UBM: TECH DIGITAL RESOURCE LIBRARY

Pennsylvania State University


Latest Content From Pennsylvania State University

Whitepaper: Infrastructure, Service And Trust: Assessing The Environment Of e-Commerce In China

by Pennsylvania State UniversityJan 01, 2008

Both the telecom and the Internet infrastructure in China have been expanding rapidly since the 1990s and they laid the foundation for the e-commerce development. This research paper from Pennsylvania State University examines the issues of information infrastructure, commercial service and trust in the Chinese context and then discusses the policies and regulations need to be implemented in order to create a more favorable local environment for the development of e-commerce in China.


Whitepaper: Innovative Technologies in a Systems Integration Curriculum: XML and Microsoft Visual Studio .NET

by Pennsylvania State UniversityJan 01, 2008

As a part of an upper-level systems integration course, the developer incorporated instruction and projects in current integrative programming technologies, XML and Microsoft Visual Studio.NET. This research paper provides an overall background on XML and IDEs and a review of the literature concerning their instructional implementations. A program of basic instruction is then reviewed and illustrated to provide a framework for the inclusion of these technologies in an information systems and sciences curriculum.


Whitepaper: Barriers To Entry Analysis Of Broadband Multiple Platforms

by Pennsylvania State UniversityJan 01, 2008

This paper from Pennsylvania State University compares barriers to entry in the broadband markets between U.S. and South Korea. First, it explores economic conceptions of barriers to entry from economics literature. Second, it speculates on how conception of barriers to entry has been dealt with in telecommunications industry. It clarifies the various industrial factors that could prevent, or make it difficult, to successfully enter the residential telecommunications market. Third, it introduces an analytical framework that can be adopted for evaluating the barriers to entry. Fourth, employing framework, this examines the broadband markets in the U.S. and in South Korea.


Whitepaper: Product And Service Innovation In Small And Medium-Sized Enterprises

by Pennsylvania State UniversityJan 01, 2008

The National Institute of Standards and Technology (NIST) contracted with a College of Business to accomplish a review of literature that concerns how small and Medium-Sized Enterprises (SMEs) develop new products and services. Their team comprehensively reviewed the literature for concepts and research on new product and service development. The authors also identified several cases of successful realization of innovative new product and service development practices. Based on what they learned, the authors developed recommendations to enhance SME competitiveness and the ability of MEP consultants to assist SMEs in this endeavor.


Whitepaper: Let There Be Light and Broadband Internet

by Pennsylvania State UniversityJan 01, 2008

Home users are in need for broadband communications access, globally. Broadband over power-lines transmission has advanced throughout the last decade, and it is going to be a mature last-mile access in near future. Meanwhile, indoor optical wireless communications (optical WiFi) through lighting LEDs has been investigated, recently. Suitable channel models are proposed for each of these systems and the corresponding transmission capacity values are presented. It is shown that a combination of these two techniques provides an efficient way of fulfilling the premise of broadband access for home networking, while providing efficient and low-cost lighting.


Whitepaper: Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas

by Pennsylvania State UniversityJan 01, 2008

Motivated by the widespread proliferation of wireless networks employing directional antennas, the paper study the problem of provisioning bandwidth in such networks. Given a set of subscribers and one or more access points possessing directional antennas, the paper formalizes the problem of orienting these antennas in two fundamental settings; subscriber-centric, where the objective is to fairly allocate bandwidth among the subscribers; and provider-centric, where the objective is to maximize the revenue generated by satisfying the bandwidth requirements of subscribers.


Whitepaper: Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks

by Pennsylvania State UniversityJan 01, 2008

Sensors that operate in an unattended, harsh or hostile environment often suffer from break-in compromises, because their low costs do not allow the use of expensive tamper-resistant hardware. Besides the exposure of secret information (e.g., cryptographic keys), compromised sensors may be reprogrammed with malicious code to launch all kinds of insider attacks. Very desirably, if one can identify and further revoke those corrupted nodes in a timely manner, the potential damages caused by them could be minimized. Intrusion detection mechanisms such as watchdog and reputation-based system have been proposed to detect abnormal nodes.


Whitepaper: Public-Private Partnerships and the Role of State and Federal Legislation in Wireless Municipal Networks

by Pennsylvania State UniversityJan 01, 2008

Current and pending laws will be examined to understand how cities can deploy a wireless broadband network under these regulations. An analysis of municipal facilities and technology expertise illustrates the opportunity for public-private cooperation in wireless deployments. This movement has raised a number of questions including: Why are municipalities acting as the early adopters of wireless broadband technology? How does increased state regulation of municipal broadband networks affect this trend and how can cities respond? This research paper shows that cooperation is beneficial in many cases.


Whitepaper: From Languages to Systems: Understanding Practical Application Development in Security-Typed Languages

by Pennsylvania State UniversityJan 01, 2008

This paper explores the process and machinery of building provably secure applications using security-typed languages. Real world policies are mapped onto the information flows controlled by the language primitives, and considered the process and tractability of broadly enforcing security policy in commodity applications. This work serves as a starting point and the authors have demonstrated that it is possible to implement real world systems and policy using security-typed languages.


Whitepaper: System Design Considerations for High Data Rate Communications Over Multi-Wire Overhead Power-Lines

by Pennsylvania State UniversityJan 01, 2008

Broadband power-line communications over multi-wire overheard lines using Orthogonal Frequency Division Multiplexing (OFDM) is considered in this research paper. From earlier investigations, it is known that this channel suffers with multipath fading and frequency selectivity. Nevertheless, the calculated channel capacity limit promises very high data rates over this channel, subject to simple fixes. Enhancement techniques, such as coding can help an OFDM system to achieve this limit as close as possible. The smart use of coding and power allocation in OFDM will be useful to get the desired performance at higher data rates.