University of Iowa

Displaying 1-24 of 24 results

  • White Papers // Nov 2013

    Providing Security in Granting Agency Using Workflow CRBAC Model

    There have been many security solutions to secure representation in the work flow used in business processes and grid networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base Access Control (CRBAC) is one...

    Provided By University of Iowa

  • White Papers // Aug 2013

    Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

    Capturing is the first step in Intrusion Detection System (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system's environment to the user's environment are some of the system characteristics. If these requirements are not met, packet capture...

    Provided By University of Iowa

  • White Papers // Mar 2013

    Non-isomorphic Biclique Cryptanalysis and its Application to Full-Round mCrypton

    Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to analyze the full-round AES cipher in a single key scenario. In this paper, the authors introduce...

    Provided By University of Iowa

  • White Papers // Dec 2012

    Designing a Model for Processes Reengineering through Applying Agility Enterprise Architecture Framework and Priority of its Implementation Phases

    In the current condition of the world and with regards to the world competition, organizational existence has become the most important problem of the managers. The success secret of current organizations depends on setting their ultimate goals and objectives outside of the organization. In another word, in a safe organization,...

    Provided By University of Iowa

  • White Papers // Nov 2012

    On the Achievable Bit Rates of DSL Vectoring Techniques in the Presence of Alien Crosstalkers

    Different pre-coder and equalizer structures have been proposed in literature for vectored Digital Subscriber Lines (DSLs). In this paper, the authors assess the relative merit of advanced complex pre-coders and equalizers in practical DSL scenarios. Using extensive computer simulations, the achievable bit rates are investigated in the presence of alien...

    Provided By University of Iowa

  • White Papers // Aug 2012

    Carrier Sense Multiple Access Tuning Parameters Using Game Theory

    Ad Hoc and Mesh networks are good samples of multi agent systems, where their nodes access the channel through carrier sense multiple access method, while a node channel access influence the access of neighbor nodes to the channel. Hence, game theory is a strong tool for studying this kind of...

    Provided By University of Iowa

  • White Papers // Aug 2012

    Deadlock Recovery Technique in Bus Enhanced NoC Architecture

    Increase in the speed of processors has led to crucial role of communication in the performance of systems. As a result, routing is taken into consideration as one of the most important subjects of the Network on Chip architecture. Routing algorithms to deadlock avoidance prevent packets route completely based on...

    Provided By University of Iowa

  • White Papers // May 2012

    Optimal Dynamic Spectrum Management for DSL Interference/Broadcast Channel

    In this paper, the authors consider optimal Dynamic Spectrum Management (DSM) for a DownStream (DS) DSL scenario in which users are divided into a few separate groups, where vector encoding based signal coordination can be applied in each group and spectrum coordination is possible for all users. This can be...

    Provided By University of Iowa

  • White Papers // Mar 2012

    On the Mixing Time of Markov Chain Monte Carlo for Integer Least-Square Problems

    In this paper, the authors study the mixing time of Markov Chain Monte Carlo (MCMC) for integer Least-Square (LS) optimization problems. It is found that the mixing time of MCMC for integer LS problems depends on the structure of the underlying lattice. More specifically, the mixing time of MCMC is...

    Provided By University of Iowa

  • White Papers // Nov 2011

    Wing+ Web-Application Development Framework

    Nowadays, web development has been expanded greatly, not only for ordinary reasons, but also for enterprise and other important purposes. So it's obvious that there would be some challenges and problems if the users want to develop important applications such as an automation system on the web. Some of the...

    Provided By University of Iowa

  • White Papers // Jul 2011

    Using Artificial Immune System and Fuzzy Logic for Alert Correlation

    One of the most important challenges facing the Intrusion Detection Systems (IDSs) is the huge number of generated alerts. A system administrator will be overwhelmed by these alerts in such a way that she/he cannot manage and use the alerts. The best-known solution is to correlate low-level alerts into a...

    Provided By University of Iowa

  • White Papers // Apr 2011

    Feature Guided Motion Artifact Reduction With Structure-Awareness in 4D CT Images

    In this paper, the authors propose a novel method to reduce the magnitude of 4D CT artifacts by stitching two images with a data-driven regularization constrain, which helps preserve the local anatomy structures. Their method first computes an interface seam for the stitching in the overlapping region of the first...

