University of London

Displaying 1-40 of 113 results

  • White Papers // Feb 2012

    A Robust Boundary Detection Algorithm Based on Connectivity Only for 3D Wireless Sensor Networks

    In this paper, the authors develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate the approximate geometry of the 3D sensor network, producing a set of "Sealed" triangular boundary surfaces for separating non-boundary nodes and boundary node candidates....

    Provided By University of London

  • White Papers // Jan 2012

    Event-Condition-Action Rule Languages for the Semantic Web

    The Semantic Web is based on XML and RDF as its fundamental standards for exchanging and storing information on the World Wide Web. Event-Condition-Action (ECA) rules are a natural candidate for supporting reactive functionality on XML or RDF repositories. In this paper, the authors describe a language for ECA rules...

    Provided By University of London

  • White Papers // Sep 2011

    Distributed Target Tracking Under Realistic Network Conditions

    Distributed target tracking has been a widely studied problem for different applications, more recently considering distributed particle filter techniques for Wireless Sensor Networks (WSNs). However, the adaptation of distributed tracking filters to sensor networks with limited field-of-view and large raw-data management constraints under realistic networking conditions has not yet received...

    Provided By University of London

  • White Papers // Sep 2011

    WiSE-MNet: An Experimental Environment for Wireless Multimedia Sensor Networks

    The authors propose a simulation environment for networks for Wireless Multimedia Sensor Networks (WMSNs), i.e. networks with sensors capturing complex vectorial data, such as for example video and audio. The proposed simulation environment allows one to model the communication layers, the sensing and distributed applications of a WMSN. This Wireless...

    Provided By University of London

  • White Papers // Jun 2011

    Dynamic Energy Management for IP-Over-WDM Networks

    This paper proposes a new energy management framework for an IP over WDM network. A key constraint of the authors' architecture is to maintain the logical IP topology while saving energy by infrastructure sleeping and virtual router migration. Since the traffic in a network typically has a regular diurnal pattern...

    Provided By University of London

  • White Papers // Jun 2011

    Polly Cracker, Revisited

    In this paper, the authors initiate the formal treatment of cryptographic constructions - commonly known as "Polly Cracker" - based on the hardness of computing remainders modulo an ideal over multivariate polynomial rings. This paper is motivated by the observation that the Ideal Remainder (IR) problem is one of the...

    Provided By University of London

  • White Papers // May 2011

    PFT: A Protocol for Evaluating Video Trackers

    The growing interest in developing video tracking algorithms has not been accompanied by the development of commonly used evaluation criteria to assess and to compare their performance. Researchers often present trackers' results on different datasets and evaluate them with different performance measures thus hindering both formative and summative quality assessment....

    Provided By University of London

  • White Papers // May 2011

    Client-Based CardSpace-OpenID Interoperation

    The authors propose a novel scheme to provide interoperability between two of the most widely discussed identity management systems, namely CardSpace and OpenID. In this scheme, CardSpace users are able to obtain an assertion token from an OpenID-enabled identity provider, the contents of which can be processed by a CardSpace-enabled...

    Provided By University of London

  • White Papers // May 2011

    Delegatable Homomorphic Encryption With Applications to Fully Secure Outsourcing of Computation

    In this paper, the authors propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a trusted authority to control/delegate the capability to evaluate circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This primitive can be both seen as a public-key counterpart to verifiable computation, where...

    Provided By University of London

  • White Papers // Apr 2011

    Enhancing CardSpace Authentication Using a Mobile Device

    In this paper the authors propose a simple, novel scheme for using a mobile device to enhance CardSpace authentication. During the process of user authentication on a PC using CardSpace, a random and short-lived one-time password is sent to the user's mobile device; this must then be entered into the...

    Provided By University of London

  • White Papers // Apr 2011

    CardSpace-Shibboleth Integration for CardSpace Users

    Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of interoperability between such systems. In this paper the authors propose a simple, novel scheme to provide interoperability between two of the most widely...

