University of Texas

Displaying 241-258 of 258 results

  • White Papers // Aug 2009

    Do Financial Intermediaries Help To Certify Firm Transparency? Effect Of Auditor Quality On SEO Transaction Costs

    The author empirically investigates the differing certification effects of a firm employing financial intermediaries of varying reputation. The author uses a treatment effects model to control for endogeneity in the selection of intermediary reputation, and the author demonstrates that the use of reputable financial intermediaries helps to mitigate transaction costs...

    Provided By University of Texas

  • White Papers // Aug 2009

    Goal-Oriented Security Threat Mitigation Patterns: A Case of Credit Card Theft Mitigation

    Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions suitable for a specific application or organization. This paper presents three...

    Provided By University of Texas

  • White Papers // Aug 2009

    On the Stability Region of Amplify-and-Forward Cooperative Relay Networks

    This paper considers an amplify-and-forward relay network with fading states. Amplify-and-forward scheme (along with its variations) is the core mechanism for enabling cooperative communication in wireless networks, and hence understanding the network stability region under amplify-and-forward scheme is very important. However, in a relay network employing amplify-and-forward, the interaction between...

    Provided By University of Texas

  • White Papers // Jul 2009

    Batch Forwarding in Wireless Sensor Networks

    Batch processing is a well-known concept in computer science and widely used to improve performance in many applications. Similarly, to improve the delivery ratio and end2end delay in Wireless Sensor Networks (WSNs), the authors propose to use batch forwarding instead of streaming. The main goal in this paper is to...

    Provided By University of Texas

  • White Papers // Jul 2009

    Calculating, Creating, And Claiming Value In Business Markets: Status And Research Agenda

    B2B markets offer challenges that differ from those in B2C markets in addressing these issues (e.g., Anderson, Narus, and Narayandas 2009; Dwyer and Tanner 2008). These challenges stem from the fact that most B2B markets (relative to B2C markets) are characterized by a far fewer buyers who buy in much...

    Provided By University of Texas

  • White Papers // Jul 2009

    An Optimal Boundary-Fair Scheduling Algorithm for Multiprocessor Real-Time Systems

    Although the scheduling problem for multiprocessor real-time systems has been studied for decades, it is still an evolving research field with many open problems. In this paper, focusing on periodic real-time tasks, the authors propose a novel optimal scheduling algorithm, namely Boundary fair (Bfair), which follows the same line of...

    Provided By University of Texas

  • White Papers // Jul 2009

    Block Diagonalization in the MIMO Broadcast Channel With Delayed CSIT

    This paper investigates the impact of delayed Channel State Information at the Transmitter (CSIT) on the MIMO broadcast channel with Block Diagonalization (BD) pre-coding. First, an upper bound for the achievable throughput is provided, which shows that BD is more robust to imperfect CSIT than zero-forcing pre-coding as it has...

    Provided By University of Texas

  • White Papers // Jul 2009

    Position Paper for Workshop on Future Directions in Cyber-Physical Systems Security

    Cyber-Physical System (CPS) security presents new problems inasmuch as cyber-physical systems are different from either information systems (IS) or Physical Control Systems (PCS) in that there are interactions between the information processing elements and the physical control elements that neither IS nor PCS alone may incur. In computational terms, CPS...

    Provided By University of Texas

  • White Papers // Jun 2009

    Switching Activity Calculation of VLSI Adders

    Using exact switching activity rates at all internal nodes when calculating energy of digital circuits is believed to result in improved accuracy over to the use of average switching activity. The authors compare the two approaches in the case of the Kogge-stone adder implemented with Weinberger and Ling addition recurrences....

    Provided By University of Texas

  • White Papers // Apr 2009

    Social Network Classification Incorporating Link Type Values

    Classification of nodes in a social network and its applications to security informatics have been extensively studied in the past. However, previous paper generally does not consider the types of links (e.g., whether a person is friend or a close friend) that connect social networks members for classification purposes. Here,...

    Provided By University of Texas

  • White Papers // Feb 2009

    Auction Pricing: A Case Study Assessing The Price Elasticity Of Demand Based On Supply And The Revenue Equivalence Theorem

    This paper addresses the price elasticity of demand related to various categories of goods sold within the consignment auction-marketing environment. An actual ongoing non-traditional business organization specializing in the nation-wide distribution of merchandise via consignment auctions provides data for this case study. Originally developed and initiated in 1993 in response...

