation Journal of Physcs: Conference Seres PAPER OPE ACCESS ewor Secury Rs Assessmen Based on ode Correlaon To ce hs arcle: Zengguang Wang e al 2018 J. Phys.: Conf. Ser. 1069 012073 Vew he arcle onlne for updaes

More information

The UAE UNiversity, The American University of Kurdistan

The UAE UNiversity, The American University of Kurdistan MPRA Munch Personal RePEc Archve A MS-Excel Module o Transform an Inegraed Varable no Cumulave Paral Sums for Negave and Posve Componens wh and whou Deermnsc Trend Pars. Abdulnasser Haem-J and Alan Musafa

More information

Improving Forecasting Accuracy in the Case of Intermittent Demand Forecasting

Improving Forecasting Accuracy in the Case of Intermittent Demand Forecasting (IJACSA) Inernaonal Journal of Advanced Compuer Scence and Applcaons, Vol. 5, No. 5, 04 Improvng Forecasng Accuracy n he Case of Inermen Demand Forecasng Dasuke Takeyasu The Open Unversy of Japan, Chba

More information

Fugit (options) The terminology of fugit refers to the risk neutral expected time to exercise an

Fugit (options) The terminology of fugit refers to the risk neutral expected time to exercise an Fug (opons) INTRODUCTION The ermnology of fug refers o he rsk neural expeced me o exercse an Amercan opon. Invened by Mark Garman whle professor a Berkeley n he conex of a bnomal ree for Amercan opon hs

More information

Correlation of default

Correlation of default efaul Correlaon Correlaon of defaul If Oblgor A s cred qualy deeroraes, how well does he cred qualy of Oblgor B correlae o Oblgor A? Some emprcal observaons are efaul correlaons are general low hough hey

More information

Floating rate securities

Floating rate securities Caps and Swaps Floang rae secures Coupon paymens are rese perodcally accordng o some reference rae. reference rae + ndex spread e.g. -monh LIBOR + 00 bass pons (posve ndex spread 5-year Treasury yeld 90

More information

Tax Dispute Resolution and Taxpayer Screening

Tax Dispute Resolution and Taxpayer Screening DISCUSSION PAPER March 2016 No. 73 Tax Dspue Resoluon and Taxpayer Screenng Hdek SATO* Faculy of Economcs, Kyushu Sangyo Unversy ----- *E-Mal: hsao@p.kyusan-u.ac.jp Tax Dspue Resoluon and Taxpayer Screenng

More information

Interest Rate Derivatives: More Advanced Models. Chapter 24. The Two-Factor Hull-White Model (Equation 24.1, page 571) Analytic Results

Interest Rate Derivatives: More Advanced Models. Chapter 24. The Two-Factor Hull-White Model (Equation 24.1, page 571) Analytic Results Ineres Rae Dervaves: More Advanced s Chaper 4 4. The Two-Facor Hull-Whe (Equaon 4., page 57) [ θ() ] σ 4. dx = u ax d dz du = bud σdz where x = f () r and he correlaon beween dz and dz s ρ The shor rae

More information

Dynamic Relationship and Volatility Spillover Between the Stock Market and the Foreign Exchange market in Pakistan: Evidence from VAR-EGARCH Modelling

Dynamic Relationship and Volatility Spillover Between the Stock Market and the Foreign Exchange market in Pakistan: Evidence from VAR-EGARCH Modelling Dynamc Relaonshp and Volaly pllover Beween he ock Marke and he Foregn xchange marke n Paksan: vdence from VAR-GARCH Modellng Dr. Abdul Qayyum Dr. Muhammad Arshad Khan Inroducon A volale sock and exchange

More information

Return Calculation Methodology

Return Calculation Methodology Reurn Calculaon Mehodology Conens 1. Inroducon... 1 2. Local Reurns... 2 2.1. Examle... 2 3. Reurn n GBP... 3 3.1. Examle... 3 4. Hedged o GBP reurn... 4 4.1. Examle... 4 5. Cororae Acon Facors... 5 5.1.

More information

Online appendices from Counterparty Risk and Credit Value Adjustment a continuing challenge for global financial markets by Jon Gregory

Online appendices from Counterparty Risk and Credit Value Adjustment a continuing challenge for global financial markets by Jon Gregory Onlne appendces fro Counerpary sk and Cred alue Adusen a connung challenge for global fnancal arkes by Jon Gregory APPNDX A: Dervng he sandard CA forula We wsh o fnd an expresson for he rsky value of a

More information

A valuation model of credit-rating linked coupon bond based on a structural model

A valuation model of credit-rating linked coupon bond based on a structural model Compuaonal Fnance and s Applcaons II 247 A valuaon model of cred-rang lnked coupon bond based on a srucural model K. Yahag & K. Myazak The Unversy of Elecro-Communcaons, Japan Absrac A cred-lnked coupon