    Provided By University of London

  • White Papers // Feb 2011

    A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

    There have been numerous recent proposals for key predistribution schemes for wireless sensor networks based on various types of combinatorial structures such as designs and codes. Many of these schemes have very similar properties and are analysed in a similar manner. The authors seek to provide a unified framework to...

    Provided By University of London

  • White Papers // Feb 2011

    Privacy in Identity & Access Management Systems

    This paper surveys the approaches for addressing privacy in open identity and access management systems that have been taken by a number of current systems. The paper begins by listing important privacy requirements and discusses how three systems that are being incrementally deployed in the Internet, namely SAML 2.0, CardSpace,...

    Provided By University of London

  • White Papers // Feb 2011

    Cryptanalysis of three matrix-based key establishment protocols

    The authors cryptanalyse a matrix-based key transport protocol due to Baum-slag, Camps, Fine, Rosenberger and Xu from 2006. They also cryptanal-yse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to Romanczuk and Ustimenko. Regular proposals are made to employ groups in cryptography; see...

    Provided By University of London

  • White Papers // Jan 2011

    Policy Compliance in Collaborative Systems

    When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confidential data. These decisions are based on which other agents are involved, what those agents can do in the given context,...

    Provided By University of London

  • White Papers // Jan 2011

    Breaking an Identity-Based Encryption Scheme Based on DHIES

    The search for Identity-Based Encryption (IBE) schemes having efficient algorithms and proven security has resulted in many proposals for schemes. A recent proposal, due to Chen et al., has very efficient encryption and decryption and claims to have security based on the security of the DHIES public key encryption scheme....

    Provided By University of London

  • White Papers // Jan 2011

    Credit Growth And Instability In Balkan Countries: The Role Of Foreign Banks

    The present paper seeks to examine the role played by foreign banks in the credit growth in Bosnia and Herzegovina, Croatia and Serbia. Fast credit expansion was the main contributor to economic growth in these countries prior to the financial and economic crisis of 2007-2010. This development is associated with...

    Provided By University of London

  • White Papers // Dec 2010

    Scalable RFID Security Protocols Supporting Tag Ownership Transfer

    The authors identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however,...

    Provided By University of London

  • White Papers // Dec 2010

    Implementing PassCard - A CardSpace-Based Password Manager

    The recently-proposed PassCard scheme enables CardSpace to be used as a password manager, thereby both improving the usability and security of passwords as well as encouraging CardSpace adoption. However, this scheme does not work with websites using HTTPS, seriously limiting its practicality. In this paper the authors extend PassCard to...

    Provided By University of London

  • White Papers // Dec 2010

    Partitioning the Wireless Environment for Determining Radio Coverage and Traffic Distribution With User Feedback

    To achieve high data rates and seamless coverage, radio access networks continue to increase in complexity, and the expenditure on operational tasks continues to rise to unprecedented levels. The development of Long Term Evolution (LTE) with Self-Organizing Network (SON) functions is being considered as an effective way to tackle these...

    Provided By University of London

  • White Papers // Dec 2010

    How Green Should Environmental Regulators Be?

    The extent to which environmental regulatory institutions are either 'Green' or 'Brown' impacts not just the intensity of regulation at any moment, but also the incentives for the development of new pollution-control technologies. The authors set up a strategic model of R&D in which a polluter can deploy technologies developed...

    Provided By University of London

  • White Papers // Nov 2010

    The Bank Of Japan's Monetary Policy During The Global Financial Crisis

    The global financial crisis forced the world's central banks to adopt non-traditional and unconventional policy measures, in addition to lowering their policy interest rates. The Bank Of Japan (BOJ), which has been seeking steps to normalize interest rates since it ended its policy of quantitative easing in 2006, has been...

    Provided By University of London

  • White Papers // Nov 2010

    Debt Valuation And Chapter 22

    Numerous studies have examined the effect on credit spreads of renegotiation. These studies have generally focused on the impact on spread levels in general, and not on how renegotiation influences the relative pricing of senior versus junior debt claims. In this paper, the authors show that the scope for sequential...

