University of Aarhus

Displaying 1-17 of 17 results

  • White Papers // Sep 2013

    Personal Privacy and the Web of Linked Data

    In this paper the authors report the results of a study investigating the user privacy challenges when personal data is published within linked data environments. Motivated by GetThere, a passenger information system that crowd-sources transport information from users (including personal data, such as their location), four scenarios are outlined that...

    Provided By University of Aarhus

  • White Papers // Mar 2013

    Assessing Trust over Uncertain Rules and Streaming Data

    Decision makers are increasingly faced with the challenge of examining large volumes of information originating from heterogeneous sources requiring them to ascertain trust in various pieces of information. While several authors have explored various trust computation models on static data and certain rules, past work has typically assumed: a statistically...

    Provided By University of Aarhus

  • White Papers // Aug 2012

    Exploring Information Stewardship with the Cloud Ecosystem Model

    The emergence of cloud computing has transformed the way in which enterprise IT is delivered and creates new challenges around risk management, security strategy, and control over policies and information. For a particular example, the economies of scale that can be achieved by large cloud service providers are encouraging ecosystems...

    Provided By University of Aarhus

  • White Papers // May 2012

    Towards Presenting Relevant Facts and Answers on Inconsistent and Uncertain Knowledge

    Gathering relevant information from multiple sources is a critical requirement for effective decision making during coalition operations. Such information is intended to improve the knowledge and situation awareness of military commanders to accomplish the tactical tasks at hand. The networked information systems available to modern militaries, as well as the...

    Provided By University of Aarhus

  • White Papers // Aug 2011

    Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery

    The authors discuss the concept of information stewardship in cloud-based business ecosystems. The constituent concepts of stewardship - which they believe will be crucial to the successful development of cloud-based business of all kinds - extend those of security to encompass concepts such as values, ethics, resilience, and sustainability: all...

    Provided By University of Aarhus

  • White Papers // Aug 2011

    Semantically Enriched Data for Effective Sensor Data Fusion

    Data fusion plays a major role in assisting decision makers by providing them with an improved situational awareness so that informed decisions could be made about the events that occur in the field. This involves combining a multitude of sensor modalities such that the resulting output is better than what...

    Provided By University of Aarhus

  • White Papers // Jan 2011

    The Design Space of Type Checkers for XML Transformation Languages

    The authors survey work on statically type checking XML transformations, covering a wide range of notations and ambitions. The concept of type may vary from idealizations of DTD to full-blown XML Schema or even more expressive formalisms. The notion of transformation may vary from clean and simple transductions to domain-specific...

    Provided By University of Aarhus

  • White Papers // Oct 2010

    Does Labor Diversity Affect Firm Productivity?

    Using an employer-employee dataset, the authors analyze how diversity in cultural background, skills and demographic characteristics affects Total Factor Productivity (TFP) of firms in Denmark. Implementing structural estimation of firms' production function, they find evidence that labor diversity in skills/education significantly enhances firm performance as measured by firm TFP. Conversely,...

    Provided By University of Aarhus

  • White Papers // Jun 2010

    Milestones Of European Integration: Which Matters Most For Export Openness?

    The European integration process has removed barriers to trade within Europe. The authors analyze which integration step has most profoundly influenced the trending behavior of export openness. They endogenously determine the single most decisive break in the trend, account for strong cross-country heterogeneity and propose a new measure for the...

    Provided By University of Aarhus

  • White Papers // Mar 2010

    Perfectly Secure Oblivious RAM Without Random Oracles

    In many cases it is attractive to store data at an untrusted party, and only retrieve the needed parts of it. Encryption can help ensure that the party storing the data has no idea of what he is storing, but still it is possible to get information about the stored...

    Provided By University of Aarhus

  • White Papers // Jan 2010

    Type Checking With XML Schema in XACT

    XACT is an extension of Java for making type-safe XML transformations. Unlike other approaches, XACT provides a programming model based on XML templates and XPath together with a type checker based on data-flow analysis. The authors show how to extend the data-flow analysis technique used in the XACT system to...

