University of Arkansas

Displaying 1-18 of 18 results

  • White Papers // Aug 2013

    Secure and Constant Cost Public Cloud Storage Auditing with Deduplication

    Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of OWnership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. However, trivial combination of...

    Provided By University of Arkansas

  • White Papers // Mar 2011

    Authorized Private Keyword Search Over Encrypted Data in Cloud Computing

    In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information, the cloud servers cannot be fully trusted in protecting them. Encryption is a promising way to protect the confidentiality of the outsourced data, but...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks

    Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    Price Increasing Competition? Experimental Evidence

    Economic intuition suggests that increased competition generates lower prices. However, recent theoretical work shows that a monopolist may charge a lower price than a firm facing a competitor selling a differentiated product. The direction of the price change when competition is introduced is dependent upon the joint distribution of buyer...

    Provided By University of Arkansas

  • White Papers // Dec 2010

    Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is...

    Provided By University of Arkansas

  • White Papers // Nov 2010

    Authorized Private Keyword Search Over Encrypted Personal Health Records in Cloud Computing

    Recently, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Although this greatly facilitates the management and sharing of patients' Personal Health Information (PHI), there have been serious privacy...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    Secure system state estimation is an important issue in smart grid to assure the reliability and security. In this paper, the case of a single observation station and Gaussian noise communication channel with an eavesdropper is considered. The channel capacity requirement is studied from the information theoretic perspective. The smart...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Creating Forest Plots From Pre-Computed Data Using PROC SGPLOT and Graph Template Language

    Historically, forest plots graphically display the information from the individual studies that went into the meta-analysis, and more recently the results of observational studies (e.g. epidemiology). They show the estimates (e.g. odds ratios, hazard ratios, and log transformed hazard ratios) and the amount of variation (e.g. 95% confidence intervals) and...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    Improving Your Statistical Consulting Prowess by Adding R to Your SAS Repertoire

    SAS is a powerful package with tremendous capabilities. However, no package contains every model, calculation, or graphics option. With SAS 9.2, it is easier to tap into the R programming environment with the SAS/IML Workshop 3.2 application. Many cutting-edge models and statistical graphics are being developed in R. The paper...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    GLIMMIX Adds a New Level to the Analysis of Multilevel Community Data

    Community intervention study is often at the cluster level such as school, church or baseball clubs and may even have clusters within a cluster. For example, in the strike out study, individual seat belt usage was measured and clustered within car, car within communities. Individuals are randomized to either control...

    Provided By University of Arkansas

  • White Papers // Nov 2009

    Performance Evaluation of Consumed-Energy-Type-Aware Routing (CETAR) for Wireless Sensor Networks

    This paper evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The authors use global trade data to construct a novel measure of network position, random walk betweenness centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random-Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The people use global trade data to construct a novel measure of network position, Random Walk Between's Centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Sep 2009

    Connecting Sparsely Distributed Similar Bloggers

    The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnected from each other. Aggregating them allows for cost-effective personalized services, targeted marketing, and exploration of new business opportunities. As most bloggers have...

    Provided By University of Arkansas

  • White Papers // Feb 2009

    Assessing The Impacts Of Soil Carbon Credits And Risk On No-till Rice Profitability

    Rice is a major cash crop in eastern Arkansas, but most rice acres are intensively cultivated and grown on rented land. No-till is an effective means of sequestering soil carbon and reducing greenhouse gas emissions, and economic incentives exist for no-till in the form of carbon credits. Studies evaluating the...

    Provided By University of Arkansas

  • White Papers // Dec 2008

    Price Discovery In Opaque Markets

    This paper examines the share price revaluations of banks from bank-specific events. Results show that in the period 2000 through 2006, merger announcements convey information to the market about the value of non-merging banks. There is an upward revision in the total market value of banks and the magnitudes of...

    Provided By University of Arkansas

  • White Papers // Nov 2008

    Alternative Methods Of Convergence Toward U.S. Market And Legal Regulations: Crosslisting Vs. Merging With U.S. Bidders

    Non-U.S. firms have two options to converge toward U.S. capital market and legal regulations-to cross-list in the U.S. or to agree to be acquired by a U.S. bidder. The authors show that companies that have lower growth opportunities, are more capital intensive, and seek bonding benefits through compliance with U.S....

    Provided By University of Arkansas

  • White Papers // Jun 2005

    Pricing Strategy For Wine In Today's Marketplace

    The pricing strategy used for marketing wines should be a function of the demand for wine. Consumers are not directly concerned with the cost structure inherent in producing a commodity they are interested in purchasing. However, the manager of the winery is concerned with the underlying profits and must therefore...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    Improving Your Statistical Consulting Prowess by Adding R to Your SAS Repertoire

    SAS is a powerful package with tremendous capabilities. However, no package contains every model, calculation, or graphics option. With SAS 9.2, it is easier to tap into the R programming environment with the SAS/IML Workshop 3.2 application. Many cutting-edge models and statistical graphics are being developed in R. The paper...

