Columbia University

Displaying 1-40 of 295 results

  • White Papers // Jan 2015

    Lighting Sensitive Display

    Although display devices have been used for decades, they have functioned without taking into account the illumination of their environment. The authors present the concept of a Lighting Sensitive Display (LSD) a display that measures the incident illumination and modifies its content accordingly. Ideal LSD would be able to measure...

    Provided By Columbia University

  • White Papers // Dec 2014

    Movers and Shakers: Kinetic Energy Harvesting for the Internet of Things

    Numerous energy harvesting wireless devices that will serve as building blocks for the Internet of Things (IoT) are currently under development. However, there is still only limited understanding of the properties of various energy sources and their impact on energy harvesting adaptive algorithms. Hence, the authors focus on characterizing the...

    Provided By Columbia University

  • White Papers // Nov 2014

    Malicious-Client Security in Blind Seer: A Scalable Private DBMS

    "The Blind Seer system (Oakland 2014) is an efficient and scalable DBMS that affords both client query privacy and server data protection. It also provides the ability to enforce authorization policies on the system, restricting client's queries while maintaining the privacy of both query and policy. Blind Seer supports a...

    Provided By Columbia University

  • White Papers // Sep 2014

    Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems

    Support for fine-grained data management has all but disappeared from modern operating systems such as Android and iOS. Instead, the people must rely on each individual application to manage their data properly - e.g., to delete their emails, documents, and photos in full upon request; to not collect more data...

    Provided By Columbia University

  • White Papers // Jun 2014

    ParaShares: Finding the Important Basic Blocks in Multithreaded Programs

    Understanding and optimizing multithreaded execution is a significant challenge. Numerous research and industrial tools debug parallel performance by combing through program source or thread traces for pathologies including communication overheads, data dependencies, and load imbalances. This paper takes a new approach: it ignores any underlying pathologies, and focuses instead on...

    Provided By Columbia University

  • White Papers // May 2014

    GASPP: A GPU-Accelerated Stateful Packet Processing Framework

    Graphics Processing Units (GPUs) are a powerful platform for building high-speed network traffic processing applications using low-cost hardware. Existing systems tap the massively parallel architecture of GPUs to speed up certain computationally intensive tasks, such as cryptographic operations and pattern matching. However, they still suffer from significant overheads due to...

    Provided By Columbia University

  • White Papers // Apr 2014

    Benchmarking Methodology for Embedded Scalable Platforms

    Embedded Scalable Platforms (ESP) are a novel generation of platform architectures that yield optimal energy-performance operations while supporting a diversity of embedded application workloads. A companion methodology combines full-system simulation, pre-designed HW/SW interface libraries, high-level synthesis and FPGA prototyping to enable an effective design-space exploration which is driven by the...

    Provided By Columbia University

  • White Papers // Apr 2014

    Real-Time Power Control for Dynamic Optical Networks - Algorithms and Experimentation

    Core and aggregation optical networks are remarkably static, despite the emerging dynamic capabilities of the individual optical devices. This stems from the inability to address optical impairments in real-time. As a result, tasks such as adding and removing wavelengths take a substantial amount of time, and therefore, optical networks are...

    Provided By Columbia University

  • White Papers // Mar 2014

    Trading Functionality for Power within Applications

    When operating systems and hardware manage power and energy, they must be conservative in order to deliver requested resources while maintaining an expected rate of system throughput. Application-level energy management is more flexible, because applications can choose to request fewer resources or expect less performance, effectively trading accuracy or runtime...

    Provided By Columbia University

  • White Papers // Mar 2014

    Unsupervised Anomaly-based Malware Detection using Hardware Features

    Recent works have shown promise in using micro-architectural execution patterns to detect malware programs. These detectors belong to a class of detectors known as signature based detectors as they catch malware by comparing a program's execution pattern (signature) to execution patterns of known malware programs. In this paper, the authors...

    Provided By Columbia University

  • White Papers // Jan 2014

    Efficient Hash Probes on Modern Processors

    Bucketized versions of cuckoo hashing can achieve 95-99% occupancy, without any space overhead for pointers or other structures. However, such methods typically need to consult multiple hash buckets per probe, and have therefore been seen as having worse probe performance than conventional techniques for large tables. The authors consider workloads...