    Provided By University of Iowa

  • White Papers // Mar 2011

    Relationship between Knowledge Management Process and Creativity among Faculty Members in the University

    The recognition of knowledge and creativity as key strategic assets are very popular today. The purpose of this research was to study the relationship between Knowledge Management (KM) process and creativity among faculty members in the University. The research hypotheses were examined while considering KM process dimensions including Socialization, Combination,...

    Provided By University of Iowa

  • White Papers // Feb 2011

    Globalisation, Gender And Growth

    The authors consider the effect of globalization on fertility, human capital and growth. They view globalization as creating market opportunities for employment in less developed countries. They construct a specific model of household decision making, drawing on empirical observations in the development economics literature, and show that if the market...

    Provided By University of Iowa

  • White Papers // Jan 2011

    Altruistic Routing in Structured P2P Networks

    Request patterns in P2P networks are not uniform, and the cost of communication depends on the traffic flows among peers. This paper illustrates how the processes in an overlay network can use the information about traffic flow pattern to modify their routing tables and minimize their communication costs. Two different...

    Provided By University of Iowa

  • White Papers // Dec 2010

    A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries

    This paper is to understand is there any difference between ERP implementation's CSF in developed and developing countries? Understanding this subject can help one to implement ERP systems properly in developing nations. This research showed that in developed and developing countries \"Change Management\" was most important factor and in developed...

    Provided By University of Iowa

  • White Papers // Nov 2010

    Automobile Bankruptcies, Retiree Benefits, And The Futility Of Springing Priorities In Chapter 11 Reorganizations

    The strategic use of section 363 asset sales in reorganization cases is becoming so common that some courts and commentators predict that the asset-sale route to a chapter 11 plan confirmation may soon supplant the traditional chapter 11 plan processes. While some have decried section 363 sales as contrary to...

    Provided By University of Iowa

  • White Papers // Feb 2010

    Work Redesign Model: Improving Organizational Effectiveness

    The decision to execute the concept of work redesign is challenging. It must involve top management who are visionary, persuasive, and consistent. The need for work redesign may be initiated by financial challenges, often a reduced budget. Other reasons include: Strategic planning demonstrates the need for a change, leadership sees...

    Provided By University of Iowa

  • White Papers // Feb 2010

    Trade, Urbanization And Capital Accumulation In A Labor Surplus Economy

    In many developing countries there are abundant supplies of "Surplus labor" from rural areas. The authors examine in a simple, dynamic framework how the existence of this large supply of rural unskilled labor affects trade, urbanization, capital accumulation, factor returns, as well as sectoral and aggregate output and social welfare....

    Provided By University of Iowa

  • White Papers // May 2009

    Trade Agreements

    This paper reviews the most significant recent developments in the theory of trade agreements. The paper offers an integrated approach to evaluating trade agreements, and uses the approach to present results on preferential and multilateral trade agreements. The paper identifies also several questions for further research. The topic of trade...

    Provided By University of Iowa

  • White Papers // May 2009

    The Cost of Financial Distress And The Timing Of Default

    At any point in time, most firms are not in financial distress. This implies that they must suffer value losses unrelated to their leverage-economic shocks-before becoming financially distressed. They show that if estimates of ex-ante financial distress costs are not filtered from the effects of future economic shocks, they are...

    Provided By University of Iowa

  • White Papers // Feb 2009

    Forecasting Household Response in Database Marketing: A Latent Trait Approach

    Database marketers often select households for individual marketing contacts using information on past purchase behavior. One of the most common methods, known as RFM variables approach, ranks households according to three criteria: the recency of the latest purchase event, the long-run frequency of purchases, and the cumulative dollar expenditure. The...

    Provided By University of Iowa

  • White Papers // Jan 2009

    Team Building Skills

    Interest in team-building has grown from being looked upon as a "Nice-to-have" quality of a work group where employees get along with their coworkers, to an essential ingredient of highly productive organizations. Yet saying team building is important does not guarantee a positive outcome. One of the hardest skills for...

    Provided By University of Iowa

  • White Papers // Jan 2009

    International Trade And The Feasibility Of Global Climate Change Agreements

    Country incentives to participate in cooperative arrangements which either fully or partially internalize climate change externality from carbon emissions involve critical asymmetries. Small countries trade off own country costs of carbon mitigation actions against their own benefits from global improvement in climate which benefit all. Small countries thus have limited...

