Dakota State University

Displaying 1-3 of 3 results

  • White Papers // May 2011

    Students' Acceptance of Tablet PCs and Implications for Educational Institutions

    This paper develops and empirically tests a factor model for understanding college students' acceptance of Tablet PC (TPC) as a means to forecast, explain, and improve their usage pattern in education. The analysis involved more than 230 students from a regional Midwestern institution. Overall, their model exhibited a good fit...

    Provided By Dakota State University

  • White Papers // Apr 2011

    Detecting Unauthorized Usage in a Cloud Using Tenant Profiles

    The multi-tenant nature of Cloud Computing presents challenges for meeting the individual security needs of each tenant. Currently, cloud providers own and manage the cloud infrastructure and tenants must rely on the providers to ensure proper security controls are in place. This paper proposes a way for tenants to establish...

    Provided By Dakota State University

  • White Papers // Aug 2010

    TCP Performance in Flow-Based Mix Networks: Modeling and Analysis

    Anonymity technologies such as mix networks have gained increasing attention as a way to provide communication privacy. Mix networks were developed for message based applications such as email, but researchers have adapted mix techniques to low-latency, flow-based applications such as anonymous web browsing. Although a significant effort has been directed...

    Provided By Dakota State University

  • White Papers // Aug 2010

    TCP Performance in Flow-Based Mix Networks: Modeling and Analysis

    Anonymity technologies such as mix networks have gained increasing attention as a way to provide communication privacy. Mix networks were developed for message based applications such as email, but researchers have adapted mix techniques to low-latency, flow-based applications such as anonymous web browsing. Although a significant effort has been directed...

    Provided By Dakota State University

  • White Papers // Apr 2011

    Detecting Unauthorized Usage in a Cloud Using Tenant Profiles

    The multi-tenant nature of Cloud Computing presents challenges for meeting the individual security needs of each tenant. Currently, cloud providers own and manage the cloud infrastructure and tenants must rely on the providers to ensure proper security controls are in place. This paper proposes a way for tenants to establish...

    Provided By Dakota State University

  • White Papers // May 2011

    Students' Acceptance of Tablet PCs and Implications for Educational Institutions

    This paper develops and empirically tests a factor model for understanding college students' acceptance of Tablet PC (TPC) as a means to forecast, explain, and improve their usage pattern in education. The analysis involved more than 230 students from a regional Midwestern institution. Overall, their model exhibited a good fit...

    Provided By Dakota State University