    Provided By Columbia University

  • White Papers // Jan 2014

    Tracking Quantiles of Network Data Streams with Dynamic Operations

    Quantiles are very useful in characterizing the data distribution of an evolving dataset in the process of data mining or network monitoring. The method of Stochastic Approximation (SA) tracks quantiles online by incrementally deriving and updating local approximations of the underly distribution function at the quantiles of interest. In this...

    Provided By Columbia University

  • White Papers // Jan 2014

    Throughput Optimization of Wireless Mesh Networks with MIMO Links

    Multiple Input Multiple Output (MIMO) antennas use sophisticated physical layer techniques to provide significant benefits over conventional antenna technology. Multiple independent data streams can be sent over the MIMO antenna elements. MIMO link can also suppress interference from neighboring links as long as the total useful streams and interfering streams...

    Provided By Columbia University

  • White Papers // Jan 2014

    Adding a Flow-Oriented Paradigm to Commodity Operating Systems

    The speed of CPUs and memories has historically outstripped I/O, but emerging network and storage technologies promise to invert this relationship. As a result, fundamental assumptions about the role of the operating system in computing systems will have to change. The authors propose an operating and application architecture that removes...

    Provided By Columbia University

  • White Papers // Dec 2013

    On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records

    The authors investigate the feasibility of mounting a de-anonymization attack against Tor and similar low-latency anonymous communication systems by using NetFlow records. Previous research has shown that adversaries with the ability to eavesdrop in real time at a few internet exchange points can effectively monitor a significant part of the...

    Provided By Columbia University

  • White Papers // Oct 2013

    A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups

    Composite-order bilinear groups provide many structural features that have proved useful for both constructing cryptographic primitives and as a technique in security reductions. Despite these convenient features, however, composite-order bilinear groups are less desirable than prime-order bilinear groups for reasons of efficiency. A recent line of paper has therefore focused...

    Provided By Columbia University

  • White Papers // Sep 2013

    Privacy Policy-Driven Mashups

    Mashups are novel content created by extracting and combining data and services from diverse data sources, in an automated manner, using Web services. The Web 2.0 technologies make it easier for individuals to create contents in third party service sites or clouds, and make easier for other third party mashup...

    Provided By Columbia University

  • White Papers // Aug 2013

    CellFlood: Attacking Tor Onion Routers on the Cheap

    In this paper, the authors introduce a new denial-of-service attack against tor onion routers and they study its feasibility and implications. In particular, they exploit a design flaw in the way Tor software builds virtual circuits and demonstrate that an attacker needs only a fraction of the resources required by...

    Provided By Columbia University

  • White Papers // Jul 2013

    Server-Side Code Injection Attacks: A Historical Perspective

    Server-side code injection attacks used to be one of the main culprits for the spread of malware. A vast amount of research has been devoted to the problem of effectively detecting and analyzing these attacks. Common belief seems to be that these attacks are now a marginal threat compared to...

    Provided By Columbia University

  • White Papers // Jun 2013

    Order-Preserving Encryption Secure Beyond One-Wayness

    Semantic-security of individual bits under a ciphertext is fundamental notion in modern cryptography. In this paper, the authors present the first results about this fundamental problem for Order-Preserving Encryption (OPE): \"What plaintext information can be semantically hidden by OPE encryptions?\" While OPE has gained much attention in recent years due...

    Provided By Columbia University

  • White Papers // Jun 2013

    On Finite Block-Length Quantization Distortion

    The authors investigate the upper and lower bounds on the quantization distortions for independent and identically distributed sources in the finite block-length regime. Based on the convex optimization framework of the rate-distortion theory, they derive a lower bound on the quantization distortion under finite block-length, which is shown to be...

    Provided By Columbia University

  • White Papers // Jun 2013

    CloudFence: Data Flow Tracking as a Cloud Service

    The risk of unauthorized private data access is among the primary concerns for users of cloud-based services. For the common setting in which the infrastructure provider and the service provider are different, users have to trust their data to both parties, although they interact solely with the latter. In this...

    Provided By Columbia University

  • White Papers // May 2013

    Computational Decoys for Cloud Security

    Cloud-based applications benefit from the scalability and efficiency offered by server consolidation and shared facilities. However, the shared nature of cloud infrastructures may introduce threats stemming from the co-location and combination of untrusted components, in addition to typical risks due to the inevitable presence of weaknesses in the infrastructure itself....

