Research

Reset

Pages

Title
Author(s)
Year
Christopher Chyba
2016
Christopher Chyba November, 2016 With Wanda Austin; Washington, D.C.: Executive Office of the President, President's Council of Advisors on Science and Technology, 2016 Health International Security Science Technology National Security, Intelligence ...
Gene Grossman
2016
We introduce firm and worker heterogeneity into a model of innovation-driven endogenous growth. Individuals who differ in ability sort into either a research sector or a manufacturing sector that produces differentiated goods. Each research project ...
John Londregan
2015
I offer a model of the sustainability of authoritarian rule in which the transparency of productive economic activity enables the ruler to distinguish productive economic activity from preparations for rebellion. The less transparent the productive ...
Edward Felten
2015
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key ...
Edward Felten
2015
Bitcoin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bitcoin grew to comprise billions of dollars of economic value despite only cursory analysis of the system's design. Since ...
Edward Felten
2015
We study the ability of a passive eavesdropper to leverage “third-party” HTTP tracking cookies for mass surveillance. If two web pages embed the same tracker which tags the browser with a unique cookie, then the adversary can link visits to those pages ...
Gene Grossman
2015
How does globalization affect economic growth? We discuss mechanisms that link international integration to the incentives for knowledge accumulation and the efficacy of that process. First, integration facilitates the flow of knowledge across national ...
Edward Felten
2015
More generally, the privacy implications of A/B experiments on users have not received much attention in the policy literature. This essay  explains the distinctive privacy implications of A/B experiments, explores some hypotheticals, and applies the ...
Jacob Shapiro
2015
Does improved communication as provided by modern cell phone technology affect the production of violence during insurgencies? A priori predictions are ambiguous, introducing cell phones can enhance insurgent communications but can also make it easier for ...
2015
We measure the impact of a drastic new technology for producing steel—the minimill—on industry-wide productivity in the US steel industry, using unique plant-level data between 1963 and 2002. The sharp increase in the industry's productivity is ...
Aaron Friedberg
2015
What are the implications of nuclear developments for the conduct of international relations, and, in particular, how are they likely to shape events in eastern Eurasia, a zone of strategic interaction that extends from the Korean Peninsula, down through ...
Edward Felten
2014
We propose Mixcoin, a protocol to facilitate anonymous payments in Bitcoin and similar cryptocurrencies. We build on the emergent phenomenon of currency mixes, adding an accountability mechanism to expose theft. We demonstrate that incentives of mixes and ...
Christopher Chyba
2014
The correct calculation of and values for the critical mass of uranium or plutonium necessary for a nuclear fission weapon have long been understood and publicly available. The calculation requires solving the radial component in spherical coordinates of ...
Shirley Tilghman
2014
The long-held but erroneous assumption of never-ending rapid growth in biomedical science has created an unsustainable hypercompetitive system that is discouraging even the most outstanding prospective students from entering our profession—and making it ...
Alexander Glaser
2012
Shortly after the accident at the Fukushima Daiichi Nuclear Power Station, Germany’s government started preparing legislation that would close the country’s last nuclear power plant by 2022. But this wasn’t an entirely new development: Germany had been ...
Alexander Glaser
2012
Converting research reactors from highly enriched uranium (HEU) fuel to more proliferation-resistant low-enriched fuel is critical for achieving the objective of ending the use of directly weapon-usable materials in the civilian nuclear fuel cycle. The ...
Thomas Christensen
2012
Thomas Christensen August, 2012 Journal of Strategic Studies; Vol. 35, Issue 4 International Security Foreign Policy Technology National Security, Intelligence and Defense http://www.tandfonline.com/doi/full/10.1080/01402390.2012.714710#.UdGZNDvVCSo ...
Edward Felten
2012
Today’s social networking services require users to trust the service provider with the confidentiality and integrity of their data. But with their history of data leaks and privacy controversies, these services are not always deserving of this trust. ...
Zia Mian
2012
In this study, non-governmental researchers and analysts provide information on each country’s modernization plans.  Zia Mian March, 2012 In "Assuring Destruction Forever: Nuclear Weapon Modernization Around the World," ed. Ray Acheson; Reaching ...
Christopher Chyba
2012
Christopher Chyba February, 2012 With Ali Nouri; Gene Synthesis: Methods and Protocols, ed. Jean Peccoud (Methods in Molecular Biology Vol. 852); Humana Press Technology Science International Security Science and Technology http://link.springer.com ...

Pages