    Provided By University of Texas

  • White Papers // Nov 2008

    Using Anonymized Data for Classification

    In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing privacy sensitive data sets. This interest in anonymization techniques has resulted in a plethora of methods for anonymizing data under different privacy and utility assumptions. At the same time, there has been little...

    Provided By University of Texas

  • White Papers // Nov 2008

    WebOS: Operating System Services for Wide Area Applications

    In this paper, the authors demonstrate the power of providing a common set of operating system services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can rely on the local operating system to provide these...

    Provided By University of Texas

  • White Papers // Apr 2007

    Enforcing Honesty in Assured Information Sharing within a Distributed System

    The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, there is not necessarily any guarantee that the participants will share data truthfully. In fact, there is often a large incentive to...

    Provided By University of Texas

  • White Papers // Feb 2007

    Sustainable IT Outsourcing Success: Let Enterprise Architecture Be Your Guide

    This paper explores the relationship between IT outsourcing and enterprise architecture. In an earlier paper which described four stages of architecture maturity (business silos, standardized technology, rationalized process, and business modularity). In this paper it is concluded that three different outsourcing arrangements support transitions from one stage to another. Firms...

    Provided By University of Texas

  • White Papers // Jan 2007

    Disclosure Quality And Its Effect On Litigation Risk

    This paper examines the relationship between the quality of disclosure in companies' 10-K filings and the risk of securities class action litigation. The author uses a dataset containing 10-K documents filed electronically with the SEC in the period 1996-2005. Using two content analysis software programs that analyze the categories of...

    Provided By University of Texas

  • White Papers // Feb 2006

    Sovereign Joins

    The authors present a secure network service for sovereign information sharing whose only trusted component is an off-the shelf secure coprocessor. The participating data providers send encrypted relations to the service that sends the encrypted results to the recipients. The technical challenge in implementing such a service arises from the...

    Provided By University of Texas

  • White Papers // Jul 2001

    Product Costing And Pricing Under Long Term Capacity Commitment

    This white paper discusses about a model that is developed to analyze optimal product costing and pricing decisions when a firm must make long term commitments to some activity resource capacities. The problem is complex because of interactions between the initial capacity choices and adjustments in product costs and prices...

    Provided By University of Texas

  • White Papers // Jul 2012

    Frankenstein: Stitching Malware From Benign Binaries

    This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-the-art metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the concept of...

    Provided By University of Texas

  • White Papers // May 2012

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    A means of reliably concealing ownership of cloud data without impeding computation over the data is presented and evaluated. This facilitates information privacy enforcement in cloud environments by withholding data ownership information from cloud nodes that compute using the data. As a result, nodes that have access to private data...

    Provided By University of Texas

  • White Papers // May 2012

    Hatman: Intra-Cloud Trust Management for Hadoop

    Data and computation integrity and security are major concerns for users of cloud computing facilities. Many production-level clouds optimistically assume that all cloud nodes are equally trustworthy when dispatching jobs; jobs are dispatched based on node load, not reputation. This increases their vulnerability to attack, since compromising even one node...

    Provided By University of Texas

  • White Papers // Feb 2012

    A-Serv: A Novel Architecture Providing Scalable Quality of Service

    QoS architectures define how routers process packets to ensure QoS service guarantees enforced. Existing QoS architectures such as Integrated Services (IntServ), Differentiated Services (DiffServ), and Dynamic Packet State (DPS) share one common property that the packet structure and the function of the routers are closely connected. Packets of one data...

    Provided By University of Texas

  • White Papers // Aug 2010

    Minimum-Delay Service Provisioning in Opportunistic Networks

    Opportunistic networks are created dynamically by exploiting contacts between pairs of mobile devices that come within communication range. While forwarding in opportunistic networking has been explored, investigations into asynchronous service provisioning on top of opportunistic networks are unique contributions of this paper. Mobile devices are typically heterogeneous, possess disparate physical...

