There was an error with your search parameters. Please clear your search and try again.
1 to 10 of 42 Results
Adobe PDF - 151.7 KB - MD5: f777026f4aaf3449b55d57a57f64d5a7
In this supplementary appendix to "Network Topology in Decentralized Finance," we present a detailed methodology for constructing the DeFi network. First, we describe the process of using Ethereum transaction data to build the flows and balances that form the edges and weighted n... |
May 30, 2024
La industria de influencer marketing ha tenido un crecimiento constante en los últimos años, dando origen a tendencias como los influenciadores digitales, o entidades no humanas que son creadas por diseñadores o programadores a través de inteligencia artificial. Este tipo de infl... |
May 30, 2024
The Colombian Truth Commission (2018 to 2022) provides a unique opportunity to delve into the participation of exmilitary personnel and former guerrillas within truth-seeking bodies. While existing literature highlights the importance of their involvement in facilitating the assu... |
May 30, 2024
Despite theoretical advancements linking bias, prejudice, and stereotyping to the elicitation of early and late components, supporting evidence in real-life conflict contexts is lacking. This study examines the applicability of previous models in a dyadic context based on differi... |
May 30, 2024
There is a growing awareness regarding the potential mental health repercussions stemming from war-related trauma experienced by both civilians and veterans. However, the existing literature has thus far overlooked a crucial aspect: how observable psychological distress may or ma... |
Stata Binary - 425.6 KB - MD5: 1983da0d4077b40ff0d5bc8ed244fc10
|
May 30, 2024
Ideological indoctrination is a powerful tool for parties in armed conflicts, as they provide a source of motivation for combatants to stay in-group under difficult circumstances, and to perform actions that either put them in the line of risk or defy their personal ethical codes... |
May 22, 2024
En los casos de colecistectomía difícil, en los que no se logra alcanzar una vista critica de seguridad, como procedimiento de rescate se recomienda la colecistectomía subtotal o la conversión a colecistectomía abierta, siendo preferida la primera. No obstante, no hay evidencia s... |
May 15, 2024
This paper addresses the inherent procyclicality in widely adopted financial risk measures, such as expected shortfall (ES). We propose an innovative approach utilizing the worst-case higher moment (HM) risk measure, which offers a robust solution to distributional shifts by inco... |
Unknown - 11.1 MB - MD5: 8e95ae7b69a15faa54acd2637ac05be4
Information on transactions among identified addresses. |