B. Reich

Learn More
We use Sarnoff's next-generation video processor, the PVT-200, to demonstrate real-time algorithms for stereo processing, obstacle detection, and terrain estimation from stereo cameras mounted on a moving vehicle. Sarnoff's stereo processing and obstacle detection capabilities are currently being used in several Unmanned Ground Vehicle (UGV) programs,(More)
Identity economics provides a framework to analyze economic outcomes by establishing people's identities—not just pecuniary incen-tives—as primary motivations for choice. The heart of the framework is social difference and norms. Who people are, and norms for how they should look, act, and interact, shape economic life. The original papers embed social(More)
We use economic theory to examine the possible outcomes facing a culturally diverse population. We ask which cultures emerge and persist and what happens to social cohesion. We find three possible outcomes for a community: assimilation, where the community integrates and one group conforms to the culture of another; segregation, where groups socially(More)
Nations stay together when citizens share enough values and preferences. Homogeneity amongst people can be built with education, teaching a common language to facilitate communication, but also by brute force such as prohibiting local cultures. Democracies and dictators have different incentives when it comes to choosing how much and by what means to(More)
Nations stay together when citizens share enough values and preferences and can communicate with each other. Homogeneity amongst people can be built with education, teaching a common language to facilitate communication, but also by brute force such as prohibiting local cultures. Democracies and non-democracies have different incentives when it comes to(More)
Connections between individuals (firms, cities and countries) facilitate the exchange of goods, resources and information. Adversaries exploit these links to spread their attacks and lower the effectiveness of the network. Links thus create value but also enable the spread of attacks. How does this tension in the role of links shape the architecture of the(More)
  • 1