نتایج جستجو برای: asymmetric pass through

تعداد نتایج: 1440353  

Journal: :Review of Financial Studies 2021

Abstract We develop a novel measure of volatility pass-through to assess international propagation output shocks macroeconomic aggregates, equity prices, and currencies. An increase in country's is associated with decrease its output, consumption, net exports. The average consumption 50% (a 1% increases by 0.5%) it 70% for originating smaller countries. larger the order 90%. A channel risk shar...

2004
S. K. Clowes W. R. Branford C. Grigorescu S. A. Manea O. Monnereau L. F. Cohen

The point contact Andreev reflection employing niobium tips was used to determine the degree of transport current spin polarization sPtd at the free surface of bulk NiMnSb at 4.2 K. The data was analyzed within the framework of a modified version of the Blonder, Tinkham, and Klapwijk formulism taking into account the two spin polarized channels in the ferromagnet and treating the interface as a...

Journal: :The Journal of Finance 2002

Journal: :Journal of Economic Dynamics and Control 2010

2003
David Besanko Jean-Pierre Dubé Sachin Gupta

Own-brand and Cross-brand Retail Pass-through In this paper we describe the pass-through behavior of a major US supermarket chain for 78 products across 11 categories. Our data set includes retail prices and wholesale prices for stores in 15 retail price zones for a one-year period. For the empirical model, we use a reduced-form approach that focuses directly on equilibrium prices as a function...

2013
Heiko Hamann

Recent approaches in evolutionary robotics (ER) propose to generate behavioral diversity in order to evolve desired behaviors more easily. These approaches require the definition of a behavioral distance which often includes task-specific features and hence a priori knowledge. Alternative methods, that do not explicitly force selective pressure towards diversity (SPTD) but still generate it, ar...

2010
Shai Halevi Hugo Krawczyk

Consider the task of asymmetric key-wrapping, where a key-management server encrypts a cryptographic key under the public key of a client. When used in storage and access-control systems, it is often the case that the server has no knowledge about the client (beyond its public key) and no means of coordinating with it. For example, a wrapped key used to encrypt a backup tape may be needed many ...

Journal: :Journal of International Economics 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید