University of Hawaii

Displaying 1-18 of 18 results

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Aug 2009

    Compound Wiretap Channels

    This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is...

    Provided By University of Hawaii

  • White Papers // Jun 2009

    On the Compound MIMO Broadcast Channels With Confidential Messages

    The authors study the compound Multi-Input Multi-Output (MIMO) BroadCast Channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state...

    Provided By University of Hawaii

  • White Papers // Apr 2009

    Physical Layer Security in Broadcast Networks

    This paper reviews the information theoretic characterization of security in broad-cast channels, in which a transmitter has both public and confidential messages in-tended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients....

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2009

    GrayWulf: Scalable Clustered Architecture for Data Intensive Computing

    Data intensive computing presents a significant challenge for traditional supercomputing architectures that maximize FLOPS since CPU speed has surpassed IO capabilities of HPC systems and BeoWulf clusters. The authors present the architecture for a three tier commodity component cluster designed for a range of data intensive computations operating on petascale...

    Provided By University of Hawaii

  • White Papers // Dec 2008

    Inflation Targeting And Real Exchange Rates In Emerging Markets

    The authors examine the Inflation Targeting (IT) experiences of emerging market economies, focusing especially on the roles of the real exchange rate and the distinction between commodity and non-commodity exporting nations. In the context of a simple empirical model, estimated with panel data for 17 emerging markets using both IT...

    Provided By University of Hawaii

  • White Papers // Nov 2008

    Anything Wrong With Breaking A Buck? An Empirical Evaluation Of NASDAQ $1 Minimum Price Maintenance Criterion

    In the early 1990s, the NASDAQ introduced a controversial $1 minimum bid price threshold as part of its maintenance criteria (the one-dollar rule). This paper empirically evaluates this rule using an extreme value approach. Utilizing the Generalized Extreme Value distribution model to capture extreme price plummets, the author finds NASDAQ...

    Provided By University of Hawaii

  • White Papers // Nov 2008

    Renewable Resource Management With Stock Externalities: Coastal Aquifers And Submarine Groundwater Discharge

    This paper develops a hydrologic-ecologic-economic model of groundwater use. Particularly, the authors model coastal groundwater management and its effects on submarine groundwater discharge, near shore marine water quality, and marine biota. They show that incorporating the external effects on near shore resources increases the optimal sustainable steady-state head level. Numerical...

    Provided By University of Hawaii

  • White Papers // Oct 2008

    Labor Market Flexibility As A Determinant Of FDI Inflows

    This paper shows that labor market flexibility, measured by labor market standards and regulations, has two opposing effects on FDI inflows. Labor market regulations and standards decrease FDI inflows through the cost channel, but they increase FDI inflows through the productivity channel. Allowing for a non-linear relationship between different indicators...

    Provided By University of Hawaii

  • White Papers // Jan 2009

    GrayWulf: Scalable Clustered Architecture for Data Intensive Computing

    Data intensive computing presents a significant challenge for traditional supercomputing architectures that maximize FLOPS since CPU speed has surpassed IO capabilities of HPC systems and BeoWulf clusters. The authors present the architecture for a three tier commodity component cluster designed for a range of data intensive computations operating on petascale...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Jun 2009

    On the Compound MIMO Broadcast Channels With Confidential Messages

    The authors study the compound Multi-Input Multi-Output (MIMO) BroadCast Channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Nov 2008

    Anything Wrong With Breaking A Buck? An Empirical Evaluation Of NASDAQ $1 Minimum Price Maintenance Criterion

    In the early 1990s, the NASDAQ introduced a controversial $1 minimum bid price threshold as part of its maintenance criteria (the one-dollar rule). This paper empirically evaluates this rule using an extreme value approach. Utilizing the Generalized Extreme Value distribution model to capture extreme price plummets, the author finds NASDAQ...

    Provided By University of Hawaii

  • White Papers // Aug 2009

    Compound Wiretap Channels

    This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is...

    Provided By University of Hawaii

  • White Papers // Apr 2009

    Physical Layer Security in Broadcast Networks

    This paper reviews the information theoretic characterization of security in broad-cast channels, in which a transmitter has both public and confidential messages in-tended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients....

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii

  • White Papers // Dec 2008

    Inflation Targeting And Real Exchange Rates In Emerging Markets

    The authors examine the Inflation Targeting (IT) experiences of emerging market economies, focusing especially on the roles of the real exchange rate and the distinction between commodity and non-commodity exporting nations. In the context of a simple empirical model, estimated with panel data for 17 emerging markets using both IT...

    Provided By University of Hawaii

  • White Papers // Nov 2008

    Renewable Resource Management With Stock Externalities: Coastal Aquifers And Submarine Groundwater Discharge

    This paper develops a hydrologic-ecologic-economic model of groundwater use. Particularly, the authors model coastal groundwater management and its effects on submarine groundwater discharge, near shore marine water quality, and marine biota. They show that incorporating the external effects on near shore resources increases the optimal sustainable steady-state head level. Numerical...

    Provided By University of Hawaii

  • White Papers // Oct 2008

    Labor Market Flexibility As A Determinant Of FDI Inflows

    This paper shows that labor market flexibility, measured by labor market standards and regulations, has two opposing effects on FDI inflows. Labor market regulations and standards decrease FDI inflows through the cost channel, but they increase FDI inflows through the productivity channel. Allowing for a non-linear relationship between different indicators...

    Provided By University of Hawaii