    Provided By University of Arkansas

  • White Papers // Jun 2005

    Pricing Strategy For Wine In Today's Marketplace

    The pricing strategy used for marketing wines should be a function of the demand for wine. Consumers are not directly concerned with the cost structure inherent in producing a commodity they are interested in purchasing. However, the manager of the winery is concerned with the underlying profits and must therefore...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The authors use global trade data to construct a novel measure of network position, random walk betweenness centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    Price Increasing Competition? Experimental Evidence

    Economic intuition suggests that increased competition generates lower prices. However, recent theoretical work shows that a monopolist may charge a lower price than a firm facing a competitor selling a differentiated product. The direction of the price change when competition is introduced is dependent upon the joint distribution of buyer...

    Provided By University of Arkansas

  • White Papers // Mar 2011

    Authorized Private Keyword Search Over Encrypted Data in Cloud Computing

    In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information, the cloud servers cannot be fully trusted in protecting them. Encryption is a promising way to protect the confidentiality of the outsourced data, but...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks

    Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many...

    Provided By University of Arkansas

  • White Papers // Nov 2009

    Performance Evaluation of Consumed-Energy-Type-Aware Routing (CETAR) for Wireless Sensor Networks

    This paper evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including...

    Provided By University of Arkansas

  • White Papers // Sep 2009

    Connecting Sparsely Distributed Similar Bloggers

    The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnected from each other. Aggregating them allows for cost-effective personalized services, targeted marketing, and exploration of new business opportunities. As most bloggers have...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random-Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The people use global trade data to construct a novel measure of network position, Random Walk Between's Centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Feb 2009

    Assessing The Impacts Of Soil Carbon Credits And Risk On No-till Rice Profitability

    Rice is a major cash crop in eastern Arkansas, but most rice acres are intensively cultivated and grown on rented land. No-till is an effective means of sequestering soil carbon and reducing greenhouse gas emissions, and economic incentives exist for no-till in the form of carbon credits. Studies evaluating the...

    Provided By University of Arkansas

  • White Papers // Dec 2010

    Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is...

    Provided By University of Arkansas

  • White Papers // Nov 2008

    Alternative Methods Of Convergence Toward U.S. Market And Legal Regulations: Crosslisting Vs. Merging With U.S. Bidders

    Non-U.S. firms have two options to converge toward U.S. capital market and legal regulations-to cross-list in the U.S. or to agree to be acquired by a U.S. bidder. The authors show that companies that have lower growth opportunities, are more capital intensive, and seek bonding benefits through compliance with U.S....

    Provided By University of Arkansas

  • White Papers // Dec 2008

    Price Discovery In Opaque Markets

    This paper examines the share price revaluations of banks from bank-specific events. Results show that in the period 2000 through 2006, merger announcements convey information to the market about the value of non-merging banks. There is an upward revision in the total market value of banks and the magnitudes of...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    Secure system state estimation is an important issue in smart grid to assure the reliability and security. In this paper, the case of a single observation station and Gaussian noise communication channel with an eavesdropper is considered. The channel capacity requirement is studied from the information theoretic perspective. The smart...

    Provided By University of Arkansas

  • White Papers // Nov 2010

    Authorized Private Keyword Search Over Encrypted Personal Health Records in Cloud Computing

    Recently, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Although this greatly facilitates the management and sharing of patients' Personal Health Information (PHI), there have been serious privacy...

    Provided By University of Arkansas

  • White Papers // Aug 2013

    Secure and Constant Cost Public Cloud Storage Auditing with Deduplication

    Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of OWnership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. However, trivial combination of...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    GLIMMIX Adds a New Level to the Analysis of Multilevel Community Data

    Community intervention study is often at the cluster level such as school, church or baseball clubs and may even have clusters within a cluster. For example, in the strike out study, individual seat belt usage was measured and clustered within car, car within communities. Individuals are randomized to either control...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Creating Forest Plots From Pre-Computed Data Using PROC SGPLOT and Graph Template Language

    Historically, forest plots graphically display the information from the individual studies that went into the meta-analysis, and more recently the results of observational studies (e.g. epidemiology). They show the estimates (e.g. odds ratios, hazard ratios, and log transformed hazard ratios) and the amount of variation (e.g. 95% confidence intervals) and...

    Provided By University of Arkansas