University of East Anglia

Displaying 1-10 of 10 results

  • White Papers // Apr 2013

    A Survey of Mathematical Models, Simulation Approaches and Testbeds Used for Research in Cloud Computing

    The first hurdle for carrying out research on cloud computing is the development of a suitable research platform. While cloud computing is primarily commercially-driven and commercial clouds are naturally realistic as research platforms, they do not provide to the scientist enough control for dependable experiments. On the other hand, research...

    Provided By University of East Anglia

  • White Papers // Jan 2013

    Using Neural Network to Propose Solutions to Threats in Attack Patterns

    In the last decade, a lot of effort has been put into securing software application during development in the software industry. Software security is a research field in this area which looks at how security can be weaved into software at each phase of Software Development Life-Cycle (SDLC). The use...

    Provided By University of East Anglia

  • White Papers // Sep 2012

    Behavioural Patterns Analysis of Low Entropy People Using Proximity Data

    Over the years, wireless enabled mobile devices have become an important part of the people daily activities that can provide rich contextual information about the location and environment of an individual (for example who is in your proximity? and where are you?). Advancement in technology has opened several horizons to...

    Provided By University of East Anglia

  • White Papers // Aug 2012

    Security Assessment of Software Design using Neural Network

    Security flaws in software applications today has been attributed mostly to design flaws. With limited budget and time to release software into the market, many developers often consider security as an afterthought. Previous research shows that integrating security into software applications at a later stage of Software Development Life Cycle...

    Provided By University of East Anglia

  • White Papers // Jun 2011

    SecTro: A CASE Tool for Modelling Security in Requirements Engineering Using Secure Tropos

    Secure Tropos is an extension of Tropos methodology, which considers security throughout the whole development process. The main concept of Secure Tropos is the security constraint that captures constraints regarding security. Similarly, the concepts of dependency, goal, task, resource, and capability were also extended with security in mind. In this...

    Provided By University of East Anglia

  • White Papers // Mar 2011

    Emotions And Chat In A Financial Markets Experiment

    This paper examines experimentally two common conjectures in the popular literature on financial markets: that they are swayed by emotion and that they behave like a 'Crowd'. The authors find consistent evidence that deviations of prices from fundamental value depend on the emotion of excitement and on the presence of...

    Provided By University of East Anglia

  • White Papers // Feb 2011

    Trust and Privacy Concern in the Cloud

    Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. However, the comfort of this innovation is still shaking and a lot of companies are now...

    Provided By University of East Anglia

  • White Papers // Sep 2010

    Entry Threats, And Inefficiency In 'Efficient Bargaining'

    The authors examine whether the outcome of bargaining over wage and employment between an incumbent firm and a union remains efficient under entry threat. The workers\' reservation wage is not known to the entrant, and entry is profitable only against the high reservation wage. The entrant observes the pre-entry price,...

    Provided By University of East Anglia

  • White Papers // Jan 2010

    Evaluating Consumer Permission in SMS Advertising

    This study examines the phenomenon of consumer's willingness to give permission to receive Short Message Service (SMS) advertisements. The purpose of this research is threefold: to better understand the phenomenon of consumer's willingness to give permission to receive text message (SMS) advertisements, to provide empirical data that supports the understanding,...

    Provided By University of East Anglia

  • White Papers // May 2009

    Monetary Policy Shocks And Stock Returns: Evidence From The British Market

    This paper examines the impact of anticipated and unanticipated interest rate changes on aggregate and sectoral stock returns in the UK. The monetary policy shock is generated from the change in the three-month sterling LIBOR futures contract. Results from time-series and panel analysis indicate an important structural break in the...

    Provided By University of East Anglia

  • White Papers // Sep 2012

    Behavioural Patterns Analysis of Low Entropy People Using Proximity Data

    Over the years, wireless enabled mobile devices have become an important part of the people daily activities that can provide rich contextual information about the location and environment of an individual (for example who is in your proximity? and where are you?). Advancement in technology has opened several horizons to...

    Provided By University of East Anglia

  • White Papers // Aug 2012

    Security Assessment of Software Design using Neural Network

    Security flaws in software applications today has been attributed mostly to design flaws. With limited budget and time to release software into the market, many developers often consider security as an afterthought. Previous research shows that integrating security into software applications at a later stage of Software Development Life Cycle...

    Provided By University of East Anglia

  • White Papers // Apr 2013

    A Survey of Mathematical Models, Simulation Approaches and Testbeds Used for Research in Cloud Computing

    The first hurdle for carrying out research on cloud computing is the development of a suitable research platform. While cloud computing is primarily commercially-driven and commercial clouds are naturally realistic as research platforms, they do not provide to the scientist enough control for dependable experiments. On the other hand, research...

    Provided By University of East Anglia

  • White Papers // Feb 2011

    Trust and Privacy Concern in the Cloud

    Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. However, the comfort of this innovation is still shaking and a lot of companies are now...

    Provided By University of East Anglia

  • White Papers // Jan 2010

    Evaluating Consumer Permission in SMS Advertising

    This study examines the phenomenon of consumer's willingness to give permission to receive Short Message Service (SMS) advertisements. The purpose of this research is threefold: to better understand the phenomenon of consumer's willingness to give permission to receive text message (SMS) advertisements, to provide empirical data that supports the understanding,...

    Provided By University of East Anglia

  • White Papers // Sep 2010

    Entry Threats, And Inefficiency In 'Efficient Bargaining'

    The authors examine whether the outcome of bargaining over wage and employment between an incumbent firm and a union remains efficient under entry threat. The workers\' reservation wage is not known to the entrant, and entry is profitable only against the high reservation wage. The entrant observes the pre-entry price,...

    Provided By University of East Anglia

  • White Papers // May 2009

    Monetary Policy Shocks And Stock Returns: Evidence From The British Market

    This paper examines the impact of anticipated and unanticipated interest rate changes on aggregate and sectoral stock returns in the UK. The monetary policy shock is generated from the change in the three-month sterling LIBOR futures contract. Results from time-series and panel analysis indicate an important structural break in the...

    Provided By University of East Anglia

  • White Papers // Mar 2011

    Emotions And Chat In A Financial Markets Experiment

    This paper examines experimentally two common conjectures in the popular literature on financial markets: that they are swayed by emotion and that they behave like a 'Crowd'. The authors find consistent evidence that deviations of prices from fundamental value depend on the emotion of excitement and on the presence of...

    Provided By University of East Anglia

  • White Papers // Jan 2013

    Using Neural Network to Propose Solutions to Threats in Attack Patterns

    In the last decade, a lot of effort has been put into securing software application during development in the software industry. Software security is a research field in this area which looks at how security can be weaved into software at each phase of Software Development Life-Cycle (SDLC). The use...

    Provided By University of East Anglia

  • White Papers // Jun 2011

    SecTro: A CASE Tool for Modelling Security in Requirements Engineering Using Secure Tropos

    Secure Tropos is an extension of Tropos methodology, which considers security throughout the whole development process. The main concept of Secure Tropos is the security constraint that captures constraints regarding security. Similarly, the concepts of dependency, goal, task, resource, and capability were also extended with security in mind. In this...

    Provided By University of East Anglia