More information

American basket and spread options. with a simple binomial tree

American basket and spread options. with a simple binomial tree Amercan baske and spread opons wh a smple bnomal ree Svelana orovkova Vre Unverse Amserdam Jon work wh Ferry Permana acheler congress, Torono, June 22-26, 2010 1 Movaon Commody, currency baskes conss of

More information

Deriving Reservoir Operating Rules via Fuzzy Regression and ANFIS

Deriving Reservoir Operating Rules via Fuzzy Regression and ANFIS Dervng Reservor Operang Rules va Fuzzy Regresson and ANFIS S. J. Mousav K. Ponnambalam and F. Karray Deparmen of Cvl Engneerng Deparmen of Sysems Desgn Engneerng Unversy of Scence and Technology Unversy

More information

Baoding, Hebei, China. *Corresponding author

Baoding, Hebei, China. *Corresponding author 2016 3 rd Inernaonal Conference on Economcs and Managemen (ICEM 2016) ISBN: 978-1-60595-368-7 Research on he Applcably of Fama-French Three-Facor Model of Elecrc Power Indusry n Chnese Sock Marke Yeld

More information

Methodology of the CBOE S&P 500 PutWrite Index (PUT SM ) (with supplemental information regarding the CBOE S&P 500 PutWrite T-W Index (PWT SM ))

Methodology of the CBOE S&P 500 PutWrite Index (PUT SM ) (with supplemental information regarding the CBOE S&P 500 PutWrite T-W Index (PWT SM )) ehodology of he CBOE S&P 500 PuWre Index (PUT S ) (wh supplemenal nformaon regardng he CBOE S&P 500 PuWre T-W Index (PWT S )) The CBOE S&P 500 PuWre Index (cker symbol PUT ) racks he value of a passve

More information

Using Fuzzy-Delphi Technique to Determine the Concession Period in BOT Projects

Using Fuzzy-Delphi Technique to Determine the Concession Period in BOT Projects Usng Fuzzy-Delph Technque o Deermne he Concesson Perod n BOT Projecs Khanzad Mosafa Iran Unversy of Scence and Technology School of cvl engneerng Tehran, Iran. P.O. Box: 6765-63 khanzad@us.ac.r Nasrzadeh

More information

Estimation of Optimal Tax Level on Pesticides Use and its

Estimation of Optimal Tax Level on Pesticides Use and its 64 Bulgaran Journal of Agrculural Scence, 8 (No 5 0, 64-650 Agrculural Academy Esmaon of Opmal Ta Level on Pescdes Use and s Impac on Agrculure N. Ivanova,. Soyanova and P. Mshev Unversy of Naonal and

More information

Explaining Product Release Planning Results Using Concept Analysis

Explaining Product Release Planning Results Using Concept Analysis Explanng Produc Release Plannng Resuls Usng Concep Analyss Gengshen Du, Thomas Zmmermann, Guenher Ruhe Deparmen of Compuer Scence, Unversy of Calgary 2500 Unversy Drve NW, Calgary, Albera T2N 1N4, Canada

More information

Improving Earnings per Share: An Illusory Motive in Stock Repurchases

Improving Earnings per Share: An Illusory Motive in Stock Repurchases Inernaonal Journal of Busness and Economcs, 2009, Vol. 8, No. 3, 243-247 Improvng Earnngs per Share: An Illusory Move n Sock Repurchases Jong-Shn We Deparmen of Inernaonal Busness Admnsraon, Wenzao Ursulne

More information

Terms and conditions for the MXN Peso / US Dollar Futures Contract (Physically Delivered)

Terms and conditions for the MXN Peso / US Dollar Futures Contract (Physically Delivered) The Englsh verson of he Terms and Condons for Fuures Conracs s publshed for nformaon purposes only and does no consue legal advce. However, n case of any Inerpreaon conroversy, he Spansh verson shall preval.

More information

Pricing and Valuation of Forward and Futures

Pricing and Valuation of Forward and Futures Prcng and Valuaon of orward and uures. Cash-and-carry arbrage he prce of he forward conrac s relaed o he spo prce of he underlyng asse, he rsk-free rae, he dae of expraon, and any expeced cash dsrbuons

More information

Albania. A: Identification. B: CPI Coverage. Title of the CPI: Consumer Price Index. Organisation responsible: Institute of Statistics

Albania. A: Identification. B: CPI Coverage. Title of the CPI: Consumer Price Index. Organisation responsible: Institute of Statistics Albana A: Idenfcaon Tle of he CPI: Consumer Prce Index Organsaon responsble: Insue of Sascs Perodcy: Monhly Prce reference perod: December year 1 = 100 Index reference perod: December 2007 = 100 Weghs

More information

Bank of Japan. Research and Statistics Department. March, Outline of the Corporate Goods Price Index (CGPI, 2010 base)

