Georgetown University

Displaying 1-14 of 14 results

  • White Papers // Feb 2013

    Crowdsourcing Cyber Security: A Property Rights View of Exclusion and Theft on the Information Commons

    Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals...

    Provided By Georgetown University

  • White Papers // Dec 2012

    An Empirical Evaluation of Relay Selection in Tor

    While Tor is the most popular low-latency anonymity network in use today, Tor suffers from a variety of performance problems that continue to inhibit its wide scale adoption. One reason why Tor is slow is due to the manner in which clients select Tor relays. There have been a number...

    Provided By Georgetown University

  • White Papers // Oct 2012

    Bounds on Contention Management in Radio Networks

    The local broadcast problem assumes that processes in a wireless network are provided messages, one by one, that must be delivered to their neighbors. In this paper, the authors prove tight bounds for this problem in two well-studied wireless network models: the classical model, in which links are reliable and...

    Provided By Georgetown University

  • White Papers // May 2011

    Presenting Software License Conflicts Through Argumentation

    Heterogeneously-licensed systems pose new challenges to architects and designers seeking to develop systems with appropriate intellectual property rights and obligations. In the extreme case, license conflicts may prevent a system's legal use. The authors' previous work showed that rights, obligations, and conflicts can be calculated. But architects benefit from fuller...

    Provided By Georgetown University

  • White Papers // Jan 2011

    The Task Composition Of Offshoring By U.S. Multinationals

    Recent advances in communications technology allow for greater fragmentation of production across borders. However, the authors do not observe U.S. multinationals o shoring all activities that are technologically feasible to perform abroad. This paper uses task-level routineness data paired with firm-level offshoring data to explain why this is the case....

    Provided By Georgetown University

  • White Papers // Oct 2010

    Is Leasing Greener Than Selling?

    Based on the proposition that leasing is environmentally superior to selling, some firms have adopted a leasing strategy and others promote their existing leasing programs as environmentally superior in order to "Green" their image. The main argument is that as a leasing firm retains ownership of the o -lease units,...

    Provided By Georgetown University

  • White Papers // Jul 2010

    Tariff Pass-Through, Firm Heterogeneity And Product Quality

    This paper explores tariff pass-through at the firm level, and investigates how it depends on firm heterogeneity in productivity and product differentiation in quality. Using an extended version of the Melitz and Ottaviano (2008) model, the author shows that exporting firms adjust both their markups and product quality in response...

    Provided By Georgetown University

  • White Papers // May 2010

    Weaving Functional and Non-Functional Attributes for Dynamic Web Service Composition

    Given the numerous, potentially reusable, Web services available on the Internet, search and composition techniques that efficiently discover viable services will be a strong requirement. A major challenge for dynamic Web service composition will be the ability to measure the quality or reliability of services that are delivered. This paper...

    Provided By Georgetown University

  • White Papers // May 2010

    Facilitating Economic Recovery And Sustainable Growth Through Reform Of The Securities Class?]Action System: Exploring Arbitration As An Alternative To Litigation

    In the aftermath of the global economic collapse of 2008, policymakers from around the world have been considering regulations designed to reduce the risk of future economic turmoil. Their focus has been on powers and procedures designed to reduce systemic risk and to help ensure financial stability in the world...

    Provided By Georgetown University

  • White Papers // Dec 2009

    How Well Does The US Social Insurance System Provide Social Insurance?

    The authors analyze the insurance provided by the U.S. social security and income tax system within a model where agents receive idiosyncratic, wage-rate shocks that are privately observed. They consider two reforms: a piecemeal reform that optimally chooses the social security benefit function and a radical reform which eliminates the...

    Provided By Georgetown University

  • White Papers // Sep 2009

    Human Capital Values And Returns: Bounds Implied By Earnings And Asset Returns Data

    The authors provide theory for calculating bounds on both the value of an individual's human capital and the return on an individual's human capital, given knowledge of the process governing earnings and financial asset returns. The authors calculate bounds using U.S. data on male earnings and financial asset returns. The...

    Provided By Georgetown University

  • White Papers // Jul 2009

    Capital Structure Over The Business Cycle

    Why aggregate equity payouts and debt are issued positively correlated over the business cycle in U.S. data? Standard Real Business Cycle (RBC) models have few predictions about capital structure, because they assume that financial markets are frictionless. On the other hand, the tradeoff theory of capital structure argues that financial...

    Provided By Georgetown University

  • White Papers // Jun 2009

    The Cloud, the Crowd, and Public Policy

    The Internet is entering a new phase that represents a fundamental shift in how computing is done. This phase, called Cloud computing, includes activities such as Web 2.0, Web services, the Grid, and Software as a Service, which are enabling users to tap data and software residing on the Internet...

    Provided By Georgetown University

  • White Papers // Jun 2009

    Enabling Efficient Wireless Communications: The Role of Secondary Spectrum Markets

    Economists proposed using markets to allocate spectrum as early as the 1950s. Yet, that vision became a reality only in the 1990s when policymakers embraced markets via auctioning the initial rights for spectrum usage. Regardless of whether initial spectrum is allocated by comparative hearing, lottery or auction, however, any initial...

