University of Arkansas

Displaying 1-28 of 28 results

  • White Papers // Aug 2013

    Secure and Constant Cost Public Cloud Storage Auditing with Deduplication

    Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of OWnership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. However, trivial combination of...

    Provided By University of Arkansas

  • White Papers // Mar 2011

    Authorized Private Keyword Search Over Encrypted Data in Cloud Computing

    In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information, the cloud servers cannot be fully trusted in protecting them. Encryption is a promising way to protect the confidentiality of the outsourced data, but...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks

    Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    Price Increasing Competition? Experimental Evidence

    Economic intuition suggests that increased competition generates lower prices. However, recent theoretical work shows that a monopolist may charge a lower price than a firm facing a competitor selling a differentiated product. The direction of the price change when competition is introduced is dependent upon the joint distribution of buyer...

    Provided By University of Arkansas

  • White Papers // Dec 2010

    Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is...

    Provided By University of Arkansas

  • White Papers // Nov 2010

    Authorized Private Keyword Search Over Encrypted Personal Health Records in Cloud Computing

    Recently, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Although this greatly facilitates the management and sharing of patients' Personal Health Information (PHI), there have been serious privacy...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    Secure system state estimation is an important issue in smart grid to assure the reliability and security. In this paper, the case of a single observation station and Gaussian noise communication channel with an eavesdropper is considered. The channel capacity requirement is studied from the information theoretic perspective. The smart...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Creating Forest Plots From Pre-Computed Data Using PROC SGPLOT and Graph Template Language

    Historically, forest plots graphically display the information from the individual studies that went into the meta-analysis, and more recently the results of observational studies (e.g. epidemiology). They show the estimates (e.g. odds ratios, hazard ratios, and log transformed hazard ratios) and the amount of variation (e.g. 95% confidence intervals) and...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    GLIMMIX Adds a New Level to the Analysis of Multilevel Community Data

    Community intervention study is often at the cluster level such as school, church or baseball clubs and may even have clusters within a cluster. For example, in the strike out study, individual seat belt usage was measured and clustered within car, car within communities. Individuals are randomized to either control...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    Improving Your Statistical Consulting Prowess by Adding R to Your SAS Repertoire

    SAS is a powerful package with tremendous capabilities. However, no package contains every model, calculation, or graphics option. With SAS 9.2, it is easier to tap into the R programming environment with the SAS/IML Workshop 3.2 application. Many cutting-edge models and statistical graphics are being developed in R. The paper...

    Provided By University of Arkansas

  • White Papers // Nov 2009

    Performance Evaluation of Consumed-Energy-Type-Aware Routing (CETAR) for Wireless Sensor Networks

    This paper evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The authors use global trade data to construct a novel measure of network position, random walk betweenness centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random-Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The people use global trade data to construct a novel measure of network position, Random Walk Between's Centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Sep 2009

    Connecting Sparsely Distributed Similar Bloggers

    The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnected from each other. Aggregating them allows for cost-effective personalized services, targeted marketing, and exploration of new business opportunities. As most bloggers have...

    Provided By University of Arkansas

  • White Papers // Feb 2009

    Assessing The Impacts Of Soil Carbon Credits And Risk On No-till Rice Profitability

    Rice is a major cash crop in eastern Arkansas, but most rice acres are intensively cultivated and grown on rented land. No-till is an effective means of sequestering soil carbon and reducing greenhouse gas emissions, and economic incentives exist for no-till in the form of carbon credits. Studies evaluating the...

    Provided By University of Arkansas

  • White Papers // Dec 2008

    Price Discovery In Opaque Markets

    This paper examines the share price revaluations of banks from bank-specific events. Results show that in the period 2000 through 2006, merger announcements convey information to the market about the value of non-merging banks. There is an upward revision in the total market value of banks and the magnitudes of...

    Provided By University of Arkansas

  • White Papers // Nov 2008

    Alternative Methods Of Convergence Toward U.S. Market And Legal Regulations: Crosslisting Vs. Merging With U.S. Bidders

    Non-U.S. firms have two options to converge toward U.S. capital market and legal regulations-to cross-list in the U.S. or to agree to be acquired by a U.S. bidder. The authors show that companies that have lower growth opportunities, are more capital intensive, and seek bonding benefits through compliance with U.S....