Bank of Japan. Research and Statistics Department. March, Outline of the Corporate Goods Price Index (CGPI, 2010 base) Bank of Japan Research and Sascs Deparmen Oulne of he Corporae Goods Prce Index (CGPI, 2010 base) March, 2015 1. Purpose and Applcaon The Corporae Goods Prce Index (CGPI) measures he prce developmens of

More information

Quarterly Accounting Earnings Forecasting: A Grey Group Model Approach

Quarterly Accounting Earnings Forecasting: A Grey Group Model Approach Quarerly Accounng Earnngs Forecasng: A Grey Group Model Approach Zheng-Ln Chen Deparmen of Accounng Zhongnan Unversy of Economcs and Law # Souh Nanhu Road, Wuhan Cy, 430073 Hube People's Republc of Chna

More information

An Inclusion-Exclusion Algorithm for Network Reliability with Minimal Cutsets

An Inclusion-Exclusion Algorithm for Network Reliability with Minimal Cutsets Amercan Journal of ompuaonal Mahemacs, 202, 2, 6-20 hp://dxdoorg/0426/acm2022404 Publshed Onlne December 202 (hp://wwwscrporg/ournal/acm) An Incluson-Excluson Algorhm for ework Relably wh Mnmal uses Yan-Ru

More information

Recall from last time. The Plan for Today. INTEREST RATES JUNE 22 nd, J u n e 2 2, Different Types of Credit Instruments

Recall from last time. The Plan for Today. INTEREST RATES JUNE 22 nd, J u n e 2 2, Different Types of Credit Instruments Reall from las me INTEREST RATES JUNE 22 nd, 2009 Lauren Heller Eon 423, Fnanal Markes Smple Loan rnpal and an neres paymen s pad a maury Fxed-aymen Loan Equal monhly paymens for a fxed number of years

More information

Effective Feedback Of Whole-Life Data to The Design Process

Effective Feedback Of Whole-Life Data to The Design Process Effecve Feedback Of Whole-Lfe Daa o The Desgn Process Mohammed Kshk 1*, Assem Al-Hajj 1, Rober Pollock 1 and Ghassan Aouad 2 1 The Sco Suherland School, The Rober Gordon Unversy, Garhdee Road, Aberdeen

More information

Optimal Combination of Trading Rules Using Neural Networks

Optimal Combination of Trading Rules Using Neural Networks Vol. 2, No. Inernaonal Busness Research Opmal Combnaon of Tradng Rules Usng Neural Neworks Subraa Kumar Mra Professor, Insue of Managemen Technology 35 Km Mlesone, Kaol Road Nagpur 44 502, Inda Tel: 9-72-280-5000

More information

A Multi-Periodic Optimization Modeling Approach for the Establishment of a Bike Sharing Network: a Case Study of the City of Athens

A Multi-Periodic Optimization Modeling Approach for the Establishment of a Bike Sharing Network: a Case Study of the City of Athens A Mul-Perodc Opmzaon Modelng Approach for he Esablshmen of a Be Sharng Newor: a Case Sudy of he Cy of Ahens G.K.D Sahards, A. Fragogos and E. Zygour Absrac Ths sudy nroduces a novel mahemacal formulaon

More information

A Framework for Large Scale Use of Scanner Data in the Dutch CPI

A Framework for Large Scale Use of Scanner Data in the Dutch CPI A Framework for Large Scale Use of Scanner Daa n he Duch CPI Jan de Haan Sascs Neherlands and Delf Unversy of Technology Oawa Group, 2-22 May 215 The basc dea Ideally, o make he producon process as effcen

More information

DEA-Risk Efficiency and Stochastic Dominance Efficiency of Stock Indices *

DEA-Risk Efficiency and Stochastic Dominance Efficiency of Stock Indices * JEL Classfcaon: C61, D81, G11 Keywords: Daa Envelopmen Analyss, rsk measures, ndex effcency, sochasc domnance DEA-Rsk Effcency and Sochasc Domnance Effcency of Sock Indces * Marn BRANDA Charles Unversy

More information

Determinants of firm exchange rate predictions:

Determinants of firm exchange rate predictions: CESSA WP 208-0 Deermnans of frm exchange rae predcons: Emprcal evdence from survey daa of Japanese frms Th-Ngoc Anh NGUYEN Yokohama Naonal Unversy Japan Socey for he Promoon of Scence May 208 Cener for

More information

Comparing Sharpe and Tint Surplus Optimization to the Capital Budgeting Approach with Multiple Investments in the Froot and Stein Framework.

