University of Colorado

Displaying 1-40 of 51 results

  • White Papers // Jan 2014

    Statistical Simulation of Multithreaded Architectures

    Detailed, cycle-accurate processor simulation is an integral component of the design and study of computer architectures. However, as the detail of simulation and processor design size increase, simulation times grow exponentially, and it becomes increasingly necessary to find fast, efficient simulation techniques that still ensure accurate results. At the same...

    Provided By University of Colorado

  • White Papers // Mar 2013

    A Roughset Based Effective Rule Generation Method for Classification with an Application in Intrusion Detection

    "In this paper, the authors use rough set theory to address the important problem of generating decision rules for data mining. In particular, they propose a rough set based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise...

    Provided By University of Colorado

  • White Papers // May 2012

    Cognitive Radio Kit Framework : Experimental Platform for Dynamic Spectrum Research

    This paper presents an overview of a Cognitive Radio Kit, an open software defined radio framework developed to enable experimental research in cognitive radio and dynamic spectrum techniques. Currently available open software defined platforms are limited by performance and bandwidth constraints, mostly due to inadequate hardware acceleration of compute intensive...

    Provided By University of Colorado

  • White Papers // May 2012

    Architecting a Large-Scale Elastic Environment: Recontextualization and Adaptive Cloud Services for Scientific Computing

    Infrastructure-as-a-service (IaaS) clouds, such as Amazon EC2, offer pay-for-use virtual resources on-demand. This allows users to outsource computation and storage when needed and create elastic computing environments that adapt to changing demand. However, existing services, such as cluster resource managers (e.g. Torque), do not include support for elastic environments. Furthermore,...

    Provided By University of Colorado

  • White Papers // Feb 2012

    Provisioning Policies for Elastic Computing Environments

    Resources experience dynamic load as demand fluctuates. Therefore, resource providers must estimate the appropriate amount of resources to purchase in order to meet variable user demand. With the relatively recent introduction of Infrastructure-as-a-Service (IaaS) clouds (e.g. Amazon EC2) resource providers may choose to outsource demand as needed. As a result,...

    Provided By University of Colorado

  • White Papers // Jan 2012

    Face Recognition Using Hybrid Histogram & Eigen Value Approach

    Face recognition is a task humans perform remarkably easily and successfully. This apparent simplicity was shown to be dangerously misleading as the automatic face recognition seems to be a problem that is still far from solved. Face recognition is one of the few biometric methods that possess the merits of...

    Provided By University of Colorado

  • White Papers // Oct 2011

    Stochastic Ordering Based Carrier-to-Interference Ratio Analysis for the Shotgun Cellular Systems

    A simple analytical tool based on stochastic ordering is developed to compare the distributions of carrier-to-interference ratio at the mobile station of two cellular systems where the base stations are distributed randomly according to certain non-homogeneous Poisson point processes. The comparison is conveniently done by studying only the base station...

    Provided By University of Colorado

  • White Papers // Oct 2011

    Multi-Tier Network Performance Analysis Using a Shotgun Cellular System

    The modern cellular communication network is a complex overlay of heterogeneous networks such as macrocells, microcells, picocells, femtocells, etc. The Base Station (BS) distribution appears increasingly irregular as the density of BSs grows over time while bounded by cell site limitation. Due to computational constraints, system designers cannot study the...

    Provided By University of Colorado

  • White Papers // May 2011

    Understanding, Fostering, and Supporting Cultures of Participation

    Cultures are defined in part by their media and their tools for thinking, working, learning, and collaborating. In the past, the design of most media emphasized a clear distinction between producers and consumers. Television is the medium that most obviously exhibits this orientation and has contributed to the degeneration of...

    Provided By University of Colorado

  • White Papers // May 2011

    Resource Allocation and Performance Optimization in Wireless Networks

    As wireless networks continue streaking through more aspects of the lives, it is seriously constrained by limited network resources, in terms of time, frequency and power. In order to enhance performance for wireless networks, it is of great importance to allocate resources smartly based on the current network scenarios. The...

