DePaul University

Displaying 1-8 of 8 results

  • White Papers // Jan 2014

    Using Probabilistic Latent Semantic Analysis to Identify Web User Segments

    Web usage mining techniques are often used to identify user access patterns. However, to understand the factors that lead to common navigational patterns, it is necessary to develop techniques that can automatically characterize the underlying tasks and to map these tasks to user segments. Latent Semantic Analysis (LSA) has been...

    Provided By DePaul University

  • White Papers // Jan 2013

    A Clustering Approach to Unsupervised Attack Detection in Collaborative Recommender Systems

    Securing collaborative filtering systems from malicious attack has become an important issue with increasing popularity of recommender systems. Since recommender systems are entirely based on the input provided by the users or customers, they tend to become highly vulnerable to outside attacks. Prior research has shown that attacks can significantly...

    Provided By DePaul University

  • White Papers // Jun 2011

    Modeling Call Arrivals on VoIP Networks as Linear Gaussian Process Under Heavy Traffic Condition

    The authors propose a new model for call arrival process on VoIP tandem networks under heavy traffic condition. Based on empirical evidence, such call arrivals can be modeled as linear Gaussian processes. They show that this approach can provide a very intuitive and accurate representation for different traffic patterns. In...

    Provided By DePaul University

  • White Papers // Dec 2010

    Investment Propensity Of Controlling Shareholders And The Financial Constraints Of A Firm

    This paper examines the effect of ownership structure of a controlling shareholder on the financial constraints of non-financial firms in 22 countries between 1982 and 2009. Using firm-level panel data the authors analyze financial constraints with the Euler equation derived from a dynamic investment model. Through Generalized Method of Moments...

    Provided By DePaul University

  • White Papers // Jul 2010

    Credit Ratings And Capital Structure Revisited

    This paper empirically examines the relevance of external credit ratings in the capital structure decision-making process. Using the rating outlook to measure the imminence of a rating change, allows the authors to test managers' ex-ante capital structure behavior more concisely than prior studies have. The results show that companies near...

    Provided By DePaul University

  • White Papers // Nov 2009

    Empirical Studies and Queuing Modeling of Denial of Service Attacks Against 802.11 WLANs

    The growing popularity of 802.11-based Wireless LANs (WLAN) also increases the risk of security attacks. Most studies of WLAN security are on the protection of data integrity, and few studies are addressing the issue of Denial of Service (DoS) attacks. This paper studies two major DoS attacks of Authentication Request...

    Provided By DePaul University

  • White Papers // May 2009

    Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks

    This paper presents a description and performance evaluation of a Threshold Secret Sharing (TSS) authentication scheme for self-securing Mobile Ad hoc NETworks (MANETs) suffering from high packet-loss and node mobility. In order to evaluate the performance of the TSS scheme in a noisy MANET, a number of simulations were carried-out....

    Provided By DePaul University

  • White Papers // Sep 2008

    Towards Global Verification and Analysis of Network Access Control Configuration

    Network devices such as routers, firewalls, IPSec gateways, and NAT are configured using access control lists. However, recent studies and ISP surveys show that the management of access control configurations is a highly complex and error prone task. Without automated global configuration management tools, unreachablility and insecurity problems due to...

    Provided By DePaul University

  • White Papers // Jan 2013

    A Clustering Approach to Unsupervised Attack Detection in Collaborative Recommender Systems

    Securing collaborative filtering systems from malicious attack has become an important issue with increasing popularity of recommender systems. Since recommender systems are entirely based on the input provided by the users or customers, they tend to become highly vulnerable to outside attacks. Prior research has shown that attacks can significantly...

    Provided By DePaul University

  • White Papers // Nov 2009

    Empirical Studies and Queuing Modeling of Denial of Service Attacks Against 802.11 WLANs

    The growing popularity of 802.11-based Wireless LANs (WLAN) also increases the risk of security attacks. Most studies of WLAN security are on the protection of data integrity, and few studies are addressing the issue of Denial of Service (DoS) attacks. This paper studies two major DoS attacks of Authentication Request...

    Provided By DePaul University

  • White Papers // May 2009

    Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks

    This paper presents a description and performance evaluation of a Threshold Secret Sharing (TSS) authentication scheme for self-securing Mobile Ad hoc NETworks (MANETs) suffering from high packet-loss and node mobility. In order to evaluate the performance of the TSS scheme in a noisy MANET, a number of simulations were carried-out....

    Provided By DePaul University

  • White Papers // Jul 2010

    Credit Ratings And Capital Structure Revisited

    This paper empirically examines the relevance of external credit ratings in the capital structure decision-making process. Using the rating outlook to measure the imminence of a rating change, allows the authors to test managers' ex-ante capital structure behavior more concisely than prior studies have. The results show that companies near...

    Provided By DePaul University

  • White Papers // Dec 2010

    Investment Propensity Of Controlling Shareholders And The Financial Constraints Of A Firm

    This paper examines the effect of ownership structure of a controlling shareholder on the financial constraints of non-financial firms in 22 countries between 1982 and 2009. Using firm-level panel data the authors analyze financial constraints with the Euler equation derived from a dynamic investment model. Through Generalized Method of Moments...

    Provided By DePaul University

  • White Papers // Jun 2011

    Modeling Call Arrivals on VoIP Networks as Linear Gaussian Process Under Heavy Traffic Condition

    The authors propose a new model for call arrival process on VoIP tandem networks under heavy traffic condition. Based on empirical evidence, such call arrivals can be modeled as linear Gaussian processes. They show that this approach can provide a very intuitive and accurate representation for different traffic patterns. In...

    Provided By DePaul University

  • White Papers // Sep 2008

    Towards Global Verification and Analysis of Network Access Control Configuration

    Network devices such as routers, firewalls, IPSec gateways, and NAT are configured using access control lists. However, recent studies and ISP surveys show that the management of access control configurations is a highly complex and error prone task. Without automated global configuration management tools, unreachablility and insecurity problems due to...

    Provided By DePaul University

  • White Papers // Jan 2014

    Using Probabilistic Latent Semantic Analysis to Identify Web User Segments

    Web usage mining techniques are often used to identify user access patterns. However, to understand the factors that lead to common navigational patterns, it is necessary to develop techniques that can automatically characterize the underlying tasks and to map these tasks to user segments. Latent Semantic Analysis (LSA) has been...

    Provided By DePaul University