    Provided By University of Texas

  • White Papers // Dec 2010

    Just-in-Time Analytics on Large File Systems

    As file systems reach the peta-bytes scale, users and administrators are increasingly interested in acquiring high-level analytical information for file management and analysis. Two particularly important tasks are the processing of aggregate and top-k queries which, unfortunately, cannot be quickly answered by hierarchical file systems such as ext3 and NTFS....

    Provided By University of Texas

  • White Papers // Apr 2012

    An Empirical Study of Supplementary Bug Fixes

    A recent study finds that errors of omission are harder for programmers to detect than errors of commission. While several change recommendation systems already exist to prevent or reduce omission errors during software development, there have been very few studies on why errors of omission occur in practice and how...

    Provided By University of Texas

  • White Papers // Apr 2012

    Vdiff: A Program Differencing Algorithm for Verilog Hardware Description Language

    During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because these tools implicitly assume sequential execution semantics, while hardware description languages are designed to model concurrent computation. The authors designed a position-independent differencing algorithm to robustly...

    Provided By University of Texas

  • White Papers // Apr 2012

    BRACE: An Assertion Framework for Debugging Cyber-Physical Systems

    Developing Cyber-Physical Systems (CPS) is challenging because correctness depends on both logical and physical states, which are collectively difficult to observe. The developer often need to repeatedly rerun the system while observing its behavior and tweak the hardware and software until it meets minimum requirements. This process is tedious, error-prone,...

    Provided By University of Texas

  • White Papers // Apr 2012

    Extending Java for Android Programming

    Android is one of the most popular platforms for developing mobile applications. However, its framework relies on programming conventions and styles to implement framework-specific concepts like activities and intents, causing problems such as reliability, readability, understandability, and maintainability. The authors propose to extend Java to support Android framework concepts explicitly...

    Provided By University of Texas

  • White Papers // Aug 2010

    Template-Based Reconstruction of Complex Refactorings

    Knowing which types of refactoring occurred between two program versions can help programmers better understand code changes. The authors' survey of refactoring identification techniques found that existing techniques cannot easily identify complex refactorings, such as an replace conditional with polymorphism refactoring, which consist of a set of atomic refactorings. This...

    Provided By University of Texas

  • White Papers // May 2012

    Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems

    A unique characteristics of provenance data is that it forms a Directed Acyclic Graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to...

    Provided By University of Texas

  • White Papers // May 2012

    Tag-Based Information Flow Analysis for Document Classification in Provenance

    A crucial aspect of certain applications such as the ones pertaining to Intelligence domain or Health-care, is to manage and protect sensitive information effectively and efficiently. In this paper, the authors propose a tagging mechanism to track the flow of sensitive or valuable information in a provenance graph and automate...

    Provided By University of Texas

  • White Papers // Feb 2012

    Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes

    Prefix-Preserving Encryption (PPE) is an important type of encryption scheme, having a wide range of applications, such as IP addresses anonymization, prefix-matching search, and rang search. There are two issues in PPE schemes, security proof and single key requirement. Existing security proofs for PPE only reduce the security of a...

    Provided By University of Texas

  • White Papers // Jun 2012

    New Proof Methods for Attribute-Based Encryption: Achieving Full Security Through Selective Techniques

    The authors develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of...

    Provided By University of Texas

  • White Papers // May 2012

    Dual Form Signatures: An Approach for Proving Security From Static Assumptions

    In this paper, the authors introduce the abstraction of Dual Form Signatures as a useful framework for proving security (existential unforgeability) from static assumptions for schemes with special structure that are used as a basis of other cryptographic protocols and applications. They describe the power of this framework by proving...

    Provided By University of Texas

  • White Papers // Jun 2013

    Graduates' Perception of Employment in SMEs and Large Enterprises

    This paper looks at non business (n = 66) and business graduates (n = 18) and compares their employment preference in Small and Medium sized Enterprises (SME) or Large Enterprises (LE). In pursuit, a questionnaire was developed measuring the perception of graduates as regards on the content of a job,...

    Provided By University of Texas

  • White Papers // Jan 2011

    Analysis of the Global Smartphone Market and the Strategies of its Major Players

    The Smartphone has ushered in a new generation of mobile Internet devices. A small Smartphone that is only four inches long enables the sharing of real-time information and knowledge, and it can transform lifestyles. People use smartphones to obtain, share and exchange information whenever they desire. The speed of information...

    Provided By University of Texas