    Provided By University of Colorado

  • White Papers // Feb 2011

    Realistic Stereo Error Models and Finite Optimal Stereo Baselines

    Stereo reconstruction is an important research and application area, both for general 3D reconstruction and for operations like robotic navigation and remote sensing. This paper addresses the determination of parameters for a stereo system to optimize/minimize 3D reconstruction errors. Previous work on error analysis in stereo reconstruction optimized error in...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Dynamics Of A Service Economy Driven By Random Transactions

    Agents buy and sell services. All services are of equal quality. Buyers choose sellers at random. Monetary and fiscal policies are imposed by a central bank and a central government. Credit is supplied by a commercial banking system. Propensities to buy, sell, and lend depend on account balances, interest rates,...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

    Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save service users from dealing with service providers' privacy policies, and reduce the service providers' requirements for safeguarding private information. However, guaranteeing anonymous usage of location-based...

    Provided By University of Colorado

  • White Papers // Jan 2011

    SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services

    Online video chat services such as Chatroulette, Omegle, and vChatter that randomly match pairs of users in video chat sessions are fast becoming very popular, with over a million users per month in the case of Chatroulette. A key problem encountered in such systems is the presence of flashers and...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Cognitive Architecture for Website Design and Usability Evaluation: Comprehension and Information Scent in Performing by Exploration

    CoLiDeS is a model of how people navigate a complex website to find information and is the youngest member in a family of models for human-computer interaction situations where users rely primarily on skilled reading and action planning as the core cognitive processes. All models in this family are based...

    Provided By University of Colorado

  • White Papers // Dec 2010

    The Degrees of Freedom Region of the Two-User MIMO Broadcast Channel With Delayed CSI

    The Degrees of Freedom (DoF) region of the K-user MIMO (Multiple-Input Multiple-Output) Gaussian Broadcast Channel (BC) is studied under i.i.d. fading when there is delayed Channel State Information at the Transmitter (CSIT). The general case of the MIMO BC is considered where each terminal has an arbitrary number of antennas....

    Provided By University of Colorado

  • White Papers // Dec 2010

    ID-Privacy in Large Scale Biometric Systems

    Balancing privacy and security concerns in biometric systems is an area of growing importance. While important work has gone on in template protection and revocable biometric tokens, these avenues of research address only one aspect of the problem. Such research does not address a critical issue: Balancing the need government...

    Provided By University of Colorado

  • White Papers // Oct 2010

    Beyond PKI: The Biocyptographic Key Infrastructure

    Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI's popularity as a security solution, Phishing and other Man-in-the-Middle related network attacks are accomplished with ease. The major problems with PKI come down to trust, and largely, how much faith...

    Provided By University of Colorado

  • White Papers // Oct 2010

    A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance

    Competing notions of biometric recognition system failure prediction have emerged recently, which can roughly be categorized as quality and non-quality based approaches. Quality, while well correlated overall with recognition performance, is a weaker indication of how the system will perform in a particular instance - something of primary importance for...

    Provided By University of Colorado

  • White Papers // Sep 2010

    Finding Systemically Important Financial Institutions Around The Global Credit Crisis: Evidence From Credit Default Swaps

    With an international dataset of credit default spreads as a credit risk measure, the authors propose a novel empirical framework to identify the structure of credit risk network across major financial institutions around the recent 2007-2008 global credit crisis. The findings directly shed light on credit risk transmission in a...

    Provided By University of Colorado

  • White Papers // Sep 2010

    GRATIS: Free Bits in the Network

    Conventional Signal-to-Noise (SNR) based rate adaptation algorithms in wireless networks provide limited flexibility in terms of the maximum achievable data rates. Transmitters are often forced to step down to a lower data rate due to the lack of an intermediate rate despite having a higher SNR than the minimum required...

    Provided By University of Colorado

  • White Papers // Aug 2010

    Socio-Technical Systems - A Meta-Design Perspective

    Meta-design of socio-technical systems is an approach which complies with the need of integrating two different types of structures and processes: Technical systems which are engineered to provide anticipatable and reliable interactions between users and systems, and social systems which are contingent in their interactions and a subject of evolution....