    Provided By University of London

  • White Papers // Nov 2010

    Inflation Targeting In Brazil, Chile And South Africa: An Empirical Investigation Of Their Monetary Policy Framework

    This paper tackles the monetary policy performance in Brazil, Chile and South Africa under inflation targeting framework. Furthermore, it provides an empirical assessment through using the unrestricted Vector Auto-Regression (VAR) and Structural Vector Auto-Regression (SVAR) approaches depending on data spans the period from the first quarter of 1970 to the...

    Provided By University of London

  • White Papers // Nov 2010

    The Financial Crisis Of 2007-9 And Emerging Countries: The Political Economy Analysis Of Central Banks In The Brazilian And Korean Economies

    Insofar as the global crisis of 2007-9 can be understood as a fully-fledged crisis of the financialisation era, it has presented new challenges for central banks. However, this paper argues the central banks' interventions in key middle income countries (Brazil and Korea) have reinforced the main characteristics of financialisation and...

    Provided By University of London

  • White Papers // Oct 2010

    The Theory And Empirical Credibility Of Commodity Money

    The recent instability in financial markets demonstrated the inadequacy of the mainstream treatment of money and the underlying production base. This has stimulated interest in the possible role of a money commodity. The author demonstrates that the fundamental function of monetary theory, an explanation of the general level of prices,...

    Provided By University of London

  • White Papers // Sep 2010

    Entrepreneurship: Self-Employment, Franchising And Freelancing

    Does the idea of working for oneself seem appealing? Many people are attracted to the potential financial and lifestyle rewards of running a business. Along with the independence of being wholly self reliant rather than depending on an employer for the income, one's timetable is own and one only have...

    Provided By University of London

  • White Papers // Sep 2010

    Foreign Exchange Reserves In A Credit Constrained Economy

    The authors discuss the role of foreign exchange reserves as precautionary savings under an imperfect market framework due to the presence of endogenously determined borrowing constraints. They show that cost of holding reserves is higher in borrowing constrained economies than unconstrained ones as a result of the leverage effect of...

    Provided By University of London

  • White Papers // Sep 2010

    Central Bank Independence, Bureaucratic Corruption And Fiscal Responses - Empirical Evidence

    This paper analyses the impact of bureaucratic corruption on fiscal policy outcomes for economies that have constituted to a greater or lessen extent independent central banks. The adverse implications of corruption on debt accumulation are verified using a cross-sectional setting of 77 developed and developing countries. Approximating central bank independence...

    Provided By University of London

  • White Papers // Aug 2010

    An Auto-Delegation Mechanism for Access Control Systems

    Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. The authors believe that systems in...

    Provided By University of London

  • White Papers // Jul 2010

    Using CardSpace as a Password Manager

    In this paper the authors propose a novel scheme that allows Windows CardSpace to be used as a password manager, thereby improving the usability and security of password use as well as potentially encouraging CardSpace adoption. Usernames and passwords are stored in personal cards, and these cards can be used...

    Provided By University of London

  • White Papers // Jul 2010

    NGO Accountability And The Sharing Of Knowledge

    Accountability mechanisms offer the opportunity for sharing knowledge, through their role in the synthesis, contextualisation and transmission of information. Through an examination and analysis of both the different types of knowledge possessed by NGO fieldworkers in a developing country, and the extent and effectiveness that these knowledge types are incorporated...

    Provided By University of London

  • White Papers // Jul 2010

    Web Server on a SIM Card

    In this paper the authors discuss the integration of a web server on a SIM card and the authors attempt an analysis from a security, management, operation and personalization perspective. A brief representation of the Smart Card Web Server (SCWS) will take place, along with a use case that will...

    Provided By University of London

  • White Papers // Jun 2010

    An Authorization Framework Resilient to Policy Evaluation Failures

    In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be evaluated or a sub-policy cannot be retrieved from some remote repository. Ideally, policy evaluation should be resilient to such failures and, at the very least, fail...

    Provided By University of London

  • White Papers // Jun 2010

    The Price Impact Of Economic News, Private Information And Trading Intensity

    In this paper the authors use three years high-frequency data to investigate the role played by public and private information in the process of price formation in two secondary government bond markets. As public information they examine the impact of regularly scheduled macroeconomic news announcements. They identify those announcements with...

