University of New South Wales

Displaying 1-40 of 116 results

  • White Papers // Jul 2012

    Game Theory for Wireless Sensor Networks: A Survey

    Game Theory (GT) is a mathematical method that describes the phenomenon of conflict and cooperation between intelligent rational decision-makers. In particular, the theory has been proven very useful in the design of Wireless Sensor Networks (WSNs). This paper surveys the recent developments and findings of GT, its applications in WSNs,...

    Provided By University of New South Wales

  • White Papers // Jun 2012

    Decorrelating Secret Bit Extraction Via Channel Hopping in Body Area Networks

    Recent research has demonstrated that two communicating parties can generate shared secret keys by exploiting characteristics of the wireless fading channel between them. These channel characteristics are symmetric, dependent on position and orientation, highly sensitive to motion, and cannot be deduced in detail by an eavesdropper. One problem with this...

    Provided By University of New South Wales

  • White Papers // Apr 2012

    An Energy Consumption Model for Energy Efficient Ethernet Switches

    Ethernet is one of the first computer networking technologies for which a standard has been developed to improve its energy efficiency. The energy efficient Ethernet (IEEE 802.3az) standard was approved in 2010 and is expected to enable savings of several Terawatt Hours (TWh) per year. As switches that implement the...

    Provided By University of New South Wales

  • White Papers // Apr 2012

    Complete Life-Cycle Assessment of the Energy/CO2 Costs of Videoconferencing Vs Face-to-Face Meetings

    While video conferencing is often viewed as a greener alternative to physically travelling for face-to-face meetings, it has its own energy and carbon dioxide costs. In this paper, the authors present the first analysis of the total cost of videoconferencing, including network plus videoconferencing equipment operating costs, and Life-Cycle Assessment...

    Provided By University of New South Wales

  • White Papers // Apr 2012

    An Information Theoretic Location Verification System for Wireless Networks

    As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper, the authors propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework they develop illustrates how the threshold used in the detection of a spoofed...

    Provided By University of New South Wales

  • White Papers // Apr 2012

    A Novel Unbalanced Tree Structure for Low-Cost Authentication of Streaming Content on Mobile and Sensor Devices

    The authors consider stored content being streamed to a resource-poor device (such as a sensor node or a mobile phone), and address the issue of authenticating such content in real-time at the receiver. Per-packet digital signatures incur high computational cost, while per-block signatures impose high delays. A Merkle hash tree...

    Provided By University of New South Wales

  • White Papers // Apr 2012

    Authentication of Lossy Data in Body-Sensor Networks for Healthcare Monitoring

    Growing pressures on healthcare costs are spurring development of lightweight body-worn sensors for real-time and continuous physiological monitoring. Data from these sensors is streamed wirelessly to a handheld device such as a mobile phone, and then archived over the Internet at a central database. Authenticating the data is vital to...

    Provided By University of New South Wales

  • White Papers // Mar 2012

    Mobile P2P Trusted On-Demand Video Streaming

    The authors propose to demonstrate a mobile server assisted P2P system for on-demand video streaming. Their proposed solution uses a combination of 3G and ad-hoc Wi-Fi connections, to enable mobile devices to download content from a centralised server in a way that minimises the 3G bandwidth use and cost. On...

    Provided By University of New South Wales

  • White Papers // Jan 2012

    A Performance Comparison of Data Dissemination Protocols for Wireless Sensor Networks

    In recent years a variety of new data dissemination protocols have been developed specifically for Wireless Sensor Networks (WSN), but no realistic performance comparison between them has been attempted. This paper reports on the results of a simulation comparison made by an independent researcher using the ns-2.26 simulator for the...

    Provided By University of New South Wales

  • White Papers // Jan 2012

    The Holes Problem in Wireless Sensor Networks: A Survey

    Several anomalies can occur in wireless sensor networks that impair their desired functionalities i.e., sensing and communication. Different kinds of holes can form in such networks creating geographically correlated problem areas such as coverage holes, routing holes, jamming holes, sink/black holes and worm holes, etc. The authors detail in this...

    Provided By University of New South Wales

  • White Papers // Oct 2011

    On the Energy-Efficiency of a Packet-Level FEC Based Bufferless Core Optical Network

    The authors proposed packet-level Forward Error Correction (FEC) as a promising technique for enabling buffer-less core optical networks. In this paper, they systematically analyze its energy-efficiency and show that it can produce substantial power savings. Improving the energy-efficiency of core routers has attracted widespread attention over the past few years....