    Provided By University of Colorado

  • White Papers // Aug 2010

    Guide To Motivating Employees

    The Human Resources (HR) Guide to Motivating Employees is intended to provide effective ideas and tools for supporting employee motivation. CU-Boulder supervisors and managers are working hard to maintain a positive work environment among staff, while also facing budget and change management challenges. The HR Guide offers concrete ideas to...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Practical Defenses for Evil Twin Attacks in 802.11

    Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Challenges in Deploying Steerable Wireless Testbeds

    Phased array antennas enable the use of real-time beam-forming and null-steering to further increase control of signal strength and interference in wireless networks. Understanding the potential of this platform for both mesh and single-hop networks is becoming more important as smart antennas begin to appear in emerging networking standards. Prior...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Intrusions Into Privacy in Video Chat Environments: Attacks and Countermeasures

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper...

    Provided By University of Colorado

  • White Papers // Jun 2010

    1IEEE Standard 802.16:A Technical Overview of the Wireless MAN Air Interface for Broadband Wireless Access

    This paper discusses the 802.16: Specifies Air Interface. Any study of the 802.16: Specifies Air Interface incorporates use of the Medium Access Control layer (MAC) and Physical Layer (PHY) of fixed point-to-multipoint Broadband Wireless Access (BWA) systems. These systems are likely to provide multiple services. In a nutshell, this paper...

    Provided By University of Colorado

  • White Papers // Jun 2010

    International Business Travel: An Engine Of Innovation?

    While business surveys often find that managers prefer face-to-face communication for negotiating deals and selling their product, there is reason to believe that face-to-face meetings are particularly important for the transfer of technology, because technology is best explained and demonstrated in person. This paper examines the role of inward business...

    Provided By University of Colorado

  • White Papers // May 2010

    Developing a Cloud Computing Charging Model for High-Performance Computing Resources

    This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the competitiveness of the computing center with cloud computing resources, the paper develops a comprehensive system utilization charging model similar to that used by Amazon EC2 and...

    Provided By University of Colorado

  • White Papers // Apr 2010

    Gravity In The Weightless Economy

    This paper offers a new perspective on technology diffusion, a topic crucial to many …fields in economics. The authors develop a theory of technology transfer by multinationals to their foreign affiliates in which gravity for technology arises because direct communication substitutes for the transfer of technology embodied in traded intermediates....

    Provided By University of Colorado

  • White Papers // Mar 2010

    CAwbWeb: Towards a Standardized Programming Framework to Enable a Context-Aware Web

    This paper presents a vision of mobile-cloud computing systems which looks beyond simply moving data processing from mobile to cloud computing systems and considers a larger vision in which services within the cloud are aggregated and automatically integrated in real-time, based on context, to satisfy the intentions of mobile computing...

    Provided By University of Colorado

  • White Papers // Mar 2010

    The Internet Ecosystem - The Potential for Discrimination

    The Federal Communication Commission is considering rules enforcing "Network neutrality" and legislation proposing similar goals have been discussed in Congress. The goals of the proposed regulation and legislation are preserve an "Open Internet", but are specifically directed toward access networks, or the first link that directly connects users to the...

    Provided By University of Colorado

  • White Papers // Feb 2010

    Elastic Site

    Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relinquish new resources in response to changes in demand. In the paper, the authors develop a model of an "Elastic site" that efficiently adapts services provided within a...

    Provided By University of Colorado

  • White Papers // Feb 2010

    Battery System Modeling and User Study for Emerging Green-Energy Transportation

    Battery technology is the key bottleneck in many Cyber-Physical Systems (CPS). For green-energy CPS transportation applications, such as Hybrid Electrical Vehicles (HEVs) and Plug-in HEVs (PHEVs), the battery system design is mostly based on lithium-ion rechargeable electrochemical battery technology, which is bulky, expensive, unreliable, and is the primary roadblock for...

    Provided By University of Colorado

  • White Papers // Jan 2010

    Frame Relay Over VSAT Satellite Networks

    Very Small Aperture Terminals (VSATs) are small diameter earth stations used to transmit and receive voice and data communications via satellite. The terminal size is usually between 1 to 3 meters in diameter and transmission rates can go from 9.6 KBPS for low traffic applications to trunking applications with transmission...