    Provided By University of London

  • White Papers // Jun 2010

    Ethnic Parity In Labour Market Outcomes For Benefit Claimants In Great Britain

    Accurate estimates of the extent of ethnic parity amongst benefit claimants are very important for policymakers who provide interventions for these groups. The authors use new administrative data on benefit claimants in Great Britain to document differences in labour market outcomes between Ethnic Minority and White claimants, both before and...

    Provided By University of London

  • White Papers // May 2010

    Regulating Altruistic Agents

    Altruism or 'Regard for others' can encourage self-restraint among generators of negative externalities, thereby mitigating the externality problem. The authors explore how introducing impure altruism into standard regulatory settings alters regulatory prescriptions. They show that the optimal calibration of both quantitative controls and externality taxes are affected. It also leads...

    Provided By University of London

  • White Papers // Apr 2010

    Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks

    The increasingly complex roles for which Wireless Sensor Networks (WSNs) are being employed have driven the desire for energy-efficient reliable target tracking. In this paper, a biologically inspired, adaptive energy-efficient multi-sensor scheme is proposed for collaborative target tracking in WSNs. Behavioural data gleaned whilst tracking the target is recorded as...

    Provided By University of London

  • White Papers // Apr 2010

    Time-Specific Encryption and Its Applications

    This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Instant Key (TIK). The sender of a message can specify any time interval during the encryption process; the receiver can...

    Provided By University of London

  • White Papers // Apr 2010

    Time-Specific Encryption

    This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Instant Key (TIK). The sender of a message can specify any time interval during the encryption process; the receiver can...

    Provided By University of London

  • White Papers // Feb 2010

    Financialisation And Capitalist Accumulation: Structural Accounts Of The Crisis Of 2007-9

    The crisis of 2007-9 resulted from a financial bubble marked by weak production, expanding bank assets, and growing household indebtedness. For these reasons the crisis casts light on the financialisation of capitalist economies. The literature on financialisation generally links weak production with booming finance; according to some, causation runs from...

    Provided By University of London

  • White Papers // Mar 2010

    The Role Of Banks In The Korean Financial Crisis Of 1997: An Interpretation Based On The Financial Instability Hypothesis

    This paper shows the fundamental role of Korean banks in the bursting of South Korea's financial crisis in 1997. It argues that Minsky's financial instability hypothesis can be used as an analytical tool to explain the unfolding of the Korean financial crisis. However, some changes in the original Financial Instability...

    Provided By University of London

  • White Papers // Oct 2010

    The Theory And Empirical Credibility Of Commodity Money

    The recent instability in financial markets demonstrated the inadequacy of the mainstream treatment of money and the underlying production base. This has stimulated interest in the possible role of a money commodity. The author demonstrates that the fundamental function of monetary theory, an explanation of the general level of prices,...

    Provided By University of London

  • White Papers // Nov 2010

    The Bank Of Japan's Monetary Policy During The Global Financial Crisis

    The global financial crisis forced the world's central banks to adopt non-traditional and unconventional policy measures, in addition to lowering their policy interest rates. The Bank Of Japan (BOJ), which has been seeking steps to normalize interest rates since it ended its policy of quantitative easing in 2006, has been...

    Provided By University of London

  • White Papers // Apr 2009

    Asset Allocation With Option-Implied Distributions: A Forward-Looking Approach

    The authors address the empirical implementation of the static asset allocation problem by employing forward-looking information from market option prices. To this end, constant maturity one month S&P 500 implied distributions are extracted and subsequently transformed to the corresponding risk-adjusted ones. Then, optimal portfolios consisting of a risky and a...

    Provided By University of London

  • White Papers // Dec 2010

    Partitioning the Wireless Environment for Determining Radio Coverage and Traffic Distribution With User Feedback

    To achieve high data rates and seamless coverage, radio access networks continue to increase in complexity, and the expenditure on operational tasks continues to rise to unprecedented levels. The development of Long Term Evolution (LTE) with Self-Organizing Network (SON) functions is being considered as an effective way to tackle these...

