University of Rhode Island

Displaying 1-13 of 13 results

  • White Papers // Oct 2012

    Pseudo-Scheduling: A New Approach to the Broadcast Scheduling Problem

    The broadcast scheduling problem asks how a multi-hop network of broadcast transceivers operating on a shared medium may share the medium in such a way that communication over the entire network is possible. This can be naturally modeled as a graph coloring problem via distance-2 coloring (L(1, 1)-labeling, strict scheduling)....

    Provided By University of Rhode Island

  • White Papers // Dec 2010

    Corporate Ownership, Debt, And Expropriation: Evidence From China

    The authors provide direct evidence on the dark side of leverage and offer new insights regarding the role of debt in corporate governance. Using a sample of Chinese state-owned enterprises that have experienced a transfer of controlling rights, they find a positive and significant relationship between expropriation and debt usage....

    Provided By University of Rhode Island

  • White Papers // Jul 2010

    Financial Crisis And The Market Efficiency In The Chinese Equity Markets

    The authors examine the behavior of the Chinese equity markets to determine whether the equity markets are efficient or not. A previously unexplored data base provides the source for observing market behavior of the two principle equity market in China. These markets have unique characteristics different from those in the...

    Provided By University of Rhode Island

  • White Papers // Jun 2010

    Securing Collaborative Spectrum Sensing Against Untrustworthy Secondary Users in Cognitive Radio Networks

    Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their...

    Provided By University of Rhode Island

  • White Papers // Apr 2010

    Adaptive Dual Network Design for a Class of SIMO Systems With Nonlinear Time-Variant Uncertainties

    A novel adaptive dual network design consisting of a Rough Adjustment Network (RAN) and a Fine Adjustment Network (FAN) is proposed to eliminate the unknown time-variant uncertainties of servo system. To accomplish this objective, a RAN is proposed based on the combination of sliding mode control, function approximation, and error...

    Provided By University of Rhode Island

  • White Papers // Mar 2010

    Secure Adaptive Routing Protocol for Wireless Sensor Networks

    This paper covers the first seven months of the progress towards the completion of SARP. In particular, the authors begin with stating the problem space, assumptions about sensor network deployment, and the attacks they considered. Next the authors in great detail explain the trust framework including the multi-dimensional trust metrics,...

    Provided By University of Rhode Island

  • White Papers // Jan 2010

    Cable Modem Vs. Traditional (Telephone) Modem

    In the 1960s, modems (Modulator-Demodulators) were developed to permit the transmission of digital signals over telephone lines. The modulator of a modem converts bits into sounds in the frequency range transmitted by the telephone lines, and the demodulator converts such sounds back into bits. Until recently, the only way to...

    Provided By University of Rhode Island

  • White Papers // Jan 2010

    Background Risk And Investment Risk: An Analysis Of Insurers? Corporate Bond Portfolios

    Theory suggests that investors facing more non-hedgeable background risk may behave as if they were more risk averse. In this paper, the authors investigate the background risk effect by examining how insurance business risk affects insurers' risk taking behavior in their corporate bond portfolios. They find that insurers with higher...

    Provided By University of Rhode Island

  • White Papers // Dec 2009

    Finance, Growth, And Volatility

    Empirical studies have not documented an unambiguous relationship between financial development and volatility of economic growth. Existing evidence of contemporaneous association is also insufficient to establish the direction of causality. This paper studies the time series relation between financial development, economic growth and growth volatility in one unified framework. Relying...

    Provided By University of Rhode Island

  • White Papers // Oct 2009

    Distributed Cooperative Transmission With Unreliable and Untrustworthy Relay Channels

    Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multi-user cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design....

    Provided By University of Rhode Island

  • White Papers // Jul 2009

    Scalability of Non-Intrusive Load Monitoring for Shipboard Applications

    The non-intrusive load monitor has been demonstrated - as an effective tool for evaluating and monitoring shipboard electro-mechanical systems through analysis of electrical power data. A key advantage of the nonintrusive approach is the ability to reduce sensor count by monitoring collections of loads. This paper reviews tradeoffs that affect...

    Provided By University of Rhode Island

  • White Papers // Jan 2006

    Analyzing the Processor Bottlenecks in SPEC CPU 2000

    The performance of a processor is limited by the specific bottlenecks that a benchmark exposes while running on that processor. Since the quantification of these bottlenecks can be extremely time-consuming, the authors' prior work proposed using the Plackett and Burman design as a statistically-rigorous, but time-efficient method of determining the...

    Provided By University of Rhode Island

  • White Papers // Oct 2001

    How to Clean Up an Oil Spill

    Oil is the most common pollutant in the oceans. More than 3 million metric tons of oil contaminates the sea every year. The majority of oil pollution in the oceans comes from land. Runoff and waste from cities, industry, and rivers carries oil into the ocean. Ships cause about a...