    Provided By University of Colorado

  • White Papers // Dec 2009

    SocialFusion: Context-Aware Inference and Recommendation by Fusing Mobile, Sensor, and Social Data

    Mobile social networks are rapidly becoming an important new domain showcasing the power of mobile computing systems. These networks combine mobile location information with social networking data to enable fully context-aware environments. This paper proposes SocialFusion, a framework to support context-aware inference and recommendation by fusing together mobile, sensor, and...

    Provided By University of Colorado

  • White Papers // Nov 2009

    Efficient Social Website Crawling Using Cluster Graph

    Online social communities have gained significant popularity in recent years and have become an area of active research. Compared with general websites or well-structured Web forums, user-centered social websites pose several unique challenges for crawling, a fundamental task for data collection and data mining of large-scale online social communities: Social...

    Provided By University of Colorado

  • White Papers // Oct 2009

    Capacity Utilization, Proit Margins And Stock Returns

    This paper studies the effects of capacity utilization on accounting profit margins and stock returns. Since accounting profit margins represent the average profit per unit and not the economists' concept of unit contribution margin, the marginal/variable profit per unit a firm with idle capacity can increase its profit margins by...

    Provided By University of Colorado

  • White Papers // Sep 2009

    The Application Of Feed-In Tariffs And Other Incentives To Promote Renewable Energy In Colorado

    Feed-in tariffs (FIT) are a financial incentive designed to encourage the installation and use of renewable energy (RE) generation systems. FITs have also been referred to as Feed-in Laws, Renewable Energy Payments, Renewable Energy Dividends, and Standard Offer Contracts. Generally, a FIT incentive program can be characterized based on the...

    Provided By University of Colorado

  • White Papers // Sep 2009

    Bitstalker: Accurately and Efficiently Monitoring Bittorrent Traffic

    BitTorrent is currently the most popular peer-to-peer network for file sharing. However, experience has shown that Bit-Torrent is often used to distribute copyright protected movie and music files illegally. Consequently, copyright enforcement agencies currently monitor BitTorrent swarms to identify users participating in the illegal distribution of copyright protected files. These...

    Provided By University of Colorado

  • White Papers // Aug 2010

    Guide To Motivating Employees

    The Human Resources (HR) Guide to Motivating Employees is intended to provide effective ideas and tools for supporting employee motivation. CU-Boulder supervisors and managers are working hard to maintain a positive work environment among staff, while also facing budget and change management challenges. The HR Guide offers concrete ideas to...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Challenges in Deploying Steerable Wireless Testbeds

    Phased array antennas enable the use of real-time beam-forming and null-steering to further increase control of signal strength and interference in wireless networks. Understanding the potential of this platform for both mesh and single-hop networks is becoming more important as smart antennas begin to appear in emerging networking standards. Prior...

    Provided By University of Colorado

  • White Papers // Jun 2010

    International Business Travel: An Engine Of Innovation?

    While business surveys often find that managers prefer face-to-face communication for negotiating deals and selling their product, there is reason to believe that face-to-face meetings are particularly important for the transfer of technology, because technology is best explained and demonstrated in person. This paper examines the role of inward business...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

    Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save service users from dealing with service providers' privacy policies, and reduce the service providers' requirements for safeguarding private information. However, guaranteeing anonymous usage of location-based...

    Provided By University of Colorado

  • White Papers // Sep 2009

    Bitstalker: Accurately and Efficiently Monitoring Bittorrent Traffic

    BitTorrent is currently the most popular peer-to-peer network for file sharing. However, experience has shown that Bit-Torrent is often used to distribute copyright protected movie and music files illegally. Consequently, copyright enforcement agencies currently monitor BitTorrent swarms to identify users participating in the illegal distribution of copyright protected files. These...

    Provided By University of Colorado

  • White Papers // Sep 2009

    The Application Of Feed-In Tariffs And Other Incentives To Promote Renewable Energy In Colorado

    Feed-in tariffs (FIT) are a financial incentive designed to encourage the installation and use of renewable energy (RE) generation systems. FITs have also been referred to as Feed-in Laws, Renewable Energy Payments, Renewable Energy Dividends, and Standard Offer Contracts. Generally, a FIT incentive program can be characterized based on the...