    Provided By University of Arkansas

  • White Papers // Jul 2008

    Routing Models for Rural Networks with Time-Varying Constraints

    The motivation for this work comes from the poultry industry, but can be broadened to other application areas. One problem of concern in the poultry industry is when an infected flock of birds has to be transported to another facility, but in doing so, the infected flock cannot come within...

    Provided By University of Arkansas

  • White Papers // May 2008

    GSR: A Geographic Single-Copy Routing Scheme in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks do not have a complete path from a source to a destination at most of the time. Efficient routing is important to high performance of the intermittently connected mobile networks. In this paper, the authors propose a Geographic Single-copy Routing scheme (GSR). This method relies on...

    Provided By University of Arkansas

  • White Papers // May 2008

    Token List Based Data Searching in a Multi-Dimensional Massive Database

    A massive database contains a large volume of data. Therefore, how to efficiently search data in a massive database has been a challenge. This paper proposes Token List based data Searching scheme (TLS) which abstracts tokens from the database, and clusters the data based on their tokens. Query only needs...

    Provided By University of Arkansas

  • White Papers // May 2008

    Categorization of Users Using Unlabeled Query Logs

    The rapidly growing World Wide Web provides tremendous amount of information for the Internet users. However, not all the information is equally important to a given user. Identifying the most preferred topics on the Internet has always been of a great interest to commercial information providers. In this paper, the...

    Provided By University of Arkansas

  • White Papers // May 2008

    Interest-Oriented File Replication in P2P File Sharing Networks

    In Peer-To-Peer (P2P) file sharing networks, file replication avoids overloading file owner and improves file query efficiency. Most current methods replicate a file along query path from a client to a server. These methods lead to large number of replicas and low replica utilization. Aiming to achieve high replica utilization...

    Provided By University of Arkansas

  • White Papers // May 2008

    SEMM: Scalable and Efficient Multi-Resource Management in Grids

    Grids connect resources to enable the worldwide collaboration. Conventional centralized or hierarchical approaches to grid resource management are inefficient in large-scale grids. Distributed Hash Table (DHT) middleware overlay has been applied to grids as a mechanism for providing scalable multi-resource management. Direct DHT overlay adoption breaks the physical locality relationship...

    Provided By University of Arkansas

  • White Papers // May 2008

    SAGE: Sagacious File Replication Mechanism for Structured P2P Systems

    Most traditional file replication methods fail to take into account non-uniform and time-varying file popularity, update rate, and node available capacity, which are vital factors for high efficiency of file replication mechanisms. This paper presents a sagacious file replication mechanism, namely SAGE, which considers these factors to achieve high efficiency...

    Provided By University of Arkansas

  • White Papers // May 2008

    A Security/Efficiency-Optimized Infrastructure for Wide-Area Distributed Systems

    Due to lack of a central management, wide-area distributed systems are severely threatened by a variety of malicious users in today's Internet. Current reputation-based and anonymity technologies for node communication enhance system security. However, most of these methods gain security at the cost of efficiency degradation. On the other hand,...

    Provided By University of Arkansas

  • White Papers // May 2008

    Ownership Transfer of RFID Tags Based on Electronic Fingerprint

    Pervasive computing devices such as Radio-Frequency IDentification (RFID) tags and wearable computing devices will require ownership transfer. Ownership transfer is a method to transfer a device to a new owner which prevents the previous owner from querying or interacting with the device. It should provide forward security in which no...

    Provided By University of Arkansas

  • White Papers // Apr 2008

    New Business Guide

    There are many different issues to consider when starting a small business. It is important to plan properly and avoid common pitfalls. As you determine whether or not to start a business, consider these suggested do's and don'ts of starting a small business: Do consider risk versus reward. Business ownership...

    Provided By University of Arkansas

  • White Papers // Jun 2005

    Pricing Strategy For Wine In Today's Marketplace

    The pricing strategy used for marketing wines should be a function of the demand for wine. Consumers are not directly concerned with the cost structure inherent in producing a commodity they are interested in purchasing. However, the manager of the winery is concerned with the underlying profits and must therefore...

