Recent Submissions

  • The Maximum Principle for Global Solutions of Stochastic Stackelberg Differential Games 

    Bensoussan, Alain; Chen, Shaokuan; Sethi, Suresh P. (UT Dallas)
    For stochastic Stackelberg differential games played by a leader and a follower, there are several solution concepts in terms of the players' information sets. In this paper we derive the maximum principle for the leader's ...
  • A Secure Healthcare System: From Design to Implementation 

    Cankaya, Ebru Celikel; Kywe, Than
    We introduce the design and development of a comprehensive electronic health record system (EHR) that incorporates AES encryption to assure security. Our work adopts a didactic approach to introduce the formal design steps ...
  • A Novel Soundproof Ventilation Plant Design with High Performance and No Energy Consumption 

    Yu, Ya-Lin; Chao, Yu-Tin; Lee, Lai-Chung; Yen, Jia-Yush; Fan, Yun-Chiu
    This paper proposes an advanced approach for designing soundproof windows with good ventilation. The structure of this study is based on three acoustics theorem and can reduce noise and ventilate the space at the same time. ...
  • Optimal Ordering and Disposing Policies in the Presence of an Overconfident Retailer: A Stackelberg Game 

    Wang, Zhigang; Zhang, Zhenchao; Li, Chunfa; Xu, Lei; You, Chang
    This paper investigates the impact of the retailer's overconfident behavior on supply chain performance. We start with a basic model on the rational newsvendor model and investigate the retailer's optimal ordering decision ...
  • The Liberty Medical Group 

    Wallace, Fallon D.; Herl, Keith; Howard, William (Bill)
    The Liberty Medical Foundation is currently experiencing multiple challenges internally and externally that must be addressed immediately to avoid being forced out of the healthcare market by the competitive pressures of ...
  • Outsourcing Information Security: Contracting Issues and Security Implications 

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan
    A unique challenge in information security outsourcing is that neither the outsourcing firm nor the managed security service provider (MSSP) perfectly observes the outcome, the occurrence of a security breach, of prevention ...
  • Social Networks and the Diffusion of User-Generated Content: Evidence from YouTube 

    Susarla, Anjana; Oh, Jeong-ha (Cath); Tan, Yong
    This paper is motivated by the success of YouTube, which is attractive to content creators as well as corporations for its potential to rapidly disseminate digital content. The networked structure of interactions on YouTube ...
  • ACHE-North Texas case study report 

    Marston, Carson; Shah, Raj; Singh, Richa; Subhash, Archana (2012-03-23)
    Evaluation of the ABC health system’s proposed facilities for expansion was conducted on the basis of selected factors. Detailed analyses were done using available financial and volume statistics. A weighted matrix was ...
  • Pricing Models for Online Advertising: CPM vs. CPC 

    Asdemir, K.; Kumar, Nanda; Jacob, V. S. (Varghese S.) (2012-09)
    Online advertising has transformed the advertising industry with its measurability and accountability. Online software and services supported by online advertising is becoming a reality as evidenced by the success of Google ...