Palo Alto Research Center

Displaying 1-6 of 6 results

  • White Papers // Jun 2010

    Sequential Prefetch Cache Sizing for Maximal Hit Rate

    The authors propose a prefetch cache sizing module for use with any sequential prefetching scheme and evaluate its impact on the hit rate. Disk array caches perform sequential prefetching by loading data contiguous to I/O request data into the array cache. If the I/O workload has sequential locality, then data...

    Provided By Palo Alto Research Center

  • White Papers // Jan 2010

    Controlling Error Propagation in Mobile-Infrastructure-Based Localization

    Mobile infrastructure consists of one or more sensors in a xed conguration on a mobile platform. By moving the mobile platform in the environment and attaching a set of static tags to objects, one can localize these objects. It is especially useful in cases where permanent location infrastructure does not...

    Provided By Palo Alto Research Center

  • White Papers // Dec 2009

    VoCCN: Voice Over Content-Centric Networks

    A variety of proposals call for a new Internet architecture focused on retrieving content by name, but it has not been clear that any of these approaches can offer the generality to support Internet applications like real-time streaming or email. The authors present a detailed description of a prototype implementation...

    Provided By Palo Alto Research Center

  • White Papers // Jul 2009

    Implicit Authentication for Mobile Devices

    The authors introduce the notion of implicit authentication - the ability to authenticate mobile users based on actions they would carry out anyway. They develop a model for how to perform implicit authentication, and describe experiments aimed at assessing the benefits of the techniques. The preliminary findings support that this...

    Provided By Palo Alto Research Center

  • White Papers // Jul 2009

    How Users Use Access Control

    Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. The authors want to understand what level of control users need over their data, by examining what sorts of access policies...

    Provided By Palo Alto Research Center

  • White Papers // Jan 2009

    Controlling Error Propagation in Mobile-Infrastructure Based Localization

    Many iterative localization schemes suffer from the negative effect of error propagation, where sensor noise results in estimation errors which then get accumulated and amplified over localization iterations. This paper extends the authors' earlier work in mobile-infrastructure based localization and proposes a computationally efficient error control mechanism to mitigate the...

    Provided By Palo Alto Research Center

  • White Papers // Jan 2010

    Controlling Error Propagation in Mobile-Infrastructure-Based Localization

    Mobile infrastructure consists of one or more sensors in a xed conguration on a mobile platform. By moving the mobile platform in the environment and attaching a set of static tags to objects, one can localize these objects. It is especially useful in cases where permanent location infrastructure does not...

    Provided By Palo Alto Research Center

  • White Papers // Jul 2009

    Implicit Authentication for Mobile Devices

    The authors introduce the notion of implicit authentication - the ability to authenticate mobile users based on actions they would carry out anyway. They develop a model for how to perform implicit authentication, and describe experiments aimed at assessing the benefits of the techniques. The preliminary findings support that this...

    Provided By Palo Alto Research Center

  • White Papers // Dec 2009

    VoCCN: Voice Over Content-Centric Networks

    A variety of proposals call for a new Internet architecture focused on retrieving content by name, but it has not been clear that any of these approaches can offer the generality to support Internet applications like real-time streaming or email. The authors present a detailed description of a prototype implementation...

    Provided By Palo Alto Research Center

  • White Papers // Jan 2009

    Controlling Error Propagation in Mobile-Infrastructure Based Localization

    Many iterative localization schemes suffer from the negative effect of error propagation, where sensor noise results in estimation errors which then get accumulated and amplified over localization iterations. This paper extends the authors' earlier work in mobile-infrastructure based localization and proposes a computationally efficient error control mechanism to mitigate the...

    Provided By Palo Alto Research Center

  • White Papers // Jul 2009

    How Users Use Access Control

    Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. The authors want to understand what level of control users need over their data, by examining what sorts of access policies...

    Provided By Palo Alto Research Center

  • White Papers // Jun 2010

    Sequential Prefetch Cache Sizing for Maximal Hit Rate

    The authors propose a prefetch cache sizing module for use with any sequential prefetching scheme and evaluate its impact on the hit rate. Disk array caches perform sequential prefetching by loading data contiguous to I/O request data into the array cache. If the I/O workload has sequential locality, then data...

    Provided By Palo Alto Research Center