    Provided By University of New South Wales

  • White Papers // Jul 2011

    Environmental Context Aware Trust in Mobile P2P Networks

    With the growing popularity and capabilities of mobile devices, peer-to-peer networking among such devices is increasingly of interest for mobile content sharing. One of the major challenges in practical use of Mobile Peer-To-Peer networks (MP2P) is the trust among peers. Traditionally, solutions in the state of the art have focused...

    Provided By University of New South Wales

  • White Papers // Jun 2011

    Role of Knowledge Sourcing in Albanian Small and Medium-Sized Enterprises

    Knowledge sourcing can contribute to the growth and development of Small and Medium sized Enterprises (SMEs) in developing countries such as Albania. The role of knowledge sourcing in knowledge sharing and management has not been explored to a great extent, especially in the context of developing countries. SMEs constitute a...

    Provided By University of New South Wales

  • White Papers // Jun 2011

    Optimal Dividend Control For A Generalized Risk Model With Investment Incomes And Debit Interest

    This paper investigates dividend optimization of an insurance corporation under a more realistic model which takes into consideration refinancing or capital injections. The model follows the compound Poisson framework with credit interest for positive reserve, and debit interest for negative reserve. Ruin occurs when the reserve drops below the critical...

    Provided By University of New South Wales

  • White Papers // May 2011

    Trust-Based Content Distribution for Mobile Ad Hoc Networks

    Mobile ad hoc networks will enable future mobile users to share and distribute content using direct mobile-to-mobile wireless connections. Since such networks will need to be based on an open environment, selecting the appropriate nodes for interactions is a major challenge, especially when some of the nodes may be misbehaving....

    Provided By University of New South Wales

  • White Papers // May 2011

    Empirical Prediction Models for Adaptive Resource Provisioning in the Cloud

    Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates cloud from the traditional computing paradigm. However, initializing a new virtual instance in cloud is not instantaneous; the cloud hosting platforms introduce several minutes delay in the hardware resource allocation. In this...

    Provided By University of New South Wales

  • White Papers // Apr 2011

    Provable Security: How Feasible Is It?

    For mainstream operating systems the community has given up on strong security. One can graft mandatory access control onto Linux, or try to harden Windows NT, but people are in no position to get to provable or even just assurable security of such OSes in the next 20 years. There...

    Provided By University of New South Wales

  • White Papers // Mar 2011

    Size Estimation of Cloud Migration Projects With Cloud Migration Point (CMP)

    One of the major obstacles to enterprise adoption of cloud technologies has been the lack of visibility into migration effort and cost. In this paper, the authors present a methodology, called Cloud Migration Point (CMP), for estimating the size of cloud migration projects, by recasting a well-known software size estimation...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    Symmetry Breaking for Distributed Multi-Context Systems

    Heterogeneous nonmonotonic Multi-Context Systems (MCSs) permit different logics to be used in different contexts, and link them via bridge rules. The authors investigate the role of symmetry detection and symmetry breaking in such systems to eliminate symmetric parts of the search space and, thereby, simplify the evaluation process. They propose...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    An Adaptive Algorithm for Compressive Approximation of Trajectory (AACAT) for Delay Tolerant Networks

    Highly efficient compression provides a promising approach to address the transmission and computation challenges imposed by moving object tracking applications on resource constrained Wireless Sensor Networks (WSNs). In this paper, the authors propose and design a Compressive Sensing (CS) based trajectory approximation algorithm, Adaptive Algorithm for Compressive Approximation of Trajectory...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    Autonomic Business-Driven Decision Making for Adaptation of Web Service Compositions

    Runtime adaptation of Web service compositions can usually be done in several ways, so it is necessary to decide which adaptation approach to take. The PhD research presented in this paper provides a novel decision making approach, new management algorithms, and a middleware architecture for runtime adaptation of Web service...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    Xstream-X264: Real-Time H.264 Streaming With Cross-Layer Integration

    The authors present Xstream-x264: a real-time cross-layer video streaming technique implemented within a well known open-source H.264 video encoder tool x264 for on-line video quality evaluation experiments. Xstream-x264 uses the transport protocol provided indication of the available data rate for corresponding adjustments in the video encoder. They discuss the design,...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    A Decade of Database Research Publications