    Provided By Columbia University

  • White Papers // Apr 2013

    You Can Type, But You Can't Hide: A Stealthy GPU-Based Keylogger

    Keyloggers are a prominent class of malware that harvests sensitive data by recording any typed in information. Keylogger implementations strive to hide their presence using rootkit-like techniques to evade detection by antivirus and other system protections. In this paper, the authors present a new approach for implementing a stealthy keylogger:...

    Provided By Columbia University

  • White Papers // Mar 2013

    Cloudopsy: an Autopsy of Data Flows in the Cloud

    Despite the apparent advantages of cloud computing, the fear of unauthorized exposure of sensitive user data and non-compliance to privacy restrictions impedes its adoption for security-sensitive tasks. For the common setting in which the cloud infrastructure provider and the online service provider are different, end users have to trust the...

    Provided By Columbia University

  • White Papers // Mar 2013

    WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab

    Wireless networking has recently gained tremendous attention in research and education. Since the concepts taught in wireless courses are difficult to acquire only through lectures, hands-on lab experience is indispensable. While Wi-Fi based networking labs have been introduced before, to the best of the authors' knowledge, labs that use a...

    Provided By Columbia University

  • White Papers // Jan 2013

    VBoom: Creating A Virtual Machine Real Estate Boom

    Cloud providers sell identically configured Virtual Machines (VMs) for the same price. Customers purchasing these VMs expect that they perform similarly and are allocated the same amount of virtual resources. In practice, however, the real performance of identically provisioned VMs depends on the underlying hardware, i.e., how the hardware is...

    Provided By Columbia University

  • White Papers // Dec 2012

    Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies

    The notion of aggregate signature has been motivated by applications and it enables any user to compress different signatures signed by different signers on different messages into a short signature. Sequential aggregate signature, in turn, is a special kind of aggregate signature that only allows a signer to add his...

    Provided By Columbia University

  • White Papers // Dec 2012

    Bait and Snitch: Defending Computer Systems with Decoys

    Threats against computer networks continue to multiply, but existing security solutions are persistently unable to keep pace with these challenges. In this paper the authors present a new paradigm for securing computational resources which they call decoy technology. This technique involves seeding a system with data that appears authentic but...

    Provided By Columbia University

  • White Papers // Nov 2012

    Cross-Layer Enabled Translucent Optical Network With Real-Time Impairment Awareness

    The existing dimensioning strategy for translucent, sub-wavelength switching architectures relies on over-provisioning, and consequently, overuse of costly, power-consuming Optical-Electrical-Optical (O/E/O) regenerators. In addition, due to a variety of external phenomena, many physical layer impairments are time-varying, and hence, can strongly degrade network performance. In this paper, the authors introduce a...

    Provided By Columbia University

  • White Papers // Nov 2012

    Privacy Preserving Revocable Predicate Encryption Revisited

    Predicate Encryption (PE) that provides both the access control of ciphertexts and the privacy of ciphertexts is a new paradigm of public-key encryption. An important application of predicate encryption is a searchable encryption system in a cloud storage, where it enables a client to securely outsource its data to an...

    Provided By Columbia University

  • White Papers // Nov 2012

    Accelerator Memory Reuse in the Dark Silicon Era

    Accelerators integrated on-die with General-Purpose CPUs (GP-CPUs) can yield significant performance and power improvements. Their extensive use, however, is ultimately limited by their area overhead; due to their high degree of specialization, the opportunity cost of investing die real estate on accelerators can become prohibitive, especially for general-purpose architectures. In...

    Provided By Columbia University

  • White Papers // Nov 2012

    Extensible Monitoring with Nagios and Messaging Middleware

    Monitoring is a core function of systems administration, and is primarily a problem of communication - a good monitoring tool communicates with users about problems, and communicates with hosts and software to take remedial action. The better it communicates, the greater the confidence administrators will have in its view of...

    Provided By Columbia University

  • White Papers // Oct 2012

    Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

    Aggregate signature is public-key signature that allows anyone to aggregate different signatures generated by different signers on different messages into a short (called aggregate) signature. The notion has many applications where compressing the signature space is important: in infrastructure: secure routing protocols, in security: compressed certificate chain signature, in signing...

