Learn More
and many other colleagues for helpful comments and Michael Gordy for suggesting the idea behind section 7. This paper represents the views of the author and should not be interpreted as reflecting the views of the Board of Governors of the Federal Reserve System or other members of its staff. I can be reached via email at michael.s.gibson@frb.gov. Abstract:(More)
—A design methodology for low power MOS distributed amplifiers (DAs) is presented. The bias point of the MOS devices is optimized so that the DA can be used as a low-noise amplifier (LNA) in broadband applications. A prototype 9-mW LNA with programmable gain was implemented in a 0.18-m CMOS process. The LNA provides a flat gain, 21 , of 8 0.6 dB from DC to(More)
Player satisfaction is particularly difficult to ensure in online games, due to interactions with other players. In adversarial multiplayer games, matchmaking typically consists in trying to match together players of similar skill level. However, this is usually based on a single-skill value, and assumes the only factor of “fun” is the game(More)
A design methodology is presented for low power distributed amplifiers and is used for the design of a mW LNA with programmable gain implemented in a m CMOS process. The LNA provides a gain of dB from DC to GHz, with an input match of dB and an output match of dB over the entire band. The IIP3 is dBm, and the NF ranges from to dB. The gain is tunable from(More)
Ensuring security in wireless ad hoc networks is absolutely necessary and a must for any security-critical applications. In this paper, we report our progress in the development of an agent-based cooperative anomaly detection scheme for wireless ad hoc networks. The approach addresses the underlying distributed and cooperative nature of wireless ad hoc(More)
It is widely believed that disclosure quality improves investors' welfare by reducing cost of capital in a competitive market. This paper examines this conventional wisdom by studying a production economy in which disclosure influences a firm's investment decisions. I demonstrate three points. First, cost of capital could increase with disclosure quality(More)
Mobile Ad hoc networks (MANETs) are susceptible to several types of attacks due to their open medium, lack of centralized monitoring and management point, dynamic topology and other features. Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of the networks. However, all(More)
NOTE: Staff working papers in the Finance and Economics Discussion Series (FEDS) are preliminary materials circulated to stimulate discussion and critical comment. The analysis and conclusions set forth are those of the authors and do not indicate concurrence by other members of the research staff or the Board of Governors. References in publications to the(More)