    Provided By University of London

  • White Papers // Apr 2009

    Characterisation of Low Reflectivity Antenna Supports for Electrically Small Antennas, and Pattern Measurement Via Optical Fibre to Eliminate Common Mode Current Errors

    Electrically small antennas are widely used in wireless communications applications because they have near omni-directional radiation. Development of wearable computer systems has been growing rapidly: electrically, as well as physically, small antennas are important requirements to the successful deployment in the consumer market. It is undesirable to use bulky cables...

    Provided By University of London

  • White Papers // Jul 2009

    A Guide to Trust in Mobile Ad Hoc Networks

    In this paper, the authors examine issues of trust and reputation in Mobile Ad hoc Networks. They look at a number of the trust and reputation models that have been proposed and they highlight open problems in this area. A Mobile Ad hoc NETwork (MANET), as described by the Internet...

    Provided By University of London

  • White Papers // Jul 2009

    Scalable RFID Pseudonym Protocol

    In this paper, the authors address the issue of scalability in RFID pseudonym protocols. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed...

    Provided By University of London

  • White Papers // Jan 2012

    Event-Condition-Action Rule Languages for the Semantic Web

    The Semantic Web is based on XML and RDF as its fundamental standards for exchanging and storing information on the World Wide Web. Event-Condition-Action (ECA) rules are a natural candidate for supporting reactive functionality on XML or RDF repositories. In this paper, the authors describe a language for ECA rules...

    Provided By University of London

  • White Papers // Jan 2009

    Abstraction for Concurrent Objects

    Concurrent data structures are usually designed to satisfy correctness conditions such as sequential consistency and linearizability. In this paper, the authors consider the following fundamental question: what guarantees are provided by these conditions for client programs? They formally show that these conditions can be characterized in terms of observational refinement....

    Provided By University of London

  • White Papers // Aug 2010

    An Auto-Delegation Mechanism for Access Control Systems

    Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. The authors believe that systems in...

    Provided By University of London

  • White Papers // Apr 2010

    Time-Specific Encryption

    This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Instant Key (TIK). The sender of a message can specify any time interval during the encryption process; the receiver can...

    Provided By University of London

  • White Papers // Jul 2009

    Broadcast Encryption With Multiple Trust Centers and Dynamic Coalitions

    The authors demonstrate an extension of Hierarchical Identity-Based Encryption (HIBE) from the domain of a single Trusted Authority (TA) to a coalition of multiple independent Trusted Authorities with their own hierarchies. Coalitions formed under such schemes may be temporary or dynamic in membership without compromising security. In this paper, the...

    Provided By University of London

  • White Papers // Apr 2009

    Building Key-Private Public-Key Encryption Schemes

    In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA master public-keys. This security property has applications in the prevention of traffic analysis in coalition...

    Provided By University of London

  • White Papers // Jan 2009

    Robust and Efficient Communication Overlays for Trust Authority Computations

    This paper presents a novel algorithm for enhancing the efficiency and robustness of distributed trust authority protocols for Mobile Ad hoc NETworks (MANETs). The authors' algorithm determines a quorum of trust authority nodes required for a distributed protocol run based upon a set of quality metrics and establishes an efficient...

    Provided By University of London

  • White Papers // Jan 2010

    XML Structure Compression

    XML is becoming the universal language for communicating information on the Web and has gained wide acceptance through its standardisation. As such XML plays an important enabling role for dynamic computation over the Web. Compression of XML documents is crucial in this process as, in its raw form, it often...

    Provided By University of London

  • White Papers // Jun 2011

    Dynamic Energy Management for IP-Over-WDM Networks

    This paper proposes a new energy management framework for an IP over WDM network. A key constraint of the authors' architecture is to maintain the logical IP topology while saving energy by infrastructure sleeping and virtual router migration. Since the traffic in a network typically has a regular diurnal pattern...