    The authors analyze the database research publications of four major core database technology conferences (SIGMOD, VLDB, ICDE, EDBT), two main theoretical database conferences (PODS, ICDT) and three database journals (TODS, VLDB Journal, TKDE) over a period of 10 years (2001 - 2010). The analysis considers only regular papers as the...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    Support for Concurrent Adaptation of Multiple Web Service Compositions to Maximize Business Metrics

    Runtime adaptation of Web service compositions can often be done in several ways, so it is necessary to decide which adaptation approach to take. While many research projects studied runtime adaptation of Web service compositions or business processes, this paper presents the unique solutions that maximize business metrics, in cases...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    On the Algorithms Related to Threshold Cryptography Based Network Protocols

    In this paper, the authors analyzed the algorithms related to threshold cryptography based protocols in networks security. They showed the hardness of threshold minimum cut problem, revealed its relationship with two other problems. Two approximation algorithms for threshold minimum cut were presented. They also show the hardness of determining the...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    Data Consistency Properties and the Trade-Offs in Commercial Cloud Storages: The Consumers' Perspective

    A new class of data storage systems, called NoSQL (Not only SQL), has emerged to complement traditional database systems, with rejection of general ACID transactions as one common feature. Different platforms, and indeed different primitives within one NoSQL platform, can offer various consistency properties, from Eventual Consistency to single-entity ACID....

    Provided By University of New South Wales

  • White Papers // Jan 2011

    Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services

    The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations. Unfortunately, as Web services are often autonomous and heterogeneous entities, connecting and coordinating them in order to build integrated services is a delicate and time-consuming...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    A Two-Tier Mobility Generator for Wireless Simulations

    While it is crucial to test and evaluate protocol implementations in a real testbed environment, simulations are still commonly used as a first step in any protocol development for wireless network research. One of the most important parameters in simulating wireless ad-hoc networks is the node mobility. It is important...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    An MDP-Based Approach for Multipath Data Transmission Over Wireless Networks

    Maintaining performance and reliability in wireless networks is a challenging task due to the nature of wireless channels. Multipath data transmission has been used in wired scenarios to reduce latency, improve throughput, and - when/where possible - balance the load. In this paper, the authors propose an approach for multipath...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    A Communication Paradigm for Hybrid Sensor/actuator Networks

    This paper investigates an anycast communication paradigm for a hybrid sensor/actuator network, consisting of both resource-rich and resource-impoverished devices. The key idea is to exploit the capabilities of resource-rich devices (called micro-servers) to reduce the communication burden on smaller, energy, bandwidth and memory constrained sensor nodes. The goal is to...

    Provided By University of New South Wales

  • White Papers // Dec 2010

    Fast and Tiny Structural Self-Indexes for XML

    XML document markup is highly repetitive and therefore well compressible using dictionary-based methods such as DAGs or grammars. In the context of selectivity estimation, grammar-compressed trees were used before as synopsis for structural XPath queries. Here a fully-fledged index over such grammars is presented. The index allows to execute arbitrary...

    Provided By University of New South Wales

  • White Papers // Dec 2010

    Profiling Per-Packet and Per-Byte Energy Consumption in the NetFPGA Gigabit Router

    Improving energy efficiency of Internet equipment is becoming an increasingly important research topic, motivated by the need to reduce energy costs (and Carbon footprint) for Internet Service Providers, as well as increase power density to achieve more switching capacity per-rack. While recent research has profiled the power consumption of commercial...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    Improving International Comparisons Of Real Output: The ICP 2005 Benchmark And Its Implications For China

    The latest round of the International Comparisons Program (ICP 2005) compares the purchasing power of currencies and real output of 146 countries. Using price quote data from nine countries in the Asia-Pacific region, the authors consider ways of improving the methods used in ICP 2005 and new applications of these...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    Stochastic Skyline Operator

    In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, the skyline in a multi-dimensional space provides the minimum set of candidates for such purposes by removing all points not preferred by any...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    An Empirical Model of Power Consumption in the NetFPGA Gigabit Router

    Sustained exponential bandwidth growth of the Internet is threatened by concomitant increase in power requirements of network switches and routers. Recently, researchers have profiled the energy demand of commercial routing platforms and proposed ways to reduce network power consumption. However, the profiles are coarse-grained, and the platforms are inflexible for...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    Gaussian Processes Techniques for Wireless Communications

    Bayesian filtering is a general framework for recursively estimating the state of a dynamical system. Classical solutions such that Kalman filter and Particle filter are introduced in this report. Gaussian processes have been introduced as a non-parametric technique for system estimation from supervision learning. For this project, the authors intend...