    Provided By University of Colorado

  • White Papers // Apr 2010

    Gravity In The Weightless Economy

    This paper offers a new perspective on technology diffusion, a topic crucial to many …fields in economics. The authors develop a theory of technology transfer by multinationals to their foreign affiliates in which gravity for technology arises because direct communication substitutes for the transfer of technology embodied in traded intermediates....

    Provided By University of Colorado

  • White Papers // Aug 2009

    The Directional Attack on Wireless Localization

    802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, the authors show that these localization techniques are vulnerable to non-cryptographic attacks where an adversary uses a low-cost directional antenna to appear from the localization algorithm's perspective to be in...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Practical Defenses for Evil Twin Attacks in 802.11

    Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where...

    Provided By University of Colorado

  • White Papers // Mar 2010

    CAwbWeb: Towards a Standardized Programming Framework to Enable a Context-Aware Web

    This paper presents a vision of mobile-cloud computing systems which looks beyond simply moving data processing from mobile to cloud computing systems and considers a larger vision in which services within the cloud are aggregated and automatically integrated in real-time, based on context, to satisfy the intentions of mobile computing...

    Provided By University of Colorado

  • White Papers // Mar 2010

    The Internet Ecosystem - The Potential for Discrimination

    The Federal Communication Commission is considering rules enforcing "Network neutrality" and legislation proposing similar goals have been discussed in Congress. The goals of the proposed regulation and legislation are preserve an "Open Internet", but are specifically directed toward access networks, or the first link that directly connects users to the...

    Provided By University of Colorado

  • White Papers // Sep 2010

    GRATIS: Free Bits in the Network

    Conventional Signal-to-Noise (SNR) based rate adaptation algorithms in wireless networks provide limited flexibility in terms of the maximum achievable data rates. Transmitters are often forced to step down to a lower data rate due to the lack of an intermediate rate despite having a higher SNR than the minimum required...

    Provided By University of Colorado

  • White Papers // Jul 2010

    Intrusions Into Privacy in Video Chat Environments: Attacks and Countermeasures

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper...

    Provided By University of Colorado

  • White Papers // Feb 2010

    Battery System Modeling and User Study for Emerging Green-Energy Transportation

    Battery technology is the key bottleneck in many Cyber-Physical Systems (CPS). For green-energy CPS transportation applications, such as Hybrid Electrical Vehicles (HEVs) and Plug-in HEVs (PHEVs), the battery system design is mostly based on lithium-ion rechargeable electrochemical battery technology, which is bulky, expensive, unreliable, and is the primary roadblock for...

    Provided By University of Colorado

  • White Papers // Jan 2011

    SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services

    Online video chat services such as Chatroulette, Omegle, and vChatter that randomly match pairs of users in video chat sessions are fast becoming very popular, with over a million users per month in the case of Chatroulette. A key problem encountered in such systems is the presence of flashers and...

    Provided By University of Colorado

  • White Papers // Dec 2009

    SocialFusion: Context-Aware Inference and Recommendation by Fusing Mobile, Sensor, and Social Data

    Mobile social networks are rapidly becoming an important new domain showcasing the power of mobile computing systems. These networks combine mobile location information with social networking data to enable fully context-aware environments. This paper proposes SocialFusion, a framework to support context-aware inference and recommendation by fusing together mobile, sensor, and...

    Provided By University of Colorado

  • White Papers // Nov 2009

    Efficient Social Website Crawling Using Cluster Graph

    Online social communities have gained significant popularity in recent years and have become an area of active research. Compared with general websites or well-structured Web forums, user-centered social websites pose several unique challenges for crawling, a fundamental task for data collection and data mining of large-scale online social communities: Social...

    Provided By University of Colorado

  • White Papers // Dec 2010

    ID-Privacy in Large Scale Biometric Systems

    Balancing privacy and security concerns in biometric systems is an area of growing importance. While important work has gone on in template protection and revocable biometric tokens, these avenues of research address only one aspect of the problem. Such research does not address a critical issue: Balancing the need government...