    Provided By University of Iowa

  • White Papers // Nov 2011

    Wing+ Web-Application Development Framework

    Nowadays, web development has been expanded greatly, not only for ordinary reasons, but also for enterprise and other important purposes. So it's obvious that there would be some challenges and problems if the users want to develop important applications such as an automation system on the web. Some of the...

    Provided By University of Iowa

  • White Papers // Nov 2012

    On the Achievable Bit Rates of DSL Vectoring Techniques in the Presence of Alien Crosstalkers

    Different pre-coder and equalizer structures have been proposed in literature for vectored Digital Subscriber Lines (DSLs). In this paper, the authors assess the relative merit of advanced complex pre-coders and equalizers in practical DSL scenarios. Using extensive computer simulations, the achievable bit rates are investigated in the presence of alien...

    Provided By University of Iowa

  • White Papers // Jan 2009

    Team Building Skills

    Interest in team-building has grown from being looked upon as a "Nice-to-have" quality of a work group where employees get along with their coworkers, to an essential ingredient of highly productive organizations. Yet saying team building is important does not guarantee a positive outcome. One of the hardest skills for...

    Provided By University of Iowa

  • White Papers // Feb 2010

    Work Redesign Model: Improving Organizational Effectiveness

    The decision to execute the concept of work redesign is challenging. It must involve top management who are visionary, persuasive, and consistent. The need for work redesign may be initiated by financial challenges, often a reduced budget. Other reasons include: Strategic planning demonstrates the need for a change, leadership sees...

    Provided By University of Iowa

  • White Papers // Nov 2010

    Automobile Bankruptcies, Retiree Benefits, And The Futility Of Springing Priorities In Chapter 11 Reorganizations

    The strategic use of section 363 asset sales in reorganization cases is becoming so common that some courts and commentators predict that the asset-sale route to a chapter 11 plan confirmation may soon supplant the traditional chapter 11 plan processes. While some have decried section 363 sales as contrary to...

    Provided By University of Iowa

  • White Papers // Feb 2009

    Forecasting Household Response in Database Marketing: A Latent Trait Approach

    Database marketers often select households for individual marketing contacts using information on past purchase behavior. One of the most common methods, known as RFM variables approach, ranks households according to three criteria: the recency of the latest purchase event, the long-run frequency of purchases, and the cumulative dollar expenditure. The...

    Provided By University of Iowa

  • White Papers // Jan 2011

    Altruistic Routing in Structured P2P Networks

    Request patterns in P2P networks are not uniform, and the cost of communication depends on the traffic flows among peers. This paper illustrates how the processes in an overlay network can use the information about traffic flow pattern to modify their routing tables and minimize their communication costs. Two different...

    Provided By University of Iowa

  • White Papers // Feb 2010

    Trade, Urbanization And Capital Accumulation In A Labor Surplus Economy

    In many developing countries there are abundant supplies of "Surplus labor" from rural areas. The authors examine in a simple, dynamic framework how the existence of this large supply of rural unskilled labor affects trade, urbanization, capital accumulation, factor returns, as well as sectoral and aggregate output and social welfare....

    Provided By University of Iowa

  • White Papers // May 2009

    Trade Agreements

    This paper reviews the most significant recent developments in the theory of trade agreements. The paper offers an integrated approach to evaluating trade agreements, and uses the approach to present results on preferential and multilateral trade agreements. The paper identifies also several questions for further research. The topic of trade...

    Provided By University of Iowa

  • White Papers // Feb 2011

    Globalisation, Gender And Growth

    The authors consider the effect of globalization on fertility, human capital and growth. They view globalization as creating market opportunities for employment in less developed countries. They construct a specific model of household decision making, drawing on empirical observations in the development economics literature, and show that if the market...

    Provided By University of Iowa

  • White Papers // Jan 2009

    International Trade And The Feasibility Of Global Climate Change Agreements

    Country incentives to participate in cooperative arrangements which either fully or partially internalize climate change externality from carbon emissions involve critical asymmetries. Small countries trade off own country costs of carbon mitigation actions against their own benefits from global improvement in climate which benefit all. Small countries thus have limited...

    Provided By University of Iowa

  • White Papers // Apr 2011

    Feature Guided Motion Artifact Reduction With Structure-Awareness in 4D CT Images

    In this paper, the authors propose a novel method to reduce the magnitude of 4D CT artifacts by stitching two images with a data-driven regularization constrain, which helps preserve the local anatomy structures. Their method first computes an interface seam for the stitching in the overlapping region of the first...

