Stephanie Wang

Learn More
Structural vector autoregressions with long-run restrictions are extraordinarily sensitive to lowfrequency correlations. Recent literature finds that the estimated effects of technology shocks are sensitive to how one treats hours per capita. However, after allowing for (statistically and economically significant) trend breaks in productivity, results are(More)
The slow diffusion of new technology in the agricultural sector in less developed countries has long been a puzzle to development economists. While most of the current empirical research on technology adoption focuses on credit constraints and learning spillovers, this paper examines the role of individual risk attitudes in the decision to adopt a new form(More)
BACKGROUND The multi-organizational collaborative is a popular model for quality improvement (QI) initiatives. It assumes organizations will share information and social support. However, there is no comprehensive documentation of the extent to which teams do interact. Considering QI collaboratives as networks, interactions among reams were documented, and(More)
Rational Expectations (RE) models have two crucial dimensions: (i) agents correctly forecast future prices given all available information, and (ii) given expectations, agents solve optimization problems and these solutions in turn determine actual price realizations. Experimental testing of such models typically focuses on only one of these two dimensions.(More)
Scholars studying the ethical, legal, and social issues (ELSI) associated with emerging technologies maintain the importance of considering these issues throughout the research and development cycle, even during the earliest stages of basic research. Embedding these considerations within the scientific process requires communication between ELSI scholars(More)
As more and more software is written every day, so too are bugs. Software verification is a way of using formal mathematical methods to prove that a program has no bugs. However, large-scale verified software systems are often hard to use or integrate for a programmer with no background in verification. In this project, I present a verified key-value store(More)
  • 1