    Provided By University of Colorado

  • White Papers // Oct 2010

    Beyond PKI: The Biocyptographic Key Infrastructure

    Public Key Infrastructure is a widely deployed security technology for handling key distribution and validation in computer security. Despite PKI's popularity as a security solution, Phishing and other Man-in-the-Middle related network attacks are accomplished with ease. The major problems with PKI come down to trust, and largely, how much faith...

    Provided By University of Colorado

  • White Papers // Oct 2010

    A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance

    Competing notions of biometric recognition system failure prediction have emerged recently, which can roughly be categorized as quality and non-quality based approaches. Quality, while well correlated overall with recognition performance, is a weaker indication of how the system will perform in a particular instance - something of primary importance for...

    Provided By University of Colorado

  • White Papers // Feb 2011

    Realistic Stereo Error Models and Finite Optimal Stereo Baselines

    Stereo reconstruction is an important research and application area, both for general 3D reconstruction and for operations like robotic navigation and remote sensing. This paper addresses the determination of parameters for a stereo system to optimize/minimize 3D reconstruction errors. Previous work on error analysis in stereo reconstruction optimized error in...

    Provided By University of Colorado

  • White Papers // Aug 2010

    Socio-Technical Systems - A Meta-Design Perspective

    Meta-design of socio-technical systems is an approach which complies with the need of integrating two different types of structures and processes: Technical systems which are engineered to provide anticipatable and reliable interactions between users and systems, and social systems which are contingent in their interactions and a subject of evolution....

    Provided By University of Colorado

  • White Papers // May 2011

    Understanding, Fostering, and Supporting Cultures of Participation

    Cultures are defined in part by their media and their tools for thinking, working, learning, and collaborating. In the past, the design of most media emphasized a clear distinction between producers and consumers. Television is the medium that most obviously exhibits this orientation and has contributed to the degeneration of...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Cognitive Architecture for Website Design and Usability Evaluation: Comprehension and Information Scent in Performing by Exploration

    CoLiDeS is a model of how people navigate a complex website to find information and is the youngest member in a family of models for human-computer interaction situations where users rely primarily on skilled reading and action planning as the core cognitive processes. All models in this family are based...

    Provided By University of Colorado

  • White Papers // Jan 2011

    Dynamics Of A Service Economy Driven By Random Transactions

    Agents buy and sell services. All services are of equal quality. Buyers choose sellers at random. Monetary and fiscal policies are imposed by a central bank and a central government. Credit is supplied by a commercial banking system. Propensities to buy, sell, and lend depend on account balances, interest rates,...

    Provided By University of Colorado

  • White Papers // Sep 2009

    Sarbanes-Oxley, Governance and Performance

    The author studies the impact of Sarbanes-Oxley Act (SOX) on the relationship between corporate governance and company performance. Five measures of corporate governance are considered during the period 1998-2007. The author finds a negative and significant relationship between board independence and operating performance during the pre-2002 period, but a positive...

    Provided By University of Colorado

  • White Papers // Jun 2010

    1IEEE Standard 802.16:A Technical Overview of the Wireless MAN Air Interface for Broadband Wireless Access

    This paper discusses the 802.16: Specifies Air Interface. Any study of the 802.16: Specifies Air Interface incorporates use of the Medium Access Control layer (MAC) and Physical Layer (PHY) of fixed point-to-multipoint Broadband Wireless Access (BWA) systems. These systems are likely to provide multiple services. In a nutshell, this paper...

    Provided By University of Colorado

  • White Papers // Oct 2009

    Capacity Utilization, Proit Margins And Stock Returns

    This paper studies the effects of capacity utilization on accounting profit margins and stock returns. Since accounting profit margins represent the average profit per unit and not the economists' concept of unit contribution margin, the marginal/variable profit per unit a firm with idle capacity can increase its profit margins by...

    Provided By University of Colorado

  • White Papers // Jan 2010

    Frame Relay Over VSAT Satellite Networks

    Very Small Aperture Terminals (VSATs) are small diameter earth stations used to transmit and receive voice and data communications via satellite. The terminal size is usually between 1 to 3 meters in diameter and transmission rates can go from 9.6 KBPS for low traffic applications to trunking applications with transmission...