    Provided By Columbia University

  • White Papers // Sep 2012

    CleanOS: Limiting Mobile Data Exposure with Idle Eviction

    Mobile-device theft and loss have reached gigantic proportions. Despite these threats, today's mobile devices are saturated with sensitive information due to operating systems that never securely erase data and applications that hoard it on the vulnerable device for performance or convenience. This paper presents CleanOS, a new Android-based operating system...

    Provided By Columbia University

  • White Papers // Aug 2012

    kGuard: Lightweight Kernel Protection Against Return-to-user Attacks

    Return-to-user (ret2usr) attacks exploit the operating system kernel, enabling local users to hijack privileged execution paths and execute arbitrary code with elevated privileges. Current defenses have proven to be inadequate, as they have been repeatedly circumvented, incur considerable overhead, or rely on extended hypervisors and special hardware features. The authors...

    Provided By Columbia University

  • White Papers // Aug 2012

    TimeWarp: Rethinking Timekeeping and Performance Monitoring Mechanisms to Mitigate Side-Channel Attacks

    Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on fixing the source of leaks either by limiting the flow of information through the side channel by modifying hardware, or by refactoring vulnerable software to...

    Provided By Columbia University

  • White Papers // Aug 2012

    Scalable Group Signatures with Revocation

    Group signatures are a central cryptographic primitive, simultaneously supporting accountability and anonymity. They allow users to anonymously sign messages on behalf of a group they are members of. The recent years saw the appearance of several constructions with security proofs in the standard model (i.e., without appealing to the random...

    Provided By Columbia University

  • White Papers // Jul 2012

    Facebook and Privacy: It's Complicated

    The authors measure users' attitudes toward interpersonal privacy concerns on Facebook and measure users' strategies for reconciling their concerns with their desire to share content online. To do this, they recruited 260 Facebook users to install a Facebook application that surveyed their privacy concerns, their friend network compositions, the sensitivity...

    Provided By Columbia University

  • White Papers // Jun 2012

    Privacy-Preserving Social Plugins

    The widespread adoption of social plugins, such as Facebook's Like and Google's +1 buttons, has raised concerns about their implications to user privacy, as they enable social networking services to track a growing part of their members' browsing activity. Existing mitigations in the form of browser extensions can prevent social...

    Provided By Columbia University

  • White Papers // Aug 2000

    Glass Concrete

    The use of crushed waste glass as aggregate in concrete is problematic because of the chemical reaction between the alkali in the cement and the silica in the glass. This alkali-silica reaction (ASR) creates a gel, which swells in the presence of moisture, causing cracks and unacceptable damage of the...

    Provided By Columbia University

  • White Papers // Mar 2002

    Modeling the Non-Linear Behavior of Wood Frame Shear

    Wood frame shear walls are an integral component of the lateral load resisting system of any low-rise structure constructed today. While seemingly ordinary, a wood frame shear wall is a complex physical structure that includes various types of structural members and connections. This paper presents the preliminary results of the...

    Provided By Columbia University

  • White Papers // Sep 2004

    A Structural Demand Analysis for Wireless Services Under Nonlinear Pricing Schemes

    Service industries are a rapidly growing sector in the US economy and account for over 60% of its total output. Wireless communications in particular have become ubiquitous and there are an estimated 160 million subscribers in the US alone. In this paper, the authors' focus on the wireless communications industry...

    Provided By Columbia University

  • White Papers // Jan 2009

    Collaborative Distributed Intrusion Detection

    The rapidly increasing array of Internet - scale threats is a pressing problem for every organization that utilizes the network. Organizations often have limited resources to detect, and respond to these threats. The sharing of information related to probes and attacks is a facet of an emerging trend toward collaborative...

    Provided By Columbia University

  • White Papers // Jun 2010

    Building A New Leadership Perspective In Four Weeks

    Though the idea of leaving work for four weeks may seem daunting, many executives are embracing the opportunity to undergo a transformative experience. The Columbia Senior Executive Program, a four-week comprehensive leadership program, provides participants with a greater sense of self-awareness combined with new skills in strategy, leadership and management...