    Provided By University of New South Wales

  • White Papers // Oct 2010

    Abstraction for Epistemic Model Checking of Dining Cryptographers-Based Protocols

    The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge. This result can be...

    Provided By University of New South Wales

  • White Papers // Oct 2010

    Secret Key Generation Rate Vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks

    In this paper, the authors investigate the feasibility of real-time derivation of cryptographic keys in body area networks using unique characteristics of the underlying wireless channel. They perform experiments to confirm that motion does indeed provide significant highly correlated randomness on either end of the wireless link between base-station and...

    Provided By University of New South Wales

  • White Papers // Oct 2010

    An Empirical Study Into Adaptive Resource Provisioning in the Cloud

    Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates cloud from the traditional computing paradigm. However, initializing a new virtual instance in cloud is not instantaneous; the cloud hosting platforms introduce significant delay in the hardware resource allocation. In this paper,...

    Provided By University of New South Wales

  • White Papers // Oct 2010

    TARo: Trusted Anonymous Routing for MANETs

    The currently proposed anonymous routing mechanisms for mobile ad hoc networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to...

    Provided By University of New South Wales

  • White Papers // Jun 2011

    Role of Knowledge Sourcing in Albanian Small and Medium-Sized Enterprises

    Knowledge sourcing can contribute to the growth and development of Small and Medium sized Enterprises (SMEs) in developing countries such as Albania. The role of knowledge sourcing in knowledge sharing and management has not been explored to a great extent, especially in the context of developing countries. SMEs constitute a...

    Provided By University of New South Wales

  • White Papers // Apr 2009

    Land Vehicle Navigation With the Integration of GPS and Reduced - INS: Performance Improvement With Velocity Aiding

    Land vehicle navigation is currently dominated by Global Positioning System (GPS). However, stand-alone GPS suffers from a number of limitations in terms of absolute accuracy, shadowing and multipath effects, so significant efforts have been made to improve stand-alone GPS performance by integrating additional sensors. Inertial sensors are the first choice...

    Provided By University of New South Wales

  • White Papers // Apr 2009

    Markov Chain, Monte Carlo Global Search and Integration for Bayesian, GPS, Parameter Estimation

    Bayesian estimation techniques are applied to the problem of time and frequency offset estimation for Global Positioning System receivers. The estimation technique employs Markov Chain Monte Carlo (MCMC) to estimate unknown system parameters, utilizing a novel, multi-dimensional, Bayesian, global optimization strategy for initializing a Metropolis-Hastings proposal distribution. The technique enables...

    Provided By University of New South Wales

  • White Papers // Dec 2008

    The Impact of the Sarbanes-Oxley Act on Australian Listed Firms

    In the wake of a series of corporate and accounting scandals, the US government enacted the Sarbanes-Oxley Act (2002) (SOX) to improve corporate governance practices. Significantly, foreign registrants traded on US stock exchanges are also required to comply with SOX. This study assesses the incremental impact of the SOX legislation...

    Provided By University of New South Wales

  • White Papers // Aug 2009

    How Poisson Is TCP Traffic at Short Time-Scales in a Small Buffer Core Network?

    There is widespread debate regarding the nature of TCP traffic in today's Internet - while some researchers have shown that it exhibits Long-Range Dependent (LRD) properties, others argue that it can be modelled as a Poisson process due to the high degree of traffic aggregation that exists in the core....

    Provided By University of New South Wales

  • White Papers // Jan 2010

    The Relationship Between Commitment And Organizational Culture, Subculture, Leadership Style

    The concept of organizational commitment has been examined extensively in organizational literature, yet the relationships between organizational culture, subculture and commitment have received little attention so far. Acknowledging the complexity and the multifaceted nature of antecedents involved in organizational commitment, it is still necessary to understand the dynamics of relationships...