    Provided By University of London

  • White Papers // Feb 2010

    Mixing Biases: Structural Changes in the AS Topology Evolution

    In this paper, the authors study the structural evolution of the AS topology as inferred from two different datasets over a period of seven years. They use a variety of topological metrics to analyze the structural differences revealed in the AS topologies inferred from the two different datasets. In particular,...

    Provided By University of London

  • White Papers // Jan 2010

    To Add or Not to Add: Privacy and Social Honeypots

    Online Social Networks (OSNs) have become a mainstream cultural phenomenon in the past years, where million of people connect to each other and share memories, digital media and business relations. Many users also publish personal information about their activities, relationships, locations and interests on these sites, seemingly unaware of how...

    Provided By University of London

  • White Papers // Sep 2011

    Distributed Target Tracking Under Realistic Network Conditions

    Distributed target tracking has been a widely studied problem for different applications, more recently considering distributed particle filter techniques for Wireless Sensor Networks (WSNs). However, the adaptation of distributed tracking filters to sensor networks with limited field-of-view and large raw-data management constraints under realistic networking conditions has not yet received...

    Provided By University of London

  • White Papers // Sep 2011

    WiSE-MNet: An Experimental Environment for Wireless Multimedia Sensor Networks

    The authors propose a simulation environment for networks for Wireless Multimedia Sensor Networks (WMSNs), i.e. networks with sensors capturing complex vectorial data, such as for example video and audio. The proposed simulation environment allows one to model the communication layers, the sensing and distributed applications of a WMSN. This Wireless...

    Provided By University of London

  • White Papers // May 2011

    PFT: A Protocol for Evaluating Video Trackers

    The growing interest in developing video tracking algorithms has not been accompanied by the development of commonly used evaluation criteria to assess and to compare their performance. Researchers often present trackers' results on different datasets and evaluate them with different performance measures thus hindering both formative and summative quality assessment....

    Provided By University of London

  • White Papers // Sep 2009

    Localization of Distributed Wireless Cameras

    Cooperative cameras enable monitoring wide areas and detecting actions and events on a large scale. Due to hardware advancements and economic factors, distributed networks are becoming widely used for a variety of applications ranging from traffic monitoring and surveillance in shopping malls to sports coverage. However, the localization of a...

    Provided By University of London

  • White Papers // Sep 2009

    Multi-Camera Track-Before-Detect

    The authors present a novel multi-camera multi-target fusion and tracking algorithm for noisy data. Information fusion is an important step towards robust multi-camera tracking and allows them to reduce the effect of projection and parallax errors as well as of the sensor noise. Input data from each camera view are...

    Provided By University of London

  • White Papers // Apr 2009

    Audio-Assisted Trajectory Estimation in Non-Overlapping Multi-Camera Networks

    The authors present an algorithm to improve trajectory estimation in networks of non-overlapping cameras using audio measurements. The algorithm fuses audiovisual cues in each camera's field of view and recovers trajectories in unobserved regions using microphones only. Audio source localization is performed using STereo Audio and Cycloptic Vision (STAC) sensor...

    Provided By University of London

  • White Papers // Apr 2010

    Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor Networks

    The increasingly complex roles for which Wireless Sensor Networks (WSNs) are being employed have driven the desire for energy-efficient reliable target tracking. In this paper, a biologically inspired, adaptive energy-efficient multi-sensor scheme is proposed for collaborative target tracking in WSNs. Behavioural data gleaned whilst tracking the target is recorded as...

    Provided By University of London

  • White Papers // Feb 2010

    The Role Of Informal Institutions In Corporate Governance: Brazil, Russia, India And China Compared

    This paper argues that the role of informal institutions is central to understanding the functioning of corporate governance. The authors focus on the four largest emerging markets; Brazil, Russia India and China - commonly referred to as the BRIC countries. The analysis is based on the Helmke and Levitsky framework...

    Provided By University of London

  • White Papers // Jan 2010

    Firm Performance And The Geography Of FDI: Evidence From 46 Countries

    The literature on the link between multinationality and firm performance has generally disregarded the role of geography. However, the geography of FDI may matter, particularly now that globalisation has increased the heterogeneity of overseas investments. Moreover, although the range of countries that conducts FDI has widened considerably, the literature still...