    Provided By University of Arkansas

  • White Papers // Apr 2008

    New Business Guide

    There are many different issues to consider when starting a small business. It is important to plan properly and avoid common pitfalls. As you determine whether or not to start a business, consider these suggested do's and don'ts of starting a small business: Do consider risk versus reward. Business ownership...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The authors use global trade data to construct a novel measure of network position, random walk betweenness centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    Price Increasing Competition? Experimental Evidence

    Economic intuition suggests that increased competition generates lower prices. However, recent theoretical work shows that a monopolist may charge a lower price than a firm facing a competitor selling a differentiated product. The direction of the price change when competition is introduced is dependent upon the joint distribution of buyer...

    Provided By University of Arkansas

  • White Papers // Mar 2011

    Authorized Private Keyword Search Over Encrypted Data in Cloud Computing

    In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information, the cloud servers cannot be fully trusted in protecting them. Encryption is a promising way to protect the confidentiality of the outsourced data, but...

    Provided By University of Arkansas

  • White Papers // Jan 2011

    FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks

    Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many...

    Provided By University of Arkansas

  • White Papers // Nov 2009

    Performance Evaluation of Consumed-Energy-Type-Aware Routing (CETAR) for Wireless Sensor Networks

    This paper evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including...

    Provided By University of Arkansas

  • White Papers // Sep 2009

    Connecting Sparsely Distributed Similar Bloggers

    The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnected from each other. Aggregating them allows for cost-effective personalized services, targeted marketing, and exploration of new business opportunities. As most bloggers have...

    Provided By University of Arkansas

  • White Papers // May 2008

    Token List Based Data Searching in a Multi-Dimensional Massive Database

    A massive database contains a large volume of data. Therefore, how to efficiently search data in a massive database has been a challenge. This paper proposes Token List based data Searching scheme (TLS) which abstracts tokens from the database, and clusters the data based on their tokens. Query only needs...

    Provided By University of Arkansas

  • White Papers // May 2008

    Categorization of Users Using Unlabeled Query Logs

    The rapidly growing World Wide Web provides tremendous amount of information for the Internet users. However, not all the information is equally important to a given user. Identifying the most preferred topics on the Internet has always been of a great interest to commercial information providers. In this paper, the...

    Provided By University of Arkansas

  • White Papers // May 2008

    GSR: A Geographic Single-Copy Routing Scheme in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks do not have a complete path from a source to a destination at most of the time. Efficient routing is important to high performance of the intermittently connected mobile networks. In this paper, the authors propose a Geographic Single-copy Routing scheme (GSR). This method relies on...

    Provided By University of Arkansas

  • White Papers // May 2008

    Interest-Oriented File Replication in P2P File Sharing Networks

    In Peer-To-Peer (P2P) file sharing networks, file replication avoids overloading file owner and improves file query efficiency. Most current methods replicate a file along query path from a client to a server. These methods lead to large number of replicas and low replica utilization. Aiming to achieve high replica utilization...

    Provided By University of Arkansas

  • White Papers // May 2008

    SEMM: Scalable and Efficient Multi-Resource Management in Grids

    Grids connect resources to enable the worldwide collaboration. Conventional centralized or hierarchical approaches to grid resource management are inefficient in large-scale grids. Distributed Hash Table (DHT) middleware overlay has been applied to grids as a mechanism for providing scalable multi-resource management. Direct DHT overlay adoption breaks the physical locality relationship...

    Provided By University of Arkansas

  • White Papers // May 2008

    Ownership Transfer of RFID Tags Based on Electronic Fingerprint

    Pervasive computing devices such as Radio-Frequency IDentification (RFID) tags and wearable computing devices will require ownership transfer. Ownership transfer is a method to transfer a device to a new owner which prevents the previous owner from querying or interacting with the device. It should provide forward security in which no...

    Provided By University of Arkansas

  • White Papers // May 2008

    SAGE: Sagacious File Replication Mechanism for Structured P2P Systems

    Most traditional file replication methods fail to take into account non-uniform and time-varying file popularity, update rate, and node available capacity, which are vital factors for high efficiency of file replication mechanisms. This paper presents a sagacious file replication mechanism, namely SAGE, which considers these factors to achieve high efficiency...

    Provided By University of Arkansas

  • White Papers // May 2008

    A Security/Efficiency-Optimized Infrastructure for Wide-Area Distributed Systems

    Due to lack of a central management, wide-area distributed systems are severely threatened by a variety of malicious users in today's Internet. Current reputation-based and anonymity technologies for node communication enhance system security. However, most of these methods gain security at the cost of efficiency degradation. On the other hand,...

