Search
Results
-
Counting crime? A review on the production of crime data
(2024)CURATE Working PaperThis literature review is aimed at providing an overview of the arguments, concerns, and issues raised by criminologists, sociologists, and psychologists regarding crime data and their quality. Given the increasing, widespread use of (crime) data to serve analytical purposes (e.g., predictive policing) and global discussions and measures on big data (policing), this review presents relevant and timely insights. It assists our understanding ...Working Paper -
Inertia effects of past behavior in modal shift behavior
(2020)Arbeitsberichte Verkehrs- und RaumplanungThis paper focuses on empirically investigating the inertia effects of past behavior in modal shift behavior and contributes to the current state of the art by three aspects. Firstly, this study introduces and tests the potential influences of the inertia effect of past behavior on the traveler’s preferences regarding level-of-service (LOS) variables, besides the impacts of inertia effect on the preference for the frequently used transport ...Working Paper -
Overcoming the Carbon Trap: Climate Policy and Technology Tipping
(2023)Economics Working Paper SeriesWe construct an overlapping generations model in which the choice between dirty and clean technology hinges on the economy’s capital stock, susceptible to climate-induced depreciation. The process of capital accumulation contributes to environmental emissions, yet their intensity can be mitigated through a shift to cleaner production methods. The tipping point of technological transition is en dogenously determined, leading to a diverse ...Working Paper -
Tutorial on Data-driven Power Flow Linearization - Part I: Challenges and Training Algorithms
(2023)The widespread deployment of advanced metering infrastructure has led to an increased interest in data-driven power flow linearization (DPFL) methods. To date, substantial studies have already been carried out in the field of DPFL, which have shown that DPFL models are often more accurate than physics-based power flow linearization models. In this paper, a tutorial on this topic is provided. This tutorial reviews the motivations, challenges, ...Working Paper -
Creating Inequality in Access to Public Transit?
(2023)Transit-oriented development (TOD) promises to improve access to public transit, especially for low-income households who rely on public transit more strongly than other groups. This paper investigates whether TOD indeed helps to allow more low-income households to live close to public transit. We study a specific and increasingly popular form of TOD in the context of an already developed public transit system: increasing the amount of ...Working Paper -
Media Bias and Climate Change Skepticism
(2023)Center for Law & Economics Working Paper SeriesThis study examines the impact on climate change attitudes of exposure to Fox News Channel (FNC), the top-rated U.S. cable television channel known for its conservative bias. Our findings indicate a statistically significant shift towards climate change skepticism and a decline in support for climate change mitigation policies. The findings remain robust across multiple empirical methodologies, including addressing the endogeneity of ...Working Paper -
Hyper Hoare Logic: (Dis-)Proving Program Hyperproperties (extended version)
(2023)arXivHoare logics are proof systems that allow one to formally establish properties of computer programs. Traditional Hoare logics prove properties of individual program executions (so-called trace properties, such as functional correctness). Hoare logic has been generalized to prove also properties of multiple executions of a program (so-called hyperproperties, such as determinism or non-interference). These program logics prove the absence ...Working Paper -
CheckMate: Automated Game-Theoretic Security Reasoning
(2023)EasyChair PreprintWe present the CheckMate framework for full automation of game theoretic security analysis, with particular focus on blockchain technologies. CheckMate analyzes protocols modeled as games for their game-theoretic security — that is, for incentive compatibility and Byzantine fault-tolerance. The framework either proves the protocols secure by providing defense strategies or yields all possible attack vectors. For protocols that are not ...Working Paper -
Towards Autonomous Robotic Precision Harvesting: Mapping, Localization, Planning and Control for a Legged Tree Harvester
(2021)This paper presents an integrated system for performing precision harvesting missions using a legged harvester. Our harvester performs a challenging task of autonomous navigation and tree grabbing in a confined, GPS denied forest environment. Strategies for mapping, localization, planning, and control are proposed and integrated into a fully autonomous system. The mission starts with a human mapping the area of interest using a custom-made ...Working Paper -
Modelling urban mode choice behavior during the COVID-19 pandemic in Switzerland using MDCEV models
(2021)Arbeitsberichte Verkehrs- und RaumplanungIn this paper we describe and model the behavioral response of the COVID-19 pandemic in Switzerland. We use the MOBIS-COVID GPS-tracking dataset which includes a pre-pandemic reference base. We transform the trip-level data in weekly distance proportions per mode per week, and model the data using a multiple discrete-continuous extreme value (MDCEV) model. We derive four distinct segments from September 2019 until the end of 2020 and use ...Working Paper