    Provided By Georgetown University

  • White Papers // Oct 2010

    Is Leasing Greener Than Selling?

    Based on the proposition that leasing is environmentally superior to selling, some firms have adopted a leasing strategy and others promote their existing leasing programs as environmentally superior in order to "Green" their image. The main argument is that as a leasing firm retains ownership of the o -lease units,...

    Provided By Georgetown University

  • White Papers // Jul 2010

    Tariff Pass-Through, Firm Heterogeneity And Product Quality

    This paper explores tariff pass-through at the firm level, and investigates how it depends on firm heterogeneity in productivity and product differentiation in quality. Using an extended version of the Melitz and Ottaviano (2008) model, the author shows that exporting firms adjust both their markups and product quality in response...

    Provided By Georgetown University

  • White Papers // Jun 2009

    The Cloud, the Crowd, and Public Policy

    The Internet is entering a new phase that represents a fundamental shift in how computing is done. This phase, called Cloud computing, includes activities such as Web 2.0, Web services, the Grid, and Software as a Service, which are enabling users to tap data and software residing on the Internet...

    Provided By Georgetown University

  • White Papers // May 2010

    Weaving Functional and Non-Functional Attributes for Dynamic Web Service Composition

    Given the numerous, potentially reusable, Web services available on the Internet, search and composition techniques that efficiently discover viable services will be a strong requirement. A major challenge for dynamic Web service composition will be the ability to measure the quality or reliability of services that are delivered. This paper...

    Provided By Georgetown University

  • White Papers // May 2010

    Facilitating Economic Recovery And Sustainable Growth Through Reform Of The Securities Class?]Action System: Exploring Arbitration As An Alternative To Litigation

    In the aftermath of the global economic collapse of 2008, policymakers from around the world have been considering regulations designed to reduce the risk of future economic turmoil. Their focus has been on powers and procedures designed to reduce systemic risk and to help ensure financial stability in the world...

    Provided By Georgetown University

  • White Papers // Jan 2011

    The Task Composition Of Offshoring By U.S. Multinationals

    Recent advances in communications technology allow for greater fragmentation of production across borders. However, the authors do not observe U.S. multinationals o shoring all activities that are technologically feasible to perform abroad. This paper uses task-level routineness data paired with firm-level offshoring data to explain why this is the case....

    Provided By Georgetown University

  • White Papers // Sep 2009

    Human Capital Values And Returns: Bounds Implied By Earnings And Asset Returns Data

    The authors provide theory for calculating bounds on both the value of an individual's human capital and the return on an individual's human capital, given knowledge of the process governing earnings and financial asset returns. The authors calculate bounds using U.S. data on male earnings and financial asset returns. The...

    Provided By Georgetown University

  • White Papers // Jul 2009

    Capital Structure Over The Business Cycle

    Why aggregate equity payouts and debt are issued positively correlated over the business cycle in U.S. data? Standard Real Business Cycle (RBC) models have few predictions about capital structure, because they assume that financial markets are frictionless. On the other hand, the tradeoff theory of capital structure argues that financial...

    Provided By Georgetown University

  • White Papers // Jun 2009

    Enabling Efficient Wireless Communications: The Role of Secondary Spectrum Markets

    Economists proposed using markets to allocate spectrum as early as the 1950s. Yet, that vision became a reality only in the 1990s when policymakers embraced markets via auctioning the initial rights for spectrum usage. Regardless of whether initial spectrum is allocated by comparative hearing, lottery or auction, however, any initial...

    Provided By Georgetown University

  • White Papers // Dec 2009

    How Well Does The US Social Insurance System Provide Social Insurance?

    The authors analyze the insurance provided by the U.S. social security and income tax system within a model where agents receive idiosyncratic, wage-rate shocks that are privately observed. They consider two reforms: a piecemeal reform that optimally chooses the social security benefit function and a radical reform which eliminates the...

    Provided By Georgetown University

  • White Papers // May 2011

    Presenting Software License Conflicts Through Argumentation

    Heterogeneously-licensed systems pose new challenges to architects and designers seeking to develop systems with appropriate intellectual property rights and obligations. In the extreme case, license conflicts may prevent a system's legal use. The authors' previous work showed that rights, obligations, and conflicts can be calculated. But architects benefit from fuller...

    Provided By Georgetown University

  • White Papers // Feb 2013

    Crowdsourcing Cyber Security: A Property Rights View of Exclusion and Theft on the Information Commons

    Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals...

    Provided By Georgetown University

  • White Papers // Dec 2012

    An Empirical Evaluation of Relay Selection in Tor

    While Tor is the most popular low-latency anonymity network in use today, Tor suffers from a variety of performance problems that continue to inhibit its wide scale adoption. One reason why Tor is slow is due to the manner in which clients select Tor relays. There have been a number...

    Provided By Georgetown University

  • White Papers // Oct 2012

    Bounds on Contention Management in Radio Networks

    The local broadcast problem assumes that processes in a wireless network are provided messages, one by one, that must be delivered to their neighbors. In this paper, the authors prove tight bounds for this problem in two well-studied wireless network models: the classical model, in which links are reliable and...

    Provided By Georgetown University