Kent State University

Displaying 1-8 of 8 results

  • White Papers // Nov 2013

    A Case Study in Knowledge Management Education - Historical Challenges and Future Opportunities

    In 2001 Kent State University established a graduate level program that granted a Master of Science degree in information architecture and knowledge management. The knowledge management concentration was a cornerstone of that degree program. The knowledge management concentration has sustained and thrived over the past ten years, though the path...

    Provided By Kent State University

  • White Papers // May 2013

    Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention

    In this paper, the authors study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper, they introduce the average neighborhood size as a new measure for the degree of being small-world and utilize...

    Provided By Kent State University

  • White Papers // Jan 2011

    Trend Motif: A Graph Mining Approach for Analysis of Dynamic Complex Networks

    Complex networks have been used successfully in scientific disciplines ranging from sociology to microbiology to describe systems of interacting units. Until recently, studies of complex networks have mainly focused on their network topology. However, in many real world applications, the edges and vertices have associated attributes that are frequently represented...

    Provided By Kent State University

  • White Papers // Jan 2011

    Brief Examination of Distributed Scheduling Support for Autonomous Systems

    Messiahs is a set of mechanisms supporting task placement in heterogeneous, distributed, autonomous systems. Messiahs provides a substrate on which scheduling algorithms can be implemented. The chief design goals for messiahs include support for autonomy, flexibility, scalability and efficiency. These mechanisms were designed to support diverse task placement and load...

    Provided By Kent State University

  • White Papers // Nov 2010

    Experiences Instrumenting a Distributed Molecular Dynamics Program

    As cluster computing becomes increasingly more accessible, the need for tools to simplify the development and use of parallel simulations grows proportionally. One class of tools, steering and visualization middle-ware, promises to assist in code development as well as increase the value of the final simulation produced. In this paper...

    Provided By Kent State University

  • White Papers // Feb 2010

    Correlation In Credit Risk

    The authors examine the correlation in credit risk using Credit Default Swap (CDS) data. The authors find that the observable risk factors at the firm, industry, and market levels and the macroeconomic variables cannot fully explain the correlation in CDS spread changes, leaving at least 30 percent of the correlation...

    Provided By Kent State University

  • White Papers // Jan 2010

    Secure Location Verification Using Radio Broadcast

    Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the...

    Provided By Kent State University

  • White Papers // Jan 2010

    A Survey of QoS Techniques in 802.11

    The most important functions of the MAC layer for a wireless network include controlling channel access, maintaining Quality of Service (QoS), and providing security. Wireless links have characteristics that differ from those of fixed links, such as high packet loss rate, bursts of packet loss, packet re-ordering, and large packet...

    Provided By Kent State University

  • White Papers // Jan 2010

    Secure Location Verification Using Radio Broadcast

    Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution to the problem, as well as solutions to related problems, exploits the...

    Provided By Kent State University

  • White Papers // Jan 2010

    A Survey of QoS Techniques in 802.11

    The most important functions of the MAC layer for a wireless network include controlling channel access, maintaining Quality of Service (QoS), and providing security. Wireless links have characteristics that differ from those of fixed links, such as high packet loss rate, bursts of packet loss, packet re-ordering, and large packet...

    Provided By Kent State University

  • White Papers // Jan 2011

    Trend Motif: A Graph Mining Approach for Analysis of Dynamic Complex Networks

    Complex networks have been used successfully in scientific disciplines ranging from sociology to microbiology to describe systems of interacting units. Until recently, studies of complex networks have mainly focused on their network topology. However, in many real world applications, the edges and vertices have associated attributes that are frequently represented...

    Provided By Kent State University

  • White Papers // Jan 2011

    Brief Examination of Distributed Scheduling Support for Autonomous Systems

    Messiahs is a set of mechanisms supporting task placement in heterogeneous, distributed, autonomous systems. Messiahs provides a substrate on which scheduling algorithms can be implemented. The chief design goals for messiahs include support for autonomy, flexibility, scalability and efficiency. These mechanisms were designed to support diverse task placement and load...

    Provided By Kent State University

  • White Papers // Feb 2010

    Correlation In Credit Risk

    The authors examine the correlation in credit risk using Credit Default Swap (CDS) data. The authors find that the observable risk factors at the firm, industry, and market levels and the macroeconomic variables cannot fully explain the correlation in CDS spread changes, leaving at least 30 percent of the correlation...

    Provided By Kent State University

  • White Papers // May 2013

    Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention

    In this paper, the authors study a basic and practically important strategy to help prevent and/or delay an outbreak in the context of network: limiting the contact between individuals. In this paper, they introduce the average neighborhood size as a new measure for the degree of being small-world and utilize...

    Provided By Kent State University

  • White Papers // Nov 2013

    A Case Study in Knowledge Management Education - Historical Challenges and Future Opportunities

    In 2001 Kent State University established a graduate level program that granted a Master of Science degree in information architecture and knowledge management. The knowledge management concentration was a cornerstone of that degree program. The knowledge management concentration has sustained and thrived over the past ten years, though the path...

    Provided By Kent State University

  • White Papers // Nov 2010

    Experiences Instrumenting a Distributed Molecular Dynamics Program

    As cluster computing becomes increasingly more accessible, the need for tools to simplify the development and use of parallel simulations grows proportionally. One class of tools, steering and visualization middle-ware, promises to assist in code development as well as increase the value of the final simulation produced. In this paper...

    Provided By Kent State University