    Provided By University of London

  • White Papers // Dec 2010

    How Green Should Environmental Regulators Be?

    The extent to which environmental regulatory institutions are either 'Green' or 'Brown' impacts not just the intensity of regulation at any moment, but also the incentives for the development of new pollution-control technologies. The authors set up a strategic model of R&D in which a polluter can deploy technologies developed...

    Provided By University of London

  • White Papers // Nov 2010

    Debt Valuation And Chapter 22

    Numerous studies have examined the effect on credit spreads of renegotiation. These studies have generally focused on the impact on spread levels in general, and not on how renegotiation influences the relative pricing of senior versus junior debt claims. In this paper, the authors show that the scope for sequential...

    Provided By University of London

  • White Papers // Sep 2010

    Foreign Exchange Reserves In A Credit Constrained Economy

    The authors discuss the role of foreign exchange reserves as precautionary savings under an imperfect market framework due to the presence of endogenously determined borrowing constraints. They show that cost of holding reserves is higher in borrowing constrained economies than unconstrained ones as a result of the leverage effect of...

    Provided By University of London

  • White Papers // Sep 2010

    Central Bank Independence, Bureaucratic Corruption And Fiscal Responses - Empirical Evidence

    This paper analyses the impact of bureaucratic corruption on fiscal policy outcomes for economies that have constituted to a greater or lessen extent independent central banks. The adverse implications of corruption on debt accumulation are verified using a cross-sectional setting of 77 developed and developing countries. Approximating central bank independence...

    Provided By University of London

  • White Papers // Jun 2010

    The Price Impact Of Economic News, Private Information And Trading Intensity

    In this paper the authors use three years high-frequency data to investigate the role played by public and private information in the process of price formation in two secondary government bond markets. As public information they examine the impact of regularly scheduled macroeconomic news announcements. They identify those announcements with...

    Provided By University of London

  • White Papers // May 2010

    Regulating Altruistic Agents

    Altruism or 'Regard for others' can encourage self-restraint among generators of negative externalities, thereby mitigating the externality problem. The authors explore how introducing impure altruism into standard regulatory settings alters regulatory prescriptions. They show that the optimal calibration of both quantitative controls and externality taxes are affected. It also leads...

    Provided By University of London

  • White Papers // Apr 2010

    Life-cycle, Effort And Academic Deadwood

    It has been observed that university professors sometimes become less research active in their mature years. This paper models the decision to become inactive as a utility maximising problem under conditions of uncertainty and derives an age-dependent inactivity condition for the level of research productivity. The economic analysis is applicable...

    Provided By University of London

  • White Papers // Mar 2010

    Liquidity Preference And Information

    This paper explores the link between anticipated information and a preference for liquidity in investment choices. Given a subjective ordering of investment portfolios by their liquidity, the authors identify a sufficient condition under which the prospect of finer resolution of uncertainty creates a preference for more liquid positions. They then...

    Provided By University of London

  • White Papers // Mar 2010

    Wage Subsidies And International Trade: When Does Policy Coordination Pay?

    National labour market institutions interact across national boundaries when product markets are global. Labour market policies can thus entail spill-overs, a fact widely ignored in the academic literature. This paper studies the effects of wage subsidies in an international duopoly model with unionised labour markets. The authors document both positive...

    Provided By University of London

  • White Papers // Feb 2010

    Social Capital, Poverty And Social Exclusion In Italy

    The paper investigates whether social capital can affect the standard living of the Italian households based on poverty and social exclusion. The analysis is developed at the regional level through cross-sections based in the year 2002 and in the year 2003. The indices of social capital that the authors use...

    Provided By University of London

  • White Papers // Jan 2010

    Social Capital, Community Governance And Credit Market

    Financial contracts represent an exchange of financial resources today, such as money, for a promise to return more financial resources tomorrow. The aim of the paper is to test whether cheating or respecting a promise, in particular a "Financial one", is also a matter of community norms in which the...

    Provided By University of London