    Provided By University of New South Wales

  • White Papers // Nov 2008

    Reasonable Foreseeability in Information Security Law: A Forensic Analysis

    Information is the lifeblood of modern society. Businesses, non-profit organizations, and government agencies regularly compile and maintain electronic databases of information about individuals who interact with these institutions. Computerized data include contact information, personal histories, financial records, and official identifiers such as social security numbers. This wealth of information allows...

    Provided By University of New South Wales

  • White Papers // Nov 2009

    Equality And Diversity Discourse: A Cross-Sectoral Comparison Of Organizations In Australia

    It has been acknowledged that gender discourse in organizations has shifted from Affirmative Action (AA), to Equal Employment Opportunity (EEO), onto Diversity Management (Edelman, Fuller and Mara-Drita 2001; Kelly and Dobbin 1998; Liff 1999; Sinclair 2000; Smithson and Stockoe 2005; Strachan Burgess and Sullivan 2004). Edelman et al. (2001), conceptualise...

    Provided By University of New South Wales

  • White Papers // Feb 2010

    Cerveceria Cauhtemoc-Moctezuma: Selecting Countries For A Global Expansion Effort

    The literature describes an extensive list of factors that companies take into account to target countries for international expansion (Grant, 2008; Johnson, Scholes & Whittington, 2008). However, there are no known studies of how companies actually determine country priorities for internationalizing based on their own individual objectives and strategies. This...

    Provided By University of New South Wales

  • White Papers // Jan 2011

    Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services

    The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations. Unfortunately, as Web services are often autonomous and heterogeneous entities, connecting and coordinating them in order to build integrated services is a delicate and time-consuming...

    Provided By University of New South Wales

  • White Papers // Dec 2009

    Outdoor Localization of a WiFi Source With Unknown Transmission Power

    One threat to the reliability of GNSS systems is RF interference. One possibility for localising interference sources is to take received signal strength (RSS) measurements. To explore this scenario a sensor network is created in a 140m2 outdoor environment using a number of Wi-Fi stations that can measure the received...

    Provided By University of New South Wales

  • White Papers // May 2010

    An Analysis of Power Consumption in a Smartphone

    Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Good energy management requires a good understanding of where and how the energy is used. To this end the authors present a...

    Provided By University of New South Wales

  • White Papers // Jan 2009

    Design of Multi-Service Smart Card Systems for High Security and Performance

    Multi-service smart card system enables users to access different services over an open network with a single smart card. Due to its highly economic and social benefits, the multi-service smart card system has drawn much attention in industrial and academic areas. However, the big hindrance to its wide employment is...

    Provided By University of New South Wales

  • White Papers // Feb 2010

    A Dynamic Model Of Search And Intermediation

    This paper develops a dynamic model of an economy with search frictions in which homogeneous agents choose between specializing as producers or as merchants, and can change occupation at any time. Merchants operate alongside a decentralized search market and provide immediacy in trade in return for a price. Agents who...

    Provided By University of New South Wales

  • White Papers // Jan 2010

    Consistency Of Hedonic Price Indexes With Unobserved Characteristics

    Hedonic regressions are prone to omitted variable bias. The estimation of price relatives for new and disappearing goods using hedonic imputation methods involves taking ratios of hedonic models. This may lead to a situation where the omitted variable bias in each of the hedonic regressions o set each other. This...

    Provided By University of New South Wales

  • White Papers // Mar 2010

    A Spillover-Based Theory Of Credentialism

    The author proposes a model in which credentials, such as diplomas, are intrinsically valuable; a situation described as credentials. The model overcomes an important criticism of signaling models by mechanically tying a worker's wages to their productivity. A worker's productivity is influenced by the skills of their coworkers, where such...

    Provided By University of New South Wales

  • White Papers // Apr 2010

    Social Security Reform With Self-Control Preferences

    This paper analyzes a fully funded social security system under the assumption that agents face temptation issues. Agents are required to save through individually managed Personal Security Accounts without, and with mandatory annuitization. When the analysis is restricted to CBRA preferences the results are congruent with the literature in indicating...

    Provided By University of New South Wales

  • White Papers // Jun 2010

    Mutual Fund Style, Characteristic-Matched Performance Benchmarks And Activity Measures: A New Approach

    The authors propose a new approach for measuring mutual fund style and constructing characteristic-matched performance benchmarks that requires only portfolio holdings and two reference portfolios in each style dimension. The characteristic-matched performance benchmark literature typically follows a bottom-up approach by first matching individual stocks with benchmarks and then obtaining a...

