Monetary Discretion, Pricing Complementarity and Dynamic Multiple Equilibria



A Appendix

A.1 Proofs

Proof of Proposition 1. (i) The conditions which characterize a steady-state equilib-
rium are (20) and (21). Multiplying (20) by the denominator of (21) reveals that these
conditions are equivalent to

p0 = h (p0) ,                                        (25)

where

h (Po) = m + β (m - Po                     (26)

m*

Steady-state equilibria are thus fixed points of h () , and fixed points of h () are steady-
state equilibria.

(ii) For P0 > 0 the function h () is strictly positive, strictly increasing, and strictly
convex.

(iii) Define Pe0 implicitly as follows:

Pe0:h0(Pe0)=1.

At Pe0,h() is tangent to the 45o line. By differentiating h () , we find that

e = (βε≡ -1) Γ"" > 0,


(27)


and Pe0 is decreasing in m.

Convexity of h () implies that if h (Pe0) > Pe0 then h () does not have a fixed point,
and if h
(Pe0) <P0 then h () has two fixed points. We now need to show that for low m,
h
(Po) < Po, and for high m, h (po) > Po- From (27) and (26), h (po) ^ Po is equivalent to

■m s (βc)ɪ/(ɪ-ε) ((ε - 1) )
m-


m

m-


1(1-ε)


(28)


It is straightforward to show from (28) that there is a unique value ofm, call it me such
that
h (po) ^ po for m ^ m. ■

Proof of Proposition 2.   (Sketch) From (18) and (19), point-in-time equilibrium

values of po are solutions to

fm- - mP = β μg(p°)PoY'"1 (m0 - m-) ,                (29)

po         g (po)

for fixed m0 >m- and p0o .

36



More intriguing information

1. From Communication to Presence: Cognition, Emotions and Culture towards the Ultimate Communicative Experience. Festschrift in honor of Luigi Anolli
2. Direct observations of the kinetics of migrating T-cells suggest active retention by endothelial cells with continual bidirectional migration
3. The name is absent
4. Why Managers Hold Shares of Their Firms: An Empirical Analysis
5. Reconsidering the value of pupil attitudes to studying post-16: a caution for Paul Croll
6. ASSESSMENT OF MARKET RISK IN HOG PRODUCTION USING VALUE-AT-RISK AND EXTREME VALUE THEORY
7. The name is absent
8. The name is absent
9. DISCUSSION: POLICY CONSIDERATIONS OF EMERGING INFORMATION TECHNOLOGIES
10. The name is absent