    Provided By University of Aarhus

  • White Papers // Dec 2009

    From Passive to Covert Security at Low Cost

    Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in many real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. In this paper,...

    Provided By University of Aarhus

  • White Papers // Nov 2009

    Talent Management And The Law Of Jante: An Improbable Coexistence?

    Few organizations today do not realize that employees are their most important resource and they are aware of the importance of recruiting, selecting, developing, retaining, and motivating those employees who possess superior capabilities that will help the company compete successfully. Talent Management (TM), which emphasizes the need to invest heavily...

    Provided By University of Aarhus

  • White Papers // Jun 2009

    Long Memory In Stock Market Volatility And The Volatility-In-Mean Effect: The FIEGARCH-M Model

    The authors extend the fractionally integrated exponential GARCH (FIEGARCH) model for daily stock return data with long memory in return volatility of Bollerslev and Mikkelsen (1996) by introducing a possible volatility-in-mean effect. To avoid that the long memory property of volatility carries over to returns, they consider a filtered FIEGARCH-in-Mean...

    Provided By University of Aarhus

  • White Papers // Apr 2009

    On the Theory and Practice of Personal Digital Signatures

    The authors take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. The authors then propose a protocol...

    Provided By University of Aarhus

  • White Papers // Mar 2009

    Integrated Foreign Exchange Risk Management: The Role Of Import In Medium-Sized, Manufacturing Firms

    Empirical research has focused on export as a proxy for the exchange rate exposure and the use of foreign exchange derivatives as the instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role of import in...

    Provided By University of Aarhus

  • White Papers // Mar 2009

    Business Cycle Dependent Unemployment Insurance

    The consequences of cyclical contingencies in unemployment insurance systems are considered in a search-matching model allowing for shifts between "Good" and "Bad" states of nature. An argument for state contingencies is that insurance arguments are stronger and incentive effects weaker in "bad" than in "Good" states of nature. The authors...

    Provided By University of Aarhus

  • White Papers // Aug 2012

    Exploring Information Stewardship with the Cloud Ecosystem Model

    The emergence of cloud computing has transformed the way in which enterprise IT is delivered and creates new challenges around risk management, security strategy, and control over policies and information. For a particular example, the economies of scale that can be achieved by large cloud service providers are encouraging ecosystems...

    Provided By University of Aarhus

  • White Papers // Nov 2009

    Talent Management And The Law Of Jante: An Improbable Coexistence?

    Few organizations today do not realize that employees are their most important resource and they are aware of the importance of recruiting, selecting, developing, retaining, and motivating those employees who possess superior capabilities that will help the company compete successfully. Talent Management (TM), which emphasizes the need to invest heavily...

    Provided By University of Aarhus

  • White Papers // Jan 2011

    The Design Space of Type Checkers for XML Transformation Languages

    The authors survey work on statically type checking XML transformations, covering a wide range of notations and ambitions. The concept of type may vary from idealizations of DTD to full-blown XML Schema or even more expressive formalisms. The notion of transformation may vary from clean and simple transductions to domain-specific...

    Provided By University of Aarhus

  • White Papers // Mar 2009

    Integrated Foreign Exchange Risk Management: The Role Of Import In Medium-Sized, Manufacturing Firms

    Empirical research has focused on export as a proxy for the exchange rate exposure and the use of foreign exchange derivatives as the instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role of import in...

    Provided By University of Aarhus

  • White Papers // Jan 2010

    Type Checking With XML Schema in XACT

    XACT is an extension of Java for making type-safe XML transformations. Unlike other approaches, XACT provides a programming model based on XML templates and XPath together with a type checker based on data-flow analysis. The authors show how to extend the data-flow analysis technique used in the XACT system to...

    Provided By University of Aarhus

  • White Papers // Oct 2010

    Does Labor Diversity Affect Firm Productivity?