    Provided By University of New South Wales

  • White Papers // Feb 2010

    Medical Consumption Over The Life Cycle: Facts From A U.S. Medical Expenditure Panel Survey

    In this paper the authors construct life-cycle profiles of health care spending and financing using data from the Medical Expenditure Panel Survey (MEPS). They separate pure age effects from time and cohort effects by estimating a semi nonparametric partial linear model. After controlling for time and cohort effects, they find...

    Provided By University of New South Wales

  • White Papers // Mar 2009

    Engineering Trust - Reciprocity In The Production Of Reputation Information

    Reciprocal feedback distorts the production and content of reputation information, hampering trust and trade efficiency. Data from eBay and other sources combined with laboratory data provide a robust picture of how reciprocity can be guided by changes in the way feedback information flows through the system, leading to more accurate...

    Provided By University of New South Wales

  • White Papers // Mar 2009

    Fertility Decisions And The Sustainability Of Dened Benet Pay-As-You-Go Pension Systems

    The sustainability of a Defined Benefit Pay-As-You-Go (DBPAYG) pension system is investigated in the context of an overlapping-generations model of endogenous fertility with heterogeneous agents. The model places particular emphasis on the time costs of child rearing. It illustrates the mechanism by which such a pension system can increase the...

    Provided By University of New South Wales

  • White Papers // Apr 2009

    Axiomatic Foundations Of Inefficiency Measurement On <Input, Output> Space

    The authors provide an axiomatic foundation for efficiency measurement in the full (input, output) space, referred to as "Graph efficiency" measurement by Fare, Grosskopf, and Lovell [1985]. They posit four types of axioms: indication, monotonicity, independence of units of measurement, and continuity. They analyze six well-known inefficiency indexes from the...

    Provided By University of New South Wales

  • White Papers // May 2009

    Public Sector Pension Policies And Capital Accumulation In Emerging Economies

    In many emerging economies pension programs of public sector workers are more generous than pension programs of private sector workers. In this paper the authors investigate public pension reforms that improve efficiency and welfare by reallocating government resources from non-productive public pensions to productive public education and infrastructure investments. They...

    Provided By University of New South Wales

  • White Papers // Mar 2009

    Quantifying Non-monotonicity In Productivity-Input Relations

    In this paper, the author presents a theory that unifies the role of demand and production to investigate conditions that make this relation a bell-shape. Under the optimality assumption and when establishments operate in the same market, the author quantifies a simple algebraic condition on demand and production elasticity's that...

    Provided By University of New South Wales

  • White Papers // Nov 2009

    Health Care Financing Over The Life Cycle, Universal Medical Vouchers And Welfare

    In this paper the authors develop a general equilibrium Overlapping Generations (OLG) model with health shocks to analyze the life-cycle pattern of insurance choice and health care spending. They use data from the Medical Expenditure Panel Survey (MEPS) and show that the model is able to match the life-cycle trends...

    Provided By University of New South Wales

  • White Papers // Nov 2009

    Variable Capacity Utilization, Ambient Temperature Shocks And Generation Asset Valuation

    This paper discusses generation asset valuation in a framework where capital utilization decisions are endogenous. The authors use real options approach for valuation of natural gas fueled turbines. Capital utilization choices that they explore include turning on/off the unit, operating the unit at increased firing temperatures (overfiring), and conducting preventive...

    Provided By University of New South Wales

  • White Papers // Sep 2008

    Children As Family Public Goods: Some Implications For Fertility

    A two-stage bargaining model is developed to describe how fertility decisions are made in a strategic family setting. Given the assumption that family contracts are incomplete and cannot be used to enforce optimal behavior, it is shown that investments in children may be sub-optimal. This is because the woman may...

    Provided By University of New South Wales

  • White Papers // Oct 2008

    International Reserves, Growth And Effective Demand

    During the Last Decade, Developing (and Some Developed) Economies Have Accumulated Large Amounts of International Reserves, Mainly for Precautionary Reasons. This Phenomenon Has Been Coupled With Moderate Economic Growth. The Resources Being Amassed Largely Overwhelm Protective Needs, There Is an Excess of Resources That Is Being Wasted, and Which Could...