    Provided By University of Colorado

  • White Papers // May 2010

    Developing a Cloud Computing Charging Model for High-Performance Computing Resources

    This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the competitiveness of the computing center with cloud computing resources, the paper develops a comprehensive system utilization charging model similar to that used by Amazon EC2 and...

    Provided By University of Colorado

  • White Papers // Feb 2010

    Elastic Site

    Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relinquish new resources in response to changes in demand. In the paper, the authors develop a model of an "Elastic site" that efficiently adapts services provided within a...

    Provided By University of Colorado

  • White Papers // May 2011

    Resource Allocation and Performance Optimization in Wireless Networks

    As wireless networks continue streaking through more aspects of the lives, it is seriously constrained by limited network resources, in terms of time, frequency and power. In order to enhance performance for wireless networks, it is of great importance to allocate resources smartly based on the current network scenarios. The...

    Provided By University of Colorado

  • White Papers // Oct 2011

    Multi-Tier Network Performance Analysis Using a Shotgun Cellular System

    The modern cellular communication network is a complex overlay of heterogeneous networks such as macrocells, microcells, picocells, femtocells, etc. The Base Station (BS) distribution appears increasingly irregular as the density of BSs grows over time while bounded by cell site limitation. Due to computational constraints, system designers cannot study the...

    Provided By University of Colorado

  • White Papers // Oct 2011

    Stochastic Ordering Based Carrier-to-Interference Ratio Analysis for the Shotgun Cellular Systems

    A simple analytical tool based on stochastic ordering is developed to compare the distributions of carrier-to-interference ratio at the mobile station of two cellular systems where the base stations are distributed randomly according to certain non-homogeneous Poisson point processes. The comparison is conveniently done by studying only the base station...

    Provided By University of Colorado

  • White Papers // Sep 2010

    Finding Systemically Important Financial Institutions Around The Global Credit Crisis: Evidence From Credit Default Swaps

    With an international dataset of credit default spreads as a credit risk measure, the authors propose a novel empirical framework to identify the structure of credit risk network across major financial institutions around the recent 2007-2008 global credit crisis. The findings directly shed light on credit risk transmission in a...

    Provided By University of Colorado

  • White Papers // Aug 2009

    Packet Classification in Co-Mingled Traffic Streams

    This paper considers the problem of packet classification in a co-mingled traffic stream. Given an encrypted co-mingled stream consisting of different protocol flows originating from different sources; the authors investigate if it is possible to assign packets to their respective sources and identify the protocol for each source. Encryption makes...

    Provided By University of Colorado

  • White Papers // May 2012

    Architecting a Large-Scale Elastic Environment: Recontextualization and Adaptive Cloud Services for Scientific Computing

    Infrastructure-as-a-service (IaaS) clouds, such as Amazon EC2, offer pay-for-use virtual resources on-demand. This allows users to outsource computation and storage when needed and create elastic computing environments that adapt to changing demand. However, existing services, such as cluster resource managers (e.g. Torque), do not include support for elastic environments. Furthermore,...

    Provided By University of Colorado

  • White Papers // Feb 2012

    Provisioning Policies for Elastic Computing Environments

    Resources experience dynamic load as demand fluctuates. Therefore, resource providers must estimate the appropriate amount of resources to purchase in order to meet variable user demand. With the relatively recent introduction of Infrastructure-as-a-Service (IaaS) clouds (e.g. Amazon EC2) resource providers may choose to outsource demand as needed. As a result,...

    Provided By University of Colorado

  • White Papers // May 2012

    Cognitive Radio Kit Framework : Experimental Platform for Dynamic Spectrum Research

    This paper presents an overview of a Cognitive Radio Kit, an open software defined radio framework developed to enable experimental research in cognitive radio and dynamic spectrum techniques. Currently available open software defined platforms are limited by performance and bandwidth constraints, mostly due to inadequate hardware acceleration of compute intensive...

    Provided By University of Colorado

  • White Papers // Jan 2012

    Face Recognition Using Hybrid Histogram & Eigen Value Approach

    Face recognition is a task humans perform remarkably easily and successfully. This apparent simplicity was shown to be dangerously misleading as the automatic face recognition seems to be a problem that is still far from solved. Face recognition is one of the few biometric methods that possess the merits of...

    Provided By University of Colorado