    Provided By Columbia University

  • White Papers // Jun 2010

    General Management: Making The Transition To Cross-Functional Leadership

    David Dinsmore, editor of the Scottish Sun, hopes to transition to a general management role in the future and took advantage of The General Management Leadership Program last fall to prepare. As an editor, he traditionally plays an autocratic role within an organization. But during the program, Dinsmore says he...

    Provided By Columbia University

  • White Papers // Jun 2010

    Integrating China Into Your Global Business Strategy

    A new program, Global Business Strategy: China, will be offered by Columbia Business School Executive Education August 5-6, 2010. Presented in partnership with Cheung Kong Graduate School of Business (CKGSB), the new program is designed for international business leaders seeking to conduct business in or penetrate the Chinese market. The...

    Provided By Columbia University

  • White Papers // Jun 2010

    Neuroscience's Lessons For Leadership

    Understanding some basic lessons from neuroscience can make you a more effective leader - and help you avoid mental practices that carry serious risks for your health, according to executive coach and author of Your Brain at Work David Rock. The workshop focused on emotional regulation - feeling the right...

    Provided By Columbia University

  • White Papers // Apr 2010

    Motivating During Times Of Change

    Managers facing the task of doing more with fewer resources during this economic recovery can turn critical situations into opportunities to show their sophistication as leaders. "Change situations give managers an opportunity to show their mettle as leaders," says Joel Brockner, the Phillip Hettleman Professor of Business and chair of...

    Provided By Columbia University

  • White Papers // Oct 2009

    Mastering Strategy: What The Experts Say

    "Most participants come to a strategy program because they recognize that it is an essential part of leading effectively," says Willie Pietersen, Professor of The Practice of Management, Columbia Business School. "One might have other powerful processes in place, but a leader must also have a robust process for creating...

    Provided By Columbia University

  • White Papers // Oct 2009

    Aligning Technology With Business Strategy

    "Injecting technology into a company without process and organizational change creates waste and chaos," George Colony, founder and CEO of Forrester Research, has famously said. It's true. Despite good intentions, software teams typically end up using a technology-centric approach to application development, with technology and project management metrics driving most...

    Provided By Columbia University

  • White Papers // Jun 2010

    Investor Attitudes Towards Risk And Uncertainty And Reactions To Market Turmoil

    In order to assess how individual small investors have reacted to recent adverse events in world financial markets and whether these reactions are mediated by their risk attitudes, a survey was administered to N=120 members of a university community. The survey administered a standard risk tolerance instrument, augmented with questions...

    Provided By Columbia University

  • White Papers // Apr 2010

    Professor McGrath On Discovery-Driven Growth

    Rita G. McGrath, associate professor of management, recently spoke with BusinessWeek about the theories and concepts explored in her newest book, Discovery-Driven Growth: A Breakthrough Process to Reduce Risk and Seize Opportunity. BusinessWeek recently named the book, coauthored with Ian C. MacMillan, one of the best design and innovation books...

    Provided By Columbia University

  • White Papers // Feb 2010

    The Probability Of Default, Excessive Risk, And Executive Compensation

    The financial crisis of 2008 has many causes, with the role of executive compensation in creating excessive risk taking being frequently cited in the press and by policy makers as a leading candidate. The evidence for or against is scarce. This paper assembles panel data on 113 financial firms from...

    Provided By Columbia University

  • White Papers // May 2010

    Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems

    Desktop computers are often compromised by the interaction of unsecure data and buggy software. To address this problem, the authors present Apiary, a system that transparently contains application faults while retaining the usage metaphors of a traditional desktop environment. Apiary accomplishes this with three key mechanisms. It isolates applications in...

    Provided By Columbia University

  • White Papers // Jan 2010

    Web-Collaborative Filtering: Recommending Music by Spidering The Web

    Authors show that it is possible to collect data that is useful for collaborative filtering (CF) using an autonomous Web spider. In CF, entities are recommended to a new user based on the stated preferences of other, similar users. They describe a CF spider that collects from the Web lists...

    Provided By Columbia University

  • White Papers // Nov 2009

    Handbook For Promoting Foreign Direct Investment In Medium-Size, Low-Budget Cities In Emerging Markets

    The growth of foreign direct investment (FDI) and the positive impact such investment can have on economic growth and development lead locations around the world to seek to attract inward investment to secure new capital, new jobs, new technologies, and new skills, and to improve their infrastructure, export capacity and...