Comparing Sharpe and Tint Surplus Optimization to the Capital Budgeting Approach with Multiple Investments in the Froot and Stein Framework. Comparng Sharpe and Tn Surplus Opmzaon o he Capal Budgeng pproach wh Mulple Invesmens n he Froo and Sen Framework Harald Bogner Frs Draf: Sepember 9 h 015 Ths Draf: Ocober 1 h 015 bsrac Below s shown ha

More information

A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm An Application to the Data of Operating equipment and supplies

A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm An Application to the Data of Operating equipment and supplies A Hyrd Mehod o Improve Forecasng Accuracy Ulzng Genec Algorhm An Applcaon o he Daa of Operang equpmen and supples Asam Shara Tax Corporaon Arkne, Shzuoka Cy, Japan, e-mal: a-shara@arkne.nfo Dasuke Takeyasu

More information

Numerical Evaluation of European Option on a Non Dividend Paying Stock

Numerical Evaluation of European Option on a Non Dividend Paying Stock Inernaonal Journal of Compuaonal cence and Mahemacs. IN 0974-389 olume Number 3 (00) pp. 6--66 Inernaonal Research Publcaon House hp://www.rphouse.com Numercal Evaluaon of European Opon on a Non Dvdend

More information

UNN: A Neural Network for uncertain data classification

UNN: A Neural Network for uncertain data classification UNN: A Neural Nework for unceran daa classfcaon Jaq Ge, and Yun Xa, Deparmen of Compuer and Informaon Scence, Indana Unversy Purdue Unversy, Indanapols, USA {jaqge, yxa }@cs.upu.edu Absrac. Ths paper proposes

More information

Mind the class weight bias: weighted maximum mean discrepancy for unsupervised domain adaptation. Hongliang Yan 2017/06/21

Mind the class weight bias: weighted maximum mean discrepancy for unsupervised domain adaptation. Hongliang Yan 2017/06/21 nd he class wegh bas: weghed maxmum mean dscrepancy for unsupervsed doman adapaon Honglang Yan 207/06/2 Doman Adapaon Problem: Tranng and es ses are relaed bu under dfferen dsrbuons. Tranng (Source) DA

More information

MORNING SESSION. Date: Wednesday, May 4, 2016 Time: 8:30 a.m. 11:45 a.m. INSTRUCTIONS TO CANDIDATES

MORNING SESSION. Date: Wednesday, May 4, 2016 Time: 8:30 a.m. 11:45 a.m. INSTRUCTIONS TO CANDIDATES SOCIETY OF ACTUARIES Exam QFICORE MORNING SESSION Dae: Wednesday, May 4, 016 Tme: 8:30 a.m. 11:45 a.m. INSTRUCTIONS TO CANDIDATES General Insrucons 1. Ths examnaon has a oal of 100 pons. I consss of a

More information

(1 + Nominal Yield) = (1 + Real Yield) (1 + Expected Inflation Rate) (1 + Inflation Risk Premium)

(1 + Nominal Yield) = (1 + Real Yield) (1 + Expected Inflation Rate) (1 + Inflation Risk Premium) 5. Inflaion-linked bonds Inflaion is an economic erm ha describes he general rise in prices of goods and services. As prices rise, a uni of money can buy less goods and services. Hence, inflaion is an

More information

THE APPLICATION OF REGRESSION ANALYSIS IN TESTING UNCOVERED INTEREST RATE PARITY

THE APPLICATION OF REGRESSION ANALYSIS IN TESTING UNCOVERED INTEREST RATE PARITY QUANTITATIVE METHOD IN ECONOMIC Vol. XIV, No., 03, pp. 3 4 THE APPLICATION OF REGREION ANALYI IN TETING UNCOVERED INTERET RATE PARITY Joanna Kselńsa, Kaarzyna Czech Faculy of Economcs cences Warsaw Unversy

More information

A Novel Approach to Model Generation for Heterogeneous Data Classification

A Novel Approach to Model Generation for Heterogeneous Data Classification A Novel Approach o Model Generaon for Heerogeneous Daa Classfcaon Rong Jn*, Huan Lu *Dep. of Compuer Scence and Engneerng, Mchgan Sae Unversy, Eas Lansng, MI 48824 rongn@cse.msu.edu Deparmen of Compuer

More information

Fairing of Polygon Meshes Via Bayesian Discriminant Analysis

Fairing of Polygon Meshes Via Bayesian Discriminant Analysis Farng of Polygon Meshes Va Bayesan Dscrmnan Analyss Chun-Yen Chen Insue of Informaon Scence, Academa Snca. Deparmen of Compuer Scence and Informaon Engneerng, Naonal Tawan Unversy. 5, Tawan, Tape, Nankang

More information

Estimating intrinsic currency values

Estimating intrinsic currency values Esmang nrnsc currency values Forex marke praconers consanly alk abou he srenghenng or weakenng of ndvdual currences. In hs arcle, Jan Chen and Paul Dous presen a new mehodology o quanfy hese saemens n

More information

DYNAMIC ECONOMETRIC MODELS Vol. 8 Nicolaus Copernicus University Toruń 2008

DYNAMIC ECONOMETRIC MODELS Vol. 8 Nicolaus Copernicus University Toruń 2008 DYNAMIC ECONOMETRIC MODELS Vol. 8 Ncolaus Coperncus Unversy Toruń 2008 Por Fszeder Ncolaus Coperncus Unversy n Toruń Julusz Preś Szczecn Unversy of Technology Prcng of Weaher Opons for Berln Quoed on he