    Provided By University of Arkansas

  • White Papers // Oct 2009

    Stock Market Synchronicity And The Global Trade Network: A Random-Walk Approach

    Do countries which are more centrally located in the global trade network have more synchronized stock markets? The people use global trade data to construct a novel measure of network position, Random Walk Between's Centrality (RWBC), that is especially well suited to this question. RWBC measures the extent to which...

    Provided By University of Arkansas

  • White Papers // Feb 2009

    Assessing The Impacts Of Soil Carbon Credits And Risk On No-till Rice Profitability

    Rice is a major cash crop in eastern Arkansas, but most rice acres are intensively cultivated and grown on rented land. No-till is an effective means of sequestering soil carbon and reducing greenhouse gas emissions, and economic incentives exist for no-till in the form of carbon credits. Studies evaluating the...

    Provided By University of Arkansas

  • White Papers // Dec 2010

    Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is...

    Provided By University of Arkansas

  • White Papers // Nov 2008

    Alternative Methods Of Convergence Toward U.S. Market And Legal Regulations: Crosslisting Vs. Merging With U.S. Bidders

    Non-U.S. firms have two options to converge toward U.S. capital market and legal regulations-to cross-list in the U.S. or to agree to be acquired by a U.S. bidder. The authors show that companies that have lower growth opportunities, are more capital intensive, and seek bonding benefits through compliance with U.S....

    Provided By University of Arkansas

  • White Papers // Dec 2008

    Price Discovery In Opaque Markets

    This paper examines the share price revaluations of banks from bank-specific events. Results show that in the period 2000 through 2006, merger announcements convey information to the market about the value of non-merging banks. There is an upward revision in the total market value of banks and the magnitudes of...

    Provided By University of Arkansas

  • White Papers // Aug 2013

    Secure and Constant Cost Public Cloud Storage Auditing with Deduplication

    Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of OWnership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. However, trivial combination of...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    GLIMMIX Adds a New Level to the Analysis of Multilevel Community Data

    Community intervention study is often at the cluster level such as school, church or baseball clubs and may even have clusters within a cluster. For example, in the strike out study, individual seat belt usage was measured and clustered within car, car within communities. Individuals are randomized to either control...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Creating Forest Plots From Pre-Computed Data Using PROC SGPLOT and Graph Template Language

    Historically, forest plots graphically display the information from the individual studies that went into the meta-analysis, and more recently the results of observational studies (e.g. epidemiology). They show the estimates (e.g. odds ratios, hazard ratios, and log transformed hazard ratios) and the amount of variation (e.g. 95% confidence intervals) and...

    Provided By University of Arkansas

  • White Papers // Mar 2010

    Improving Your Statistical Consulting Prowess by Adding R to Your SAS Repertoire

    SAS is a powerful package with tremendous capabilities. However, no package contains every model, calculation, or graphics option. With SAS 9.2, it is easier to tap into the R programming environment with the SAS/IML Workshop 3.2 application. Many cutting-edge models and statistical graphics are being developed in R. The paper...

    Provided By University of Arkansas

  • White Papers // Jun 2005

    Pricing Strategy For Wine In Today's Marketplace

    The pricing strategy used for marketing wines should be a function of the demand for wine. Consumers are not directly concerned with the cost structure inherent in producing a commodity they are interested in purchasing. However, the manager of the winery is concerned with the underlying profits and must therefore...

    Provided By University of Arkansas

  • White Papers // Jul 2008

    Routing Models for Rural Networks with Time-Varying Constraints

    The motivation for this work comes from the poultry industry, but can be broadened to other application areas. One problem of concern in the poultry industry is when an infected flock of birds has to be transported to another facility, but in doing so, the infected flock cannot come within...

    Provided By University of Arkansas

  • White Papers // Apr 2010

    Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    Secure system state estimation is an important issue in smart grid to assure the reliability and security. In this paper, the case of a single observation station and Gaussian noise communication channel with an eavesdropper is considered. The channel capacity requirement is studied from the information theoretic perspective. The smart...

    Provided By University of Arkansas

  • White Papers // Nov 2010

    Authorized Private Keyword Search Over Encrypted Personal Health Records in Cloud Computing

    Recently, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange, which features storing PHRs electronically in one centralized place, such as a third-party cloud service provider. Although this greatly facilitates the management and sharing of patients' Personal Health Information (PHI), there have been serious privacy...

    Provided By University of Arkansas