    Using an employer-employee dataset, the authors analyze how diversity in cultural background, skills and demographic characteristics affects Total Factor Productivity (TFP) of firms in Denmark. Implementing structural estimation of firms' production function, they find evidence that labor diversity in skills/education significantly enhances firm performance as measured by firm TFP. Conversely,...

    Provided By University of Aarhus

  • White Papers // Mar 2009

    Business Cycle Dependent Unemployment Insurance

    The consequences of cyclical contingencies in unemployment insurance systems are considered in a search-matching model allowing for shifts between "Good" and "Bad" states of nature. An argument for state contingencies is that insurance arguments are stronger and incentive effects weaker in "bad" than in "Good" states of nature. The authors...

    Provided By University of Aarhus

  • White Papers // Dec 2009

    From Passive to Covert Security at Low Cost

    Aumann and Lindell defined security against covert attacks, where the adversary is malicious, but is only caught cheating with a certain probability, where the idea is that in many real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. In this paper,...

    Provided By University of Aarhus

  • White Papers // Apr 2009

    On the Theory and Practice of Personal Digital Signatures

    The authors take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. The authors then propose a protocol...

    Provided By University of Aarhus

  • White Papers // Mar 2010

    Perfectly Secure Oblivious RAM Without Random Oracles

    In many cases it is attractive to store data at an untrusted party, and only retrieve the needed parts of it. Encryption can help ensure that the party storing the data has no idea of what he is storing, but still it is possible to get information about the stored...

    Provided By University of Aarhus

  • White Papers // Jun 2010

    Milestones Of European Integration: Which Matters Most For Export Openness?

    The European integration process has removed barriers to trade within Europe. The authors analyze which integration step has most profoundly influenced the trending behavior of export openness. They endogenously determine the single most decisive break in the trend, account for strong cross-country heterogeneity and propose a new measure for the...

    Provided By University of Aarhus

  • White Papers // Jun 2009

    Long Memory In Stock Market Volatility And The Volatility-In-Mean Effect: The FIEGARCH-M Model

    The authors extend the fractionally integrated exponential GARCH (FIEGARCH) model for daily stock return data with long memory in return volatility of Bollerslev and Mikkelsen (1996) by introducing a possible volatility-in-mean effect. To avoid that the long memory property of volatility carries over to returns, they consider a filtered FIEGARCH-in-Mean...

    Provided By University of Aarhus

  • White Papers // Aug 2011

    Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery

    The authors discuss the concept of information stewardship in cloud-based business ecosystems. The constituent concepts of stewardship - which they believe will be crucial to the successful development of cloud-based business of all kinds - extend those of security to encompass concepts such as values, ethics, resilience, and sustainability: all...

    Provided By University of Aarhus

  • White Papers // Sep 2013

    Personal Privacy and the Web of Linked Data

    In this paper the authors report the results of a study investigating the user privacy challenges when personal data is published within linked data environments. Motivated by GetThere, a passenger information system that crowd-sources transport information from users (including personal data, such as their location), four scenarios are outlined that...

    Provided By University of Aarhus

  • White Papers // Mar 2013

    Assessing Trust over Uncertain Rules and Streaming Data

    Decision makers are increasingly faced with the challenge of examining large volumes of information originating from heterogeneous sources requiring them to ascertain trust in various pieces of information. While several authors have explored various trust computation models on static data and certain rules, past work has typically assumed: a statistically...

    Provided By University of Aarhus

  • White Papers // May 2012

    Towards Presenting Relevant Facts and Answers on Inconsistent and Uncertain Knowledge

    Gathering relevant information from multiple sources is a critical requirement for effective decision making during coalition operations. Such information is intended to improve the knowledge and situation awareness of military commanders to accomplish the tactical tasks at hand. The networked information systems available to modern militaries, as well as the...

    Provided By University of Aarhus

  • White Papers // Aug 2011

    Semantically Enriched Data for Effective Sensor Data Fusion

    Data fusion plays a major role in assisting decision makers by providing them with an improved situational awareness so that informed decisions could be made about the events that occur in the field. This involves combining a multitude of sensor modalities such that the resulting output is better than what...

    Provided By University of Aarhus