More information

The Proposed Mathematical Models for Decision- Making and Forecasting on Euro-Yen in Foreign Exchange Market

The Proposed Mathematical Models for Decision- Making and Forecasting on Euro-Yen in Foreign Exchange Market Iranan Economc Revew, Vol.6, No.30, Fall 20 The Proposed Mahemacal Models for Decson- Makng and Forecasng on Euro-Yen n Foregn Exchange Marke Abdorrahman Haer Masoud Rabban Al Habbna Receved: 20/07/24

More information

Differences in the Price-Earning-Return Relationship between Internet and Traditional Firms

Differences in the Price-Earning-Return Relationship between Internet and Traditional Firms Dfferences n he Prce-Earnng-Reurn Relaonshp beween Inerne and Tradonal Frms Jaehan Koh Ph.D. Program College of Busness Admnsraon Unversy of Texas-Pan Amercan jhkoh@upa.edu Bn Wang Asssan Professor Compuer

More information

Hardware-Assisted High-Efficiency Ray Casting of Unstructured Time-Varying Flows Using Temporal Coherence

Hardware-Assisted High-Efficiency Ray Casting of Unstructured Time-Varying Flows Using Temporal Coherence Hardware-Asssed Hgh-Effcency Ray Casng of Unsrucured Tme-Varyng Flows Usng Temporal Coherence Qanl Ma, Lang Zeng, Huaxun Xu, Wenke Wang, Skun L Absrac Advances n compuaonal power are enablng hgh-precson

More information

A Hybrid Method for Forecasting with an Introduction of a Day of the Week Index to the Daily Shipping Data of Sanitary Materials

A Hybrid Method for Forecasting with an Introduction of a Day of the Week Index to the Daily Shipping Data of Sanitary Materials Journal of Communcaon and Compuer (05) 0-07 do: 0.765/548-7709/05.0.00 D DAVID PUBLISHING A Hyrd Mehod for Forecasng wh an Inroducon of a Day of he Week Inde o he Daly Shppng Daa of Sanary Maerals Dasuke

More information

Agricultural and Rural Finance Markets in Transition

Agricultural and Rural Finance Markets in Transition Agrculural and Rural Fnance Markes n Transon Proceedngs of Regonal Research Commee NC-04 S. Lous, Mssour Ocober 4-5, 007 Dr. Mchael A. Gunderson, Edor January 008 Food and Resource Economcs Unversy of

More information

Assessing Long-Term Fiscal Dynamics: Evidence from Greece and Belgium

Assessing Long-Term Fiscal Dynamics: Evidence from Greece and Belgium Inernaonal Revew of Busness Research Papers Vol. 7. No. 6. November 2011. Pp. 33-45 Assessng Long-Term Fscal Dynamcs: Evdence from Greece and Belgum JEL Codes: Ε62 and Η50 1. Inroducon Evangela Kasma 1,2

More information

The Empirical Research of Price Fluctuation Rules and Influence Factors with Fresh Produce Sequential Auction Limei Cui

The Empirical Research of Price Fluctuation Rules and Influence Factors with Fresh Produce Sequential Auction Limei Cui 6h Inernaonal Conference on Sensor Nework and Compuer Engneerng (ICSNCE 016) The Emprcal Research of Prce Flucuaon Rules and Influence Facors wh Fresh Produce Sequenal Aucon Lme Cu Qujng Normal Unversy,

More information

Empirical Study on the Relationship between ICT Application and China Agriculture Economic Growth

Empirical Study on the Relationship between ICT Application and China Agriculture Economic Growth Emprcal Sudy on he Relaonshp beween ICT Applcaon and Chna Agrculure Economc Growh Pengju He, Shhong Lu, Huoguo Zheng, and Yunpeng Cu Key Laboraory of Dgal Agrculural Early-warnng Technology Mnsry of Agrculure,

More information

Economics of taxation

Economics of taxation Economcs of axaon Lecure 3: Opmal axaon heores Salane (2003) Opmal axes The opmal ax sysem mnmzes he excess burden wh a gven amoun whch he governmen wans o rase hrough axaon. Opmal axes maxmze socal welfare,

More information

Introduction. Enterprises and background. chapter

Introduction. Enterprises and background. chapter NACE: High-Growh Inroducion Enerprises and background 18 chaper High-Growh Enerprises 8 8.1 Definiion A variey of approaches can be considered as providing he basis for defining high-growh enerprises.