    Provided By University of Rhode Island

  • White Papers // Jan 2006

    Analyzing the Processor Bottlenecks in SPEC CPU 2000

    The performance of a processor is limited by the specific bottlenecks that a benchmark exposes while running on that processor. Since the quantification of these bottlenecks can be extremely time-consuming, the authors' prior work proposed using the Plackett and Burman design as a statistically-rigorous, but time-efficient method of determining the...

    Provided By University of Rhode Island

  • White Papers // Oct 2001

    How to Clean Up an Oil Spill

    Oil is the most common pollutant in the oceans. More than 3 million metric tons of oil contaminates the sea every year. The majority of oil pollution in the oceans comes from land. Runoff and waste from cities, industry, and rivers carries oil into the ocean. Ships cause about a...

    Provided By University of Rhode Island

  • White Papers // Apr 2010

    Adaptive Dual Network Design for a Class of SIMO Systems With Nonlinear Time-Variant Uncertainties

    A novel adaptive dual network design consisting of a Rough Adjustment Network (RAN) and a Fine Adjustment Network (FAN) is proposed to eliminate the unknown time-variant uncertainties of servo system. To accomplish this objective, a RAN is proposed based on the combination of sliding mode control, function approximation, and error...

    Provided By University of Rhode Island

  • White Papers // Jan 2010

    Cable Modem Vs. Traditional (Telephone) Modem

    In the 1960s, modems (Modulator-Demodulators) were developed to permit the transmission of digital signals over telephone lines. The modulator of a modem converts bits into sounds in the frequency range transmitted by the telephone lines, and the demodulator converts such sounds back into bits. Until recently, the only way to...

    Provided By University of Rhode Island

  • White Papers // Mar 2010

    Secure Adaptive Routing Protocol for Wireless Sensor Networks

    This paper covers the first seven months of the progress towards the completion of SARP. In particular, the authors begin with stating the problem space, assumptions about sensor network deployment, and the attacks they considered. Next the authors in great detail explain the trust framework including the multi-dimensional trust metrics,...

    Provided By University of Rhode Island

  • White Papers // Jul 2009

    Scalability of Non-Intrusive Load Monitoring for Shipboard Applications

    The non-intrusive load monitor has been demonstrated - as an effective tool for evaluating and monitoring shipboard electro-mechanical systems through analysis of electrical power data. A key advantage of the nonintrusive approach is the ability to reduce sensor count by monitoring collections of loads. This paper reviews tradeoffs that affect...

    Provided By University of Rhode Island

  • White Papers // Jan 2010

    Background Risk And Investment Risk: An Analysis Of Insurers? Corporate Bond Portfolios

    Theory suggests that investors facing more non-hedgeable background risk may behave as if they were more risk averse. In this paper, the authors investigate the background risk effect by examining how insurance business risk affects insurers' risk taking behavior in their corporate bond portfolios. They find that insurers with higher...

    Provided By University of Rhode Island

  • White Papers // Dec 2010

    Corporate Ownership, Debt, And Expropriation: Evidence From China

    The authors provide direct evidence on the dark side of leverage and offer new insights regarding the role of debt in corporate governance. Using a sample of Chinese state-owned enterprises that have experienced a transfer of controlling rights, they find a positive and significant relationship between expropriation and debt usage....

    Provided By University of Rhode Island

  • White Papers // Dec 2009

    Finance, Growth, And Volatility

    Empirical studies have not documented an unambiguous relationship between financial development and volatility of economic growth. Existing evidence of contemporaneous association is also insufficient to establish the direction of causality. This paper studies the time series relation between financial development, economic growth and growth volatility in one unified framework. Relying...

    Provided By University of Rhode Island

  • White Papers // Jul 2010

    Financial Crisis And The Market Efficiency In The Chinese Equity Markets

    The authors examine the behavior of the Chinese equity markets to determine whether the equity markets are efficient or not. A previously unexplored data base provides the source for observing market behavior of the two principle equity market in China. These markets have unique characteristics different from those in the...

    Provided By University of Rhode Island

  • White Papers // Jun 2010

    Securing Collaborative Spectrum Sensing Against Untrustworthy Secondary Users in Cognitive Radio Networks

    Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their...

    Provided By University of Rhode Island

  • White Papers // Oct 2009

    Distributed Cooperative Transmission With Unreliable and Untrustworthy Relay Channels

    Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multi-user cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design....

    Provided By University of Rhode Island

  • White Papers // Oct 2012

    Pseudo-Scheduling: A New Approach to the Broadcast Scheduling Problem

    The broadcast scheduling problem asks how a multi-hop network of broadcast transceivers operating on a shared medium may share the medium in such a way that communication over the entire network is possible. This can be naturally modeled as a graph coloring problem via distance-2 coloring (L(1, 1)-labeling, strict scheduling)....

    Provided By University of Rhode Island