Quantcast
Channel: University of Kansas on TechRepublic
Browsing latest articles
Browse All 15 View Live

Trend Inflation And The New Keynesian Phillips Curve

This paper estimates empirical models for the forward-looking New Keynesian Phillips Curve (NKPC) when inflation is allowed to have a stochastic trend. Using the observed CBO output gap as a measure of...

View Article



Implementing Web Services: Conflicts Between Security Features and...

While on the surface the combination of software components that adhere to associated standards should lead to rapid and successful system implementation. However, issues can arise when integrating...

View Article

Improving Both the Performance Benefits and Speed of Optimization Phase...

The issues of compiler optimization phase ordering and selection present important challenges to compiler developers in several domains, and in particular to the speed, code size, power, and...

View Article

Novel Online Profiling for Virtual Machines

Application profiling is a popular technique to improve program performance based on its behavior. Offline profiling, although beneficial for several applications, fails in cases where prior program...

View Article

Framework for Analyzing SOAP Messages in Web Service Environments

Service Oriented Architectures can be quite complex which makes managing and monitoring them hard. Message exchanges as well as complete message flows are important when it comes to analyzing the...

View Article


Delivering Decision Support Information to Departmental Units Using the SAS...

The University of Kansas (KU), like any large and decentralized organization, found that information was not always available in a timely manner to make effective decisions. To help solve this dilemma,...

View Article

Using XML Mapper and Enterprise Guide to Read Data and Metadata From an XML File

Increasingly, data and metadata are archived together in XML files. This paper works through the process of reading an XML file containing a data table, variable labels, notes about variables, and...

View Article

How Better Monetary Statistics Could Have Signaled The Financial Crisis

This paper explores the disconnect of Federal Reserve data from index number theory. A consequence could have been the decreased systemic-risk misperceptions that contributed to excess risk taking...

View Article


The Effects Of University Affirmative Action Policies On The Human Capital...

Research shows that minority children enter the labor market with lower levels of acquired skill than their white counterparts. The causes of this skill gap, however, are not entirely understood. This...

View Article


Democracy, Foreign Direct Investment And Natural Resources

Existing studies assume that the impact of democracy on FDI is the same for re-source exporting and non-resource exporting countries. This paper examines whether natural resources alter the...

View Article

JIT Compilation Policy on Single-Core and Multi-Core Machines

Dynamic or Just-In-Time (JIT) compilation is crucial to achieve acceptable performance for applications written in traditionally interpreted languages, such as Java and C#. Such languages enable the...

View Article

Personal Bankruptcy: Reconciling Adverse Events And Strategic Timing...

The strategic timing and adverse events hypotheses of personal bankruptcy have received particular attention. Existing research focuses on proving or disproving either hypothesis, using a strict...

View Article

Network Virtualization in GpENI: Framework, Implementation & Integration...

Great plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope...

View Article


Application of Fuzzy Rough Temporal Approach in Patient Data Management...

Management of fuzzy and vague information has been a research problem for computer scientists, particularly in artificial intelligence, relational and temporal databases. Fuzzy set theory has been...

View Article

Application of Statistical Process Control Methods for IDS

As technology improves, attackers are trying to get access to the network system resources by so many means. Open loop holes in the network allow them to penetrate in the network more easily;...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images