Princeton University

Displaying 1-40 of 160 results

  • White Papers // Dec 2014

    CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication

    "Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications. However, key management remains a major barrier to adoption. Current systems are often either vulnerable to a malicious or coerced key directory or they make unrealistic assumptions about user behavior, for example, that users will verify...

    Provided By Princeton University

  • White Papers // Mar 2013

    Shining the Floodlights on Mobile Web Tracking - A Privacy Survey

    The authors present the first published large-scale study of mobile web tracking. They compare tracking across five physical and emulated mobile devices with one desktop device as a benchmark. Their crawler is based on FourthParty; however, their architecture avoids clearing state which has the benefit of continual observation of (and...

    Provided By Princeton University

  • White Papers // Mar 2012

    Serval: An End-Host Stack for Service-Centric Networking

    Internet services run on multiple servers in different locations, serving clients that are often mobile and multi-homed. This does not match well with today's network stack, designed for communication between fixed hosts with topology-dependent addresses. As a result, online service providers resort to clumsy and management intensive work-arounds - forfeiting...

    Provided By Princeton University

  • White Papers // Mar 2012

    An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?

    Recent incidents of cyber-security violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by 'Free-riding' effects and 'Shortsightedness' among Internet Service Providers (ISPs). In this paper, the authors...

    Provided By Princeton University

  • White Papers // Feb 2012

    Network Formation Games Among Relay Stations in Next Generation Wireless Networks

    The introduction of Relay Station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's Long Term Evolution Advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel approach for the formation of the tree architecture that connects the...

    Provided By Princeton University

  • White Papers // Jan 2012

    ILC: A Foundation for Automated Reasoning About Pointer Programs

    This paper shows how to use Girard's intuitionistic linear logic extended with a classical sublogic to reason about pointer programs. More specifically, first, the paper defines the proof theory for ILC (Intuitionistic Linear logic with Constraints) and shows it is well-defined via a proof of cut elimination. Second, inspired by...

    Provided By Princeton University

  • White Papers // Jan 2012

    A Distributed Sorting Framework for Ad Hoc Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are distributed, self-organizing, pervasive systems, which perform collaborative computations to provide useful information about the underlying stochastic phenomenon. In this paper, the authors explore the ranking and sorting problems in distributed sensor networks which provide perspectives in understanding certain fundamental issues in WSN, as well as...

    Provided By Princeton University

  • White Papers // Jan 2012

    Commensal Cuckoo: Secure Group Partitioning for Large-Scale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Dec 2011

    Multi-Resource Allocation: Fairness-Efficiency Tradeoffs in a Unifying Framework

    Quantifying the notion of fairness is under-explored when users request different ratios of multiple distinct resource types. A typical example is datacenters processing jobs with heterogeneous resource requirements on CPU, memory, etc. A generalization of max-min fairness to multiple resources was recently proposed in, but may suffer from significant loss...

    Provided By Princeton University

  • White Papers // Dec 2011

    Language Abstractions for Software-Defined Networks

    For the past 30 years, networks have been built the same way: out of special-purpose devices running distributed algorithms that provide functionality such as topology discovery, routing, traffic monitoring, and access control. Recent years, however, have seen growing interest in a new kind of network architecture in which a logically-centralized...

    Provided By Princeton University

  • White Papers // Nov 2011

    LearnPADS++ Incremental Inference of Ad Hoc Data Formats

    An ad hoc data source is any semi-structured, non-standard data source. The format of such data sources is often evolving and frequently lacking documentation. Consequently, off-the-shelf tools for processing such data often do not exist, forcing analysts to develop their own tools, a costly and time-consuming process. In this paper,...

    Provided By Princeton University

  • White Papers // Oct 2011

    Pricing by Timing: Innovating Broadband Data Plans

    Wireless Internet data usage is doubling every year. Users are consuming more of high-bandwidth data applications, with usage concentrated on several peak hours in a day. The authors review many of the pricing schemes in practice today and analyze why they do not solve this problem of growing data traffic....

    Provided By Princeton University

  • White Papers // Aug 2011

    The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks With ARQ

    The authors study the tradeoff between reliability, data rate, and delay for half-duplex MIMO multi-hop networks that utilize the Automatic-Retransmission-reQuest (ARQ) protocol both in the asymptotic high Signal-to-Noise Ratio (SNR) regime and in the finite SNR regime. They propose novel ARQ protocol designs that optimize these tradeoffs. In particular, they...

    Provided By Princeton University

  • White Papers // Aug 2011

    Fair Greening of Broadband Access: Spectrum Management for Energy-Efficient DSL Networks

    Dynamic Spectrum Management (DSM) is recognized as a promising technology to reduce power consumption in DSL access networks. However, the correct formulation of power-aware DSM problem statements requires a proper understanding of greening, i.e., reducing power consumption. In this paper, the authors therefore investigate greening and show that it can...

    Provided By Princeton University

  • White Papers // Aug 2011

    Toward a Lightweight Model of BGP Safety

    For the past ten years, researchers have used the Stable Paths Problem (SPP) to analyze the stability properties of the Border Gateway Protocol (BGP). Analysis of SPP has revealed several combinations of topologies and routing configurations (or gadgets) where BGP cannot converge to a unique stable solution. Researchers typically analyze...

