Author of the publication

Reproductive externalities and fertility behaviour

. European Economic Review, 44 (4-6): 619--644 (May 2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Against Denial of Service Attacks Using Secure Name Resolution., , and . Security and Management, page 675-681. CSREA Press, (2003)Injecting Distributed Capabilities into Legacy Applications Through Cloning and Virtualization., and . PDPTA, CSREA Press, (2000)Push-Pull Gossiping for Information Sharing in Peer-to-Peer Communities., , and . PDPTA, page 1393-1399. CSREA Press, (2003)Rural livelihoods and income enhancement in the "new" economy., and . NSDR, page 1. ACM, (2010)Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation., , , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 66-80. Springer, (2010)P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains., and . IEEE Trans. Knowl. Data Eng., 22 (7): 1000-1013 (2010)Reproductive externalities and fertility behaviour. European Economic Review, 44 (4-6): 619--644 (May 2000)A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions., , and . IWIA, page 141-154. IEEE Computer Society, (2004)Linking consistency with object/thread semantics: an approach to robust computation., and . ICDCS, page 121-128. IEEE Computer Society, (1989)CLIDE: a distributed, symbolic programming system based on large-grained persistent objects., and . ICDCS, page 626-633. IEEE Computer Society, (1991)