    Provided By Columbia University

  • White Papers // Feb 2010

    National Cyber Defense Financial Services Workshop Report

    Large portions of the country's economic, industrial, social, and governmental functions now depend on a cyber infrastructure assembled from readily available commercial information system components. Much of this infrastructure is organized to tolerate random failures and outages, including targeted attacks against specific institutions, but could fail under concerted attack against...

    Provided By Columbia University

  • White Papers // Jan 2010

    WebSOS: Protecting Web Servers From DDoS Attacks

    This paper presents the WebSOS architecture, a mechanism for countering Denial of Service (DoS) attacks against web servers. WebSOS uses a combination of overlay networking, content-based routing, and aggressive packet filtering to guarantee access to a service that is targeted by a DoS attack. The approach requires no modifications to...

    Provided By Columbia University

  • White Papers // May 2010

    Sequential Projection Learning for Hashing With Compact Codes

    Hashing based Approximate Nearest Neighbor (ANN) search has attracted much attention due to its fast query time and drastically reduced storage. However, most of the hashing methods either use random projections or extract principal directions from the data to derive hash functions. The resulting embedding suffers from poor discrimination when...

    Provided By Columbia University

  • White Papers // Feb 2010

    Swift Fox Whitepaper

    For over a decade, wireless sensor networks (WSNs) fostered the development of new applications and trends in the broad areas of mobile and opportunistic computing. Such networks are composed of multiple small, low-cost and low-power, multipurpose sensor nodes that communicate with each other over small distances using the wireless medium...

    Provided By Columbia University

  • White Papers // Jul 2009

    Research Directions for Network Intrusion Recovery

    One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. This paper highlight lessons learned from three real, significant, and recent...

    Provided By Columbia University

  • White Papers // Dec 2009

    Good Cause And Effect

    Creative models for buying and selling goods allow consumers to act philanthropically through charity tie-ins with product purchases. But are they profitable? This paper shows that linking a product with a charity donation is an effective way to boost sales - but not quite enough to make up for the...

    Provided By Columbia University

  • White Papers // Dec 2009

    Financial Models: Why All The Fuss?

    This article covers the discussion in the research symposium "The Quantitative Revolution and the Crisis: How Have Quantitative Financial Models Been Used and Misused" at Columbia Business School on December 4 explored the causes and effects of the proliferation of quantitative finance. Donald MacKenzie, a professor of sociology at the...

    Provided By Columbia University

  • White Papers // Nov 2009

    Opportunities In Alternative Energy

    In an event held at Columbia Business School, Warren Buffett and Bill Gates spoke on opportunities in alternative energy. Gates identified energy - including renewable sources, like solar - healthcare and IT as the three sectors he sees as having the most opportunity for transformative growth in the foreseeable future....

    Provided By Columbia University

  • White Papers // Apr 2010

    Lab Work For Your Business Model

    Management professor Rita McGrath says experimentation must be an integral part of a company's strategy in order to remain competitive in the future. "The level of uncertainty and speed of change are touching sectors that used to be buffered from that," McGrath says. "When you don't know what's going to...

    Provided By Columbia University

  • White Papers // Apr 2010

    More Women Needed In Venture Capital

    What are entrepreneurs doing, and what role can VCs play, to bring more women into the world of start-ups and venture capital? Is there a tipping point or critical mass? In companies where there are two senior female executives or board members, is there a higher percentage of females company-wide?...

    Provided By Columbia University

  • White Papers // Sep 2009

    Interaction With the Environment: Sensor Data Visualization in Outdoor Augmented Reality

    Proliferating sensor systems provide a rich source of data for understanding the dynamic characteristics of the environment. Visualization of, and interaction with, such data in outdoor augmented reality poses several challenges for infrastructure, representation, interactive data collection, and information discovery and filtering. The author discusses these challenges in the context...

    Provided By Columbia University

  • White Papers // Apr 2010

    Financial Literacy And Subprime Mortgage Delinquency: Evidence From A Survey Matched To Administrative DataMatched to Administrative Data

    The exact cause of the massive defaults and foreclosures in the U.S. subprime mortgage market is still unclear. This paper investigates whether a particular aspect of borrowers' financial literacy - their numerical ability - may have played a role. The authors measure several aspects of financial literacy and cognitive ability...