    Provided By University of Iowa

  • White Papers // May 2009

    The Cost of Financial Distress And The Timing Of Default

    At any point in time, most firms are not in financial distress. This implies that they must suffer value losses unrelated to their leverage-economic shocks-before becoming financially distressed. They show that if estimates of ex-ante financial distress costs are not filtered from the effects of future economic shocks, they are...

    Provided By University of Iowa

  • White Papers // Mar 2012

    On the Mixing Time of Markov Chain Monte Carlo for Integer Least-Square Problems

    In this paper, the authors study the mixing time of Markov Chain Monte Carlo (MCMC) for integer Least-Square (LS) optimization problems. It is found that the mixing time of MCMC for integer LS problems depends on the structure of the underlying lattice. More specifically, the mixing time of MCMC is...

    Provided By University of Iowa

  • White Papers // Aug 2012

    Carrier Sense Multiple Access Tuning Parameters Using Game Theory

    Ad Hoc and Mesh networks are good samples of multi agent systems, where their nodes access the channel through carrier sense multiple access method, while a node channel access influence the access of neighbor nodes to the channel. Hence, game theory is a strong tool for studying this kind of...

    Provided By University of Iowa

  • White Papers // Aug 2012

    Deadlock Recovery Technique in Bus Enhanced NoC Architecture

    Increase in the speed of processors has led to crucial role of communication in the performance of systems. As a result, routing is taken into consideration as one of the most important subjects of the Network on Chip architecture. Routing algorithms to deadlock avoidance prevent packets route completely based on...

    Provided By University of Iowa

  • White Papers // May 2012

    Optimal Dynamic Spectrum Management for DSL Interference/Broadcast Channel

    In this paper, the authors consider optimal Dynamic Spectrum Management (DSM) for a DownStream (DS) DSL scenario in which users are divided into a few separate groups, where vector encoding based signal coordination can be applied in each group and spectrum coordination is possible for all users. This can be...

    Provided By University of Iowa

  • White Papers // Jul 2011

    Using Artificial Immune System and Fuzzy Logic for Alert Correlation

    One of the most important challenges facing the Intrusion Detection Systems (IDSs) is the huge number of generated alerts. A system administrator will be overwhelmed by these alerts in such a way that she/he cannot manage and use the alerts. The best-known solution is to correlate low-level alerts into a...

    Provided By University of Iowa

  • White Papers // Mar 2013

    Non-isomorphic Biclique Cryptanalysis and its Application to Full-Round mCrypton

    Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to analyze the full-round AES cipher in a single key scenario. In this paper, the authors introduce...

    Provided By University of Iowa

  • White Papers // Aug 2013

    Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

    Capturing is the first step in Intrusion Detection System (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system's environment to the user's environment are some of the system characteristics. If these requirements are not met, packet capture...

    Provided By University of Iowa

  • White Papers // Dec 2010

    A Comparative Study of Critical Success Factors (CSFs) in Implementation of ERP in Developed and Developing Countries

    This paper is to understand is there any difference between ERP implementation's CSF in developed and developing countries? Understanding this subject can help one to implement ERP systems properly in developing nations. This research showed that in developed and developing countries \"Change Management\" was most important factor and in developed...

    Provided By University of Iowa

  • White Papers // Nov 2013

    Providing Security in Granting Agency Using Workflow CRBAC Model

    There have been many security solutions to secure representation in the work flow used in business processes and grid networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base Access Control (CRBAC) is one...

    Provided By University of Iowa

  • White Papers // Mar 2011

    Relationship between Knowledge Management Process and Creativity among Faculty Members in the University

    The recognition of knowledge and creativity as key strategic assets are very popular today. The purpose of this research was to study the relationship between Knowledge Management (KM) process and creativity among faculty members in the University. The research hypotheses were examined while considering KM process dimensions including Socialization, Combination,...

    Provided By University of Iowa

  • White Papers // Dec 2012

    Designing a Model for Processes Reengineering through Applying Agility Enterprise Architecture Framework and Priority of its Implementation Phases

    In the current condition of the world and with regards to the world competition, organizational existence has become the most important problem of the managers. The success secret of current organizations depends on setting their ultimate goals and objectives outside of the organization. In another word, in a safe organization,...

    Provided By University of Iowa