More information

Overview of the limits applicable to large exposures across Europe

Overview of the limits applicable to large exposures across Europe Annex [ II-A ] Overvew of he lms applcable o large exposures across Europe Lms mplemened by counry AT BE C CZ DE DK EE EL ES FI FR HU IE IT LT LU LV MT L PL PT SE SI SK UK IS LI O RO A cred nsuon may no

More information

Gaining From Your Own Default

Gaining From Your Own Default Ganng From Your Own Defaul Jon Gregory jon@ofranng.com Jon Gregory (jon@ofranng.com), Quan ongress US, 14 h July 2010 page 1 Regulaon s Easy () Wha don lke as a regulaor? Dfferen nsuons valung asses dfferenly

More information

Problem Set 1 Answers. a. The computer is a final good produced and sold in Hence, 2006 GDP increases by $2,000.

Problem Set 1 Answers. a. The computer is a final good produced and sold in Hence, 2006 GDP increases by $2,000. Social Analysis 10 Spring 2006 Problem Se 1 Answers Quesion 1 a. The compuer is a final good produced and sold in 2006. Hence, 2006 GDP increases by $2,000. b. The bread is a final good sold in 2006. 2006

More information

Permanent Income and Consumption

Permanent Income and Consumption roceedngs of 30h Inernaonal onference Mahemacal Mehods n Economcs ermanen Income and onsumpon Václava ánková 1 Absrac. A heory of consumer spendng whch saes ha people wll spend money a a level conssen

More information

HFR Risk Parity Indices

HFR Risk Parity Indices HFR Rsk Pary Indces Defned Formulac Mehodology 2018 2018 Hedge Fund Research, Inc. - All rghs reserved. HFR, HFRI, HFRX, HFRQ, HFRU, HFRL, HFR PorfoloScope, WWW.HEDGEFUNDRESEARCH.COM, HEDGE FUND RESEARCH,

More information

STOCK PRICES TEHNICAL ANALYSIS

STOCK PRICES TEHNICAL ANALYSIS STOCK PRICES TEHNICAL ANALYSIS Josp Arnerć, Elza Jurun, Snježana Pvac Unversy of Spl, Faculy of Economcs Mace hrvaske 3 2 Spl, Croaa jarnerc@efs.hr, elza@efs.hr, spvac@efs.hr Absrac Ths paper esablshes

More information

Co-Integration Study of Relationship between Foreign Direct Investment and Economic Growth

Co-Integration Study of Relationship between Foreign Direct Investment and Economic Growth www.ccsene.org/br Inernaonal Busness Research Vol. 4, No. 4; Ocober 2011 Co-Inegraon Sudy of Relaonshp beween Foregn Drec Invesen and Econoc Growh Haao Sun Qngdao Technologcal Unversy, Qngdao 266520, Chna

More information

The Asymmetric Effects of Government Spending Shocks: Empirical Evidence from Turkey

The Asymmetric Effects of Government Spending Shocks: Empirical Evidence from Turkey Journal of Economc and Socal Research 6 (), 33-5 The Asymmerc Effecs of Governmen Spendng Shocks: Emprcal Evdence from Turkey Hakan Berumen & Burak oğan Absrac. The purpose of hs paper s o assess f expansonary

More information

Pricing Model of Credit Default Swap Based on Jump-Diffusion Process and Volatility with Markov Regime Shift

Pricing Model of Credit Default Swap Based on Jump-Diffusion Process and Volatility with Markov Regime Shift Assocaon for Informaon Sysems AIS Elecronc brary (AISe) WICEB 13 Proceedngs Wuhan Inernaonal Conference on e-busness Summer 5-5-13 Prcng Model of Cred Defaul Swap Based on Jump-Dffuson Process and Volaly

More information

SkyCube Computation over Wireless Sensor Networks Based on Extended Skylines

SkyCube Computation over Wireless Sensor Networks Based on Extended Skylines Proceedngs of he 2010 IEEE Inernaonal Conference on Informaon and Auomaon June 20-23, Harbn, Chna SkyCube Compuaon over Wreless Sensor Neworks Based on Exended Skylnes Zhqong Wang 1, Zhyue Wang 2, Junchang

More information

Open Access Impact of Wind Power Generation on System Operation and Costs

Open Access Impact of Wind Power Generation on System Operation and Costs Send Orders for Reprns o reprns@benhamscence.ae 580 he Open Elecrcal & Elecronc Engneerng Journal, 2014, 8, 580-588 Open Access Impac of nd Power eneraon on Sysem Operaon and oss ang Fe 1,2,*, Pan enxa

More information

PFAS: A Resource-Performance-Fluctuation-Aware Workflow Scheduling Algorithm for Grid Computing

PFAS: A Resource-Performance-Fluctuation-Aware Workflow Scheduling Algorithm for Grid Computing PFAS: A Resource-Performance-Flucuaon-Aware Workflow Schedulng Algorhm for Grd Compung Fangpeng Dong and Selm G. Akl School of Compung, Queen's Unversy Kngson, ON Canada, K7L N6 {dong, akl}@cs.queensu.ca

More information

MULTI-SPECTRAL IMAGE ANALYSIS BASED ON DYNAMICAL EVOLUTIONARY PROJECTION PURSUIT

MULTI-SPECTRAL IMAGE ANALYSIS BASED ON DYNAMICAL EVOLUTIONARY PROJECTION PURSUIT MULTI-SPECTRAL IMAGE AALYSIS BASED O DYAMICAL EVOLUTIOARY PROJECTIO PURSUIT YU Changhu a, MEG Lngku a, YI Yaohua b, a School of Remoe Sensng Informaon Engneerng, Wuhan Unversy, 39#,Luoyu Road, Wuhan,Chna,430079,

More information

Multiple Choice Questions Solutions are provided directly when you do the online tests.

