University of Hawaii

Displaying 1-14 of 14 results

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Aug 2009

    Compound Wiretap Channels

    This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is...

    Provided By University of Hawaii

  • White Papers // Jun 2009

    On the Compound MIMO Broadcast Channels With Confidential Messages

    The authors study the compound Multi-Input Multi-Output (MIMO) BroadCast Channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state...

    Provided By University of Hawaii

  • White Papers // Apr 2009

    Physical Layer Security in Broadcast Networks

    This paper reviews the information theoretic characterization of security in broad-cast channels, in which a transmitter has both public and confidential messages in-tended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients....

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2009

    GrayWulf: Scalable Clustered Architecture for Data Intensive Computing

    Data intensive computing presents a significant challenge for traditional supercomputing architectures that maximize FLOPS since CPU speed has surpassed IO capabilities of HPC systems and BeoWulf clusters. The authors present the architecture for a three tier commodity component cluster designed for a range of data intensive computations operating on petascale...

    Provided By University of Hawaii

  • White Papers // Jan 2009

    GrayWulf: Scalable Clustered Architecture for Data Intensive Computing

    Data intensive computing presents a significant challenge for traditional supercomputing architectures that maximize FLOPS since CPU speed has surpassed IO capabilities of HPC systems and BeoWulf clusters. The authors present the architecture for a three tier commodity component cluster designed for a range of data intensive computations operating on petascale...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Architecture and Design of Medical Processor Units for Medical Networks

    This paper introduces analogical and deductive methodologies for the design Medical Processor Units (MPUs). From the study of evolution of numerous earlier processors, the authors derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective,...

    Provided By University of Hawaii

  • White Papers // Jun 2009

    On the Compound MIMO Broadcast Channels With Confidential Messages

    The authors study the compound Multi-Input Multi-Output (MIMO) BroadCast Channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state...

    Provided By University of Hawaii

  • White Papers // May 2011

    Intermediates Import And Gains From Trade Liberalization

    This paper uses matched Chinese firm and trade data to investigate the importing channels of productivity gains from trade liberalization. The authors show that input tariff reductions encourage the importers to increase the volume of imported inputs and capital goods, to expand product margin and source country margin, to access...

    Provided By University of Hawaii

  • White Papers // Aug 2009

    Compound Wiretap Channels

    This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is...

    Provided By University of Hawaii

  • White Papers // Apr 2009

    Physical Layer Security in Broadcast Networks

    This paper reviews the information theoretic characterization of security in broad-cast channels, in which a transmitter has both public and confidential messages in-tended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients....

    Provided By University of Hawaii

  • White Papers // Jun 2011

    Information Security Plan for Flight Simulator Applications

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. The authors will...

    Provided By University of Hawaii

  • White Papers // Oct 2011

    IT Security Plan for Flight Simulation Program

    Information security is one of the most important aspects of technology, the authors cannot protect the best interests of their organizations' assets (be that personnel, data, or other resources), without ensuring that these assets are protected to the best of their ability. Within the Defense Department, this is vital to...

    Provided By University of Hawaii

  • White Papers // Feb 2010

    Convergence of Corporate and Information Security

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise...

    Provided By University of Hawaii

  • White Papers // Mar 2010

    An Instructional Video Module on Spreadsheets Accommodating the Needs of Senior Citizens

    An increasing number of senior citizens are motivated to learn how to use computers to make everyday tasks more effective and efficient. However, due to changes that occur with aging, they require specific accommodations to satisfy their learning deficits and needs. Much computer instruction is provided for the younger generation,...

    Provided By University of Hawaii

  • White Papers // Feb 2009

    Offshore Call Centers and the Role of National Identity Management on Customer Trust

    Offshore call centers are regarded as an important strategic decision for organizations to save the cost. Despite wide spread use of the practice, many organizations seem to be reluctant to openly admit this fact when interacting with customers and confusion exists about where to draw the line to make customers...

    Provided By University of Hawaii

  • White Papers // Jan 2011

    Simple Layout Algorithms to Maintain Network Connectivity Under Faults

    A problem of survivable layout of an IP network topology on a wavelength division multiplexed network is considered. Simple layout algorithms are given that have low time complexities. The algorithms are variations of a basic algorithm that lays out IP links as lightpaths sequentially according to some order and with...

    Provided By University of Hawaii

  • White Papers // Dec 2010

    The Employment Effects Of Fiscal Policy: How Costly Are ARRA Jobs?

    The American Recovery and Reinvestment Act were intended to stimulate the U.S. economy and to create jobs. But at what cost? In this paper, the authors discuss the range of potential benefits and costs associated with counter-cyclical fiscal policy. Benefits and costs may be social, macroeconomic, systemic, and budgetary. They...

    Provided By University of Hawaii

  • White Papers // Nov 2010

    Health Investment Over The Life-Cycle

    The authors study quantitatively what drives the rise in medical expenditures over the life-cycle. Two motives are considered. First, health delivers a flow of utility each period. Second, better health enables people to allocate more time to productive or pleasurable activities. They calibrate a model of endogenous health accumulation to...

    Provided By University of Hawaii