Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!
Evaluated the feasibility of applying the " bootstrapping " methodology to 5 securities analysts ' task of estimating future returns of common stock. Each S estimated the returns of 35 securities ...
Practical Fully Homomorphic Encryption 1 2 Kamil Kluczniak and Leonard Schild CISPA Helmholtz Center for Information Security , Saarbrücken, Germany, kamil.kluczniak@cispa.de Independent Analyst , Saarbrücken ...
the global population. It enables medical research algorithms to be securely deployed in the cloud because operations on encrypted genomic databases are conducted without revealing any individual genomes ...
. Early identification of poor rainfall con- expectations for the final seasonal rainfall accumulation, ditions is a critical indicator of food security . As such, moni- allowing analysts to quantify ...
Vol. 54 CONTENTS for OCTOBER 1999 No. 5 ARTICLES B. JONATHAN BERK,RICHARD GREEN,and VASANTNAIK C. Optimal Investment, Growth Options, and Security Returns W. MICHAEL BRANDT Estimating Portfolio ...
Research Centre, funded by the Economic and Social Research Council to provide researchers and analysts with secure data services.” ABSTRACT The effect of training data size ...
., Rwanda)? Analysts of civil war settlements have devoted significant attention to answering the above question. Identifying the appropriate policies and institutions that can enhance the security ...
with improved price efficiency. Using a new measure of the information content of prices and a comprehensive panel of 54,879 stock-quarters of Securities and Exchange Commission (SEC) market data, I establish ...
is to propose and solve a model of informed trading in securities markets that shares many features of the PIN model of Easley et al. (1996) but in which informed trading is endogenous like in Kyle (1985). We ...
Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!