Multiple Choice Questions Solutions are provided directly when you do the online tests. SOLUTIONS Muliple Choice Quesions Soluions are provided direcly when you do he online ess. Numerical Quesions 1. Nominal and Real GDP Suppose han an economy consiss of only 2 ypes of producs: compuers

More information

Index Mathematics Methodology

Index Mathematics Methodology Index Mahemacs Mehodology S&P Dow Jones Indces: Index Mehodology November 2017 Table of Conens Inroducon 2 Dfferen Varees of Indces 2 The Index Dvsor 2 Capalzaon Weghed Indces 3 Defnon 3 Adjusmens o Share

More information

Cointegration between Fama-French Factors

Cointegration between Fama-French Factors 1 Conegraon beween Fama-French Facors Absrac Conegraon has many applcaons n fnance and oher felds of scence researchng me seres and her nerdependences. The analyss s a useful mehod o analyse non-conegraon

More information

Keywords: School bus problem, heuristic, harmony search

Keywords: School bus problem, heuristic, harmony search Journal of Emergng Trends n Compung and Informaon Scences 2009-2013 CIS Journal. All rghs reserved. hp://www.csjournal.org Model and Algorhm for Solvng School Bus Problem 1 Taehyeong Km, 2 Bum-Jn Par 1

More information

Financial Stability Institute

Financial Stability Institute Fnancal Sably Insue FSI Award 21 Wnnng Paper Regulaory use of sysem-wde esmaons of PD, LGD and EAD Jesus Alan Elzondo Flores Tana Lemus Basualdo Ana Regna Qunana Sordo Comsón Naconal Bancara y de Valores,

More information

ESSAYS ON MONETARY POLICY AND INTERNATIONAL TRADE. A Dissertation HUI-CHU CHIANG

ESSAYS ON MONETARY POLICY AND INTERNATIONAL TRADE. A Dissertation HUI-CHU CHIANG ESSAYS ON MONETARY POLICY AND INTERNATIONAL TRADE A Dsseraon by HUI-CHU CHIANG Submed o he Offce of Graduae Sudes of Texas A&M Unversy n paral fulfllmen of he requremens for he degree of DOCTOR OF PHILOSOPHY

More information

SETTING CUT OFF SCORES FOR SELECTIVE EDITING IN STRUCTURAL BUSINESS STATISTICS: AN AUTOMATIC PROCEDURE USING SIMULATION STUDY.

SETTING CUT OFF SCORES FOR SELECTIVE EDITING IN STRUCTURAL BUSINESS STATISTICS: AN AUTOMATIC PROCEDURE USING SIMULATION STUDY. WP.41 ENGLISH ONLY UNITED NATIONS STATISTICAL COMMISSION and ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS Wor Sesson on Sascal Daa Edng (Neuchâel, Swzerland, 5-7 Ocober 2009) Topc

More information

Online appendices from The xva Challenge by Jon Gregory. APPENDIX 14A: Deriving the standard CVA formula.

Online appendices from The xva Challenge by Jon Gregory. APPENDIX 14A: Deriving the standard CVA formula. Onlne appendces fro he xa Challenge by Jon Gregory APPNDX 4A: Dervng he sandard CA forla We wsh o fnd an expresson for he rsky vale of a need se of dervaves posons wh a ax ary dae Denoe he rsk-free vale

More information

Game-theoretic dynamic investment. information: futures contracts

Game-theoretic dynamic investment. information: futures contracts Game-heorec dynamc nvesmen model wh ncomplee nformaon: fuures conracs Oleg Malafeyev Shulga Andrey 2 San-Peersburg Sae Unversy Russa Absrac Over he pas few years he fuures marke has been successfully developng

More information

FINAL EXAM EC26102: MONEY, BANKING AND FINANCIAL MARKETS MAY 11, 2004

FINAL EXAM EC26102: MONEY, BANKING AND FINANCIAL MARKETS MAY 11, 2004 FINAL EXAM EC26102: MONEY, BANKING AND FINANCIAL MARKETS MAY 11, 2004 This exam has 50 quesions on 14 pages. Before you begin, please check o make sure ha your copy has all 50 quesions and all 14 pages.