    Provided By University of New South Wales

  • White Papers // Oct 2008

    Privatization In A Small Open Economy With Imperfect Competition

    The authors look at privatization in a general equilibrium model of a small, tariff-distorted, open economy. There is a differentiated good produced by both private and public sector enterprises. A reduction in government production in order to cut losses from such production raises the returns to capital and increases the...

    Provided By University of New South Wales

  • White Papers // Oct 2008

    Out-Of-Sample Comparison Of Copula Specifications In Multivariate Density Forecasts

    The authors introduce a statistical test for comparing the predictive accuracy of competing copula specifications in multivariate density forecasts, based on the Kullback-Leibler Information Criterion (KLIC). The test is valid under general conditions: in particular it allows for parameter estimation uncertainty and for the copulas to be nested or no...

    Provided By University of New South Wales

  • White Papers // Dec 2008

    Labour Market Dynamics In Australia: What Drives Unemployment?

    The debate in Australia on the (constant-output) elasticity of labor demand with respect to wages has wrongly sidelined the role of capital stock as a determinant of employment (Webster, 2003). As far back as 1991, Pissarides had argued that the influence of capital stock on the performance of the labor...

    Provided By University of New South Wales

  • White Papers // Feb 2011

    A Decade of Database Research Publications

    The authors analyze the database research publications of four major core database technology conferences (SIGMOD, VLDB, ICDE, EDBT), two main theoretical database conferences (PODS, ICDT) and three database journals (TODS, VLDB Journal, TKDE) over a period of 10 years (2001 - 2010). The analysis considers only regular papers as the...

    Provided By University of New South Wales

  • White Papers // Dec 2010

    Fast and Tiny Structural Self-Indexes for XML

    XML document markup is highly repetitive and therefore well compressible using dictionary-based methods such as DAGs or grammars. In the context of selectivity estimation, grammar-compressed trees were used before as synopsis for structural XPath queries. Here a fully-fledged index over such grammars is presented. The index allows to execute arbitrary...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    Gaussian Processes Techniques for Wireless Communications

    Bayesian filtering is a general framework for recursively estimating the state of a dynamical system. Classical solutions such that Kalman filter and Particle filter are introduced in this report. Gaussian processes have been introduced as a non-parametric technique for system estimation from supervision learning. For this project, the authors intend...

    Provided By University of New South Wales

  • White Papers // May 2009

    Causing Communication Closure: Safe Program Composition With Reliable Non-FIFO Channels

    A semantic framework for analyzing safe composition of distributed programs is presented. Its applicability is illustrated by a study of program composition when communication is reliable but not necessarily FIFO. In this model, special care must be taken to ensure that messages do not accidentally overtake one another in the...

    Provided By University of New South Wales

  • White Papers // Oct 2010

    Abstraction for Epistemic Model Checking of Dining Cryptographers-Based Protocols

    The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge. This result can be...

    Provided By University of New South Wales

  • White Papers // Oct 2008

    Peer Effects And The Promise Of Social Mobility: A Model Of Human Capital Investment

    The author analyzes a model of human capital development in the presence of peer effects. Parents invest in their child, and this investment conveys a positive externality upon the Childs peers. Parents also acquire wealth, which finances consumption, and determines a Childs peer group. The author shows how the freedom...

    Provided By University of New South Wales

  • White Papers // Nov 2010

    Improving International Comparisons Of Real Output: The ICP 2005 Benchmark And Its Implications For China

    The latest round of the International Comparisons Program (ICP 2005) compares the purchasing power of currencies and real output of 146 countries. Using price quote data from nine countries in the Asia-Pacific region, the authors consider ways of improving the methods used in ICP 2005 and new applications of these...

    Provided By University of New South Wales

  • White Papers // Jul 2009

    Topology Discovery Using Cisco Discovery Protocol

    In this paper the authors address the problem of discovering network topology in proprietary networks. Namely, they investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. They first compare properties of topologies that can be obtained from networks deploying CDP...

    Provided By University of New South Wales

  • White Papers // Jul 2009

    Restart Strategy Selection Using Machine Learning Techniques

    Restart strategies are an important factor in the performance of conflict-driven Davis Putnam style SAT solvers. Selecting a good restart strategy for a problem instance can enhance the performance of a solver. Inspired by recent success applying machine learning techniques to predict the runtime of SAT solvers, the authors present...

    Provided By University of New South Wales