    Provided By Columbia University

  • White Papers // Mar 2010

    The Art Of Choosing

    This story covers professor Sheena Iyengar's views on strategies for managing choices in an era of seemingly boundless options. Sheena Iyengar is the S. T. Lee Professor of Business in the Management Division and research director and senior scholar at the Jerome A. Chazen Institute of International Business at Columbia...

    Provided By Columbia University

  • White Papers // Aug 2009

    Engaging Consumers, Creating Value

    Findings on value creation and regulatory fit offer far-ranging implications for management, marketing and even mental health. Value - how much importance or worth people place on any given thing - is a big idea packed into a small word. But to get at where value comes from, says Professor...

    Provided By Columbia University

  • White Papers // Jul 2009

    Does AMD Spur Intel To Innovate More?

    The authors of this paper estimate a model of dynamic oligopoly with durable goods and endogenous innovation to examine the effect of competition on innovation in the PC microprocessor industry. Firms make dynamic pricing and investment decisions while accounting for the dynamic behavior of consumers who anticipate product improvements and...

    Provided By Columbia University

  • White Papers // Nov 2009

    New Healthcare Paradigm: Technology, Value And Emergence

    As the vitriolic debate on healthcare reform dominates the news, healthcare industry leaders continue to focus on several issues: innovation to drive growth and promote cost efficiencies; new offerings to generate higher value for each healthcare dollar invested; and the emergence of attractive new global markets and technologies. They recognize...

    Provided By Columbia University

  • White Papers // May 2010

    The Risks Of High-Frequency Trading

    Between 2:30 and 3 p.m. on May 6, 2010, the Dow dropped 7 percent before partially restoring itself by the closing bell. In the days following that sudden market shock, regulators have investigated possible causes, looking at a single trade in the Standard & Poor's e-mini futures contract and other...

    Provided By Columbia University

  • White Papers // Jul 2009

    INM Program Alum Hosts President Obama For Bill Signing

    April 21, 2009, was a day to remember for Charles Adams, alumnus of the Institute for Not-for-Profit Management Program and Head of School at The SEED Public Charter School of Washington, D.C. "Not only did the newly elected president visit our school," he said, "but he did so to sign...

    Provided By Columbia University

  • White Papers // Mar 2010

    The Cost Of Latency

    Modern electronic markets have been characterized by a relentless drive towards faster decision making. Significant technological investments have lead to dramatic improvements in latency, or, the delay between a trading decision and the resulting trade execution. The authors of this paper describe a model that allows for the quantitative valuation...

    Provided By Columbia University

  • White Papers // Jul 2009

    Should You Go With Your Gut?

    Decisions based on emotions are more consistent - and might be more satisfying - than those based on deliberation. Faced with the same set of choices on different occasions, most consumers choose the same thing again and again. Marketers rely on consumers' preference consistency to conduct some of their most...

    Provided By Columbia University

  • White Papers // May 2008

    Information And Incentives Inside The Firm: Evidence From Loan Officer Rotation

    This paper presents evidence that reassigning tasks among agents can alleviate moral hazard in communication. Based on a commercial bank's internal reporting data it's shown that agents do not report bad news if it reflects poorly on their own ability. A rotation policy that routinely reassigns loan officers to borrowers...

    Provided By Columbia University

  • White Papers // Jul 2004

    Activating Sound And Meaning In Brand Name Evaluations: The Role Of Language Proficiency In Bilinguals

    How do bilingual consumers process bilingual information? Prior research indicates that stimulus-related concepts (type of name translation and language emphasis) play a critical role. The authors of this paper extend this research by including language proficiency as a key person-related concept. When asking Chinese-English bilinguals to evaluate dual brand names,...

    Provided By Columbia University

  • White Papers // Apr 2010

    A White Hat For Private Equity?

    A growing body of evidence suggests that when private equity enters an industry, growth and productivity follow. Does private equity wear a black hat or white hat? The black-hat view holds that private equity firms buy out other companies primarily to engage in financial engineering and pare down operational efficiency...

    Provided By Columbia University