More information

The Net Benefit to Government of Higher Education: A Balance Sheet Approach

The Net Benefit to Government of Higher Education: A Balance Sheet Approach The Ne Benef o Governmen of Hgher Educaon: A Balance Shee Approach Davd Johnson and Roger Wlkns Melbourne Insue of Appled Economc and Socal Research The Unversy of Melbourne Melbourne Insue Workng Paper

More information

OPTIMIZED CALIBRATION OF CURRENCY MARKET STRATEGIES Mustafa Onur Çağlayan 1, János D. Pintér 2

OPTIMIZED CALIBRATION OF CURRENCY MARKET STRATEGIES Mustafa Onur Çağlayan 1, János D. Pintér 2 Inernaonal Conference 24h Mn EURO Conference Connuous Opmzaon and Informaon-Based Technologes n he Fnancal Secor (MEC EurOPT 2010) June 23 26, 2010, Izmr, TURKEY ISBN 978-9955-28-598-4 R. Kasımbeyl, C.

More information

Supplement to Chapter 3

Supplement to Chapter 3 Supplemen o Chaper 3 I. Measuring Real GD and Inflaion If here were only one good in he world, anchovies, hen daa and prices would deermine real oupu and inflaion perfecly: GD Q ; GD Q. + + + Then, he

More information

Global Warming and International Cooperation

Global Warming and International Cooperation NORGES HANDELSHØYSKOLE Bergen, 15.06.2010 Global Warmng and Inernaonal Cooperaon Would negoaon of nernaonal envronmenal reaes be easer f he world only conssed of Chna, USA and EU? Joachm Eml Skjelbred

More information

CENTRO DE ESTUDIOS MONETARIOS Y FINANCIEROS T. J. KEHOE MACROECONOMICS I WINTER 2011 PROBLEM SET #6

CENTRO DE ESTUDIOS MONETARIOS Y FINANCIEROS T. J. KEHOE MACROECONOMICS I WINTER 2011 PROBLEM SET #6 CENTRO DE ESTUDIOS MONETARIOS Y FINANCIEROS T J KEHOE MACROECONOMICS I WINTER PROBLEM SET #6 This quesion requires you o apply he Hodrick-Presco filer o he ime series for macroeconomic variables for he

More information

Bond Prices and Interest Rates

Bond Prices and Interest Rates Winer erm 1999 Bond rice Handou age 1 of 4 Bond rices and Ineres Raes A bond is an IOU. ha is, a bond is a promise o pay, in he fuure, fixed amouns ha are saed on he bond. he ineres rae ha a bond acually

More information

EXPLOITING GEOMETRICAL NODE LOCATION FOR IMPROVING SPATIAL REUSE IN SINR-BASED STDMA MULTI-HOP LINK SCHEDULING ALGORITHM

EXPLOITING GEOMETRICAL NODE LOCATION FOR IMPROVING SPATIAL REUSE IN SINR-BASED STDMA MULTI-HOP LINK SCHEDULING ALGORITHM Inernaonal Journal of Technology (2015) 1: 53 62 ISSN 2086 9614 IJTech 2015 EXLOITING GEOMETRICAL NODE LOCATION FOR IMROVING SATIAL REUSE IN SINR-BASED STDMA MULTI-HO LINK SCHEDULING ALGORITHM Nachwan

More information

The impact of government support to industrial R&D on the Israeli economy. Final report. English translation from Hebrew

The impact of government support to industrial R&D on the Israeli economy. Final report. English translation from Hebrew The mpac of governmen suppor o ndusral R&D on he Israel economy Fnal repor Englsh ranslaon from Hebrew Prof. Saul Lach, Dr. Shlom Parza, Danel Wasserel June 2008 E.G.P Appled Economcs Ld. Research and

More information

Enforcement aspects of conservation policies: compensation payments versus reserves. Energy, Transport and Environment

Enforcement aspects of conservation policies: compensation payments versus reserves. Energy, Transport and Environment Enforcemen aspecs of conservaon polces: compensaon paymens versus reserves by Sandra ROUSSEAU Energy, ranspor and Envronmen Cener for Economc Sudes Dscussons Paper Seres (DPS) 08.06 hp://www.econ.kuleuven.be/ces/dscussonpapers/defaul.hm

More information

MACROECONOMIC CONDITIONS AND INCOME DISTRIBUTION IN VENEZUELA:

MACROECONOMIC CONDITIONS AND INCOME DISTRIBUTION IN VENEZUELA: MACROECONOMIC CONDITIONS AND INCOME DISTRIBUTION IN VENEZUELA: 197-199 Raul J. Crespo* January, 2004 *Conac: Economcs Deparmen, Unversy of Brsol, 8 Woodland Road, Brsol, BS8 1TN, Uned Kngdom. Tel.: + 44

More information

Career wage profiles and the minimum wage

Career wage profiles and the minimum wage Career wage profles and he mnmum wage Kerry L. Papps A model of on-he-job ranng n he presence of a mnmum wage s presened. Ths predcs ha, n mos cases, he mnmum wage wll have a negave effec on a worker s

More information