Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Semantic Web Reasoning to Counter-Terrorism., , , , , and . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)Proactive information gathering for homeland security teams., , , , , , and . Commun. ACM, 47 (3): 48-50 (2004)Does non-traded input necessarily deepen the international non-diversification puzzle I?: The one-good case. Economics Letters, 49 (3): 281--285 (September 1995)Convergence, endogenous growth, and productivity disturbances, and . Journal of Monetary Economics, 38 (3): 535--547 (December 1996)Educated guesses and income distribution. Economics Letters, 48 (2): 173--177 (May 1995)Redistribution through education and other transfer mechanisms, , and . Journal of Monetary Economics, 50 (8): 1719-1750 (2003)available at http://ideas.repec.org/a/eee/moneco/v50y2003i8p1719-1750.html.