    Provided By Princeton University

  • White Papers // Aug 2011

    Commensal Cuckoo: Secure Group Partitioning for LargeScale Services

    The authors present commensal cuckoo, a secure group partitioning scheme for large-scale systems that maintains the correctness of many small groups, despite a Byzantine adversary that controls a constant (global) fraction of all nodes. In particular, the adversary is allowed to repeatedly rejoin faulty nodes to the system in an...

    Provided By Princeton University

  • White Papers // Aug 2011

    ARIADNE: Agnostic Reconfiguration in a Disconnected Network Environment

    Extreme transistor technology scaling is causing increasing concerns in device reliability: the expected lifetime of individual transistors in complex chips is quickly decreasing, and the problem is expected to worsen at future technology nodes. With complex designs increasingly relying on Networks-on-Chip (NoCs) for on-chip data transfers, a NoC must continue...

    Provided By Princeton University

  • White Papers // Jul 2011

    Hiding Amongst the Clouds: A Proposal for Cloud-Based Onion Routing

    Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a...

    Provided By Princeton University

  • White Papers // Jun 2011

    Coercing Clients Into Facilitating Failover for Object Delivery

    Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its host-to-host abstraction. Given that these services are replicated for scalability, this unnecessarily exposes failures of individual servers to their clients. While changes to both client and server applications can be used to mask such...

    Provided By Princeton University

  • White Papers // May 2011

    Levels of Awareness: Design Considerations for Web Crawlers and Censorware Detection

    Search engines are tremendous force-multipliers for end-hosts trying to discover content on the Web. As the amount of content online grows, so does dependence on web crawlers to discover content. The desire for adversaries to censor search engines from detecting content on the Internet has scaled accordingly. Web crawlers, programs...

    Provided By Princeton University

  • White Papers // Apr 2011

    Identifying Performance Bottlenecks in CDNs Through TCP-Level Monitoring

    Content Distribution Networks (CDNs) need to make decisions, such as server selection and routing, to improve performance for their clients. The performance may be limited by various factors such as packet loss in the network, a small receive buffer at the client, or constrained server CPU and disk resources. Conventional...

    Provided By Princeton University

  • White Papers // Apr 2011

    A List-Machine Benchmark for Mechanized Metatheory

    The authors propose a benchmark to compare theorem-proving systems on their ability to express proofs of compiler correctness. In contrast to the first POPL-mark, they emphasize the connection of proofs to compiler implementations, and they point out that much can be done without binders or alpha-conversion. They propose specific criteria...

    Provided By Princeton University

  • White Papers // Apr 2011

    Modular Protections Against Non-Control Data Attacks

    This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by declaring critical data types and ascribing these critical types to important data structures. YARRA guarantees that such critical data is only written through pointers with the...

    Provided By Princeton University

  • White Papers // Mar 2011

    Frenetic: A Network Programming Language

    Modern networks provide a variety of interrelated services including routing, traffic monitoring, load balancing, and access control. Unfortunately, the languages used to program today's networks lack modern features they are usually defined at the low level of abstraction supplied by the underlying hardware and they fail to provide even rudimentary...

    Provided By Princeton University

  • White Papers // Mar 2011

    Time-Dependent Broadband Pricing: Feasibility and Benefits

    Charging different prices for Internet access at different times induces users to spread out their bandwidth consumption across times of the day. Potential impact on ISP revenue, congestion management, and consumer behavior can be significant, yet some fundamental questions remain: is it feasible to operate time dependent pricing and how...

    Provided By Princeton University

  • White Papers // Mar 2011

    Profiling Network Performance for Multi-Tier Data Center Applications

    Network performance problems are notoriously tricky to diagnose, and this is magnified when applications are often split into multiple tiers of application components spread across thousands of servers in a data center. Problems often arise in the communication between the tiers, where either the application or the network (or both!)...

    Provided By Princeton University

  • White Papers // Mar 2011

    SSDAlloc: Hybrid SSD/RAM Memory Management Made Easy

    The authors introduce SSDAlloc, a hybrid main memory management system that allows developers to treat Solid-State Disk (SSD) as an extension of the RAM in a system. SSDAlloc moves the SSD upward in the memory hierarchy, usable as a larger, slower form of RAM instead of just a cache for...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Macroeconomic Model With A Financial Sector

    This paper studies the full equilibrium dynamics of an economy with financial frictions. Due to highly non-linear amplification effects, the economy is prone to instability and occasionally enters volatile episodes. Risk is endogenous and asset price correlations are high in down turns. In an environment of low exogenous risk experts...

    Provided By Princeton University

  • White Papers // Feb 2011

    Investing In Schooling In Chile: The Role Of Information About Financial Aid For Higher Education

    Recent economic research shows that imperfect information about Mincer returns to education (in developing countries) or about financial aid (in the US) may undermine investments in schooling and exacerbate inequalities in access to education. The authors extend this literature by presenting the results of an experiment that provided children and...

    Provided By Princeton University

  • White Papers // Feb 2011

    Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security

    With a cryptographic root-of-trust for Internet routing (RPKI) on the horizon, the authors can finally start planning the deployment of one of the secure interdomain routing protocols proposed over a decade ago (Secure BGP, secure origin BGP). However, if experience with IPv6 is any indicator, this will be no easy...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Survey of Virtual LAN Usage in Campus Networks

    VLANs are widely used in today's enterprise networks to improve Ethernet scalability and support network policies. However, manuals and textbooks offer very little information about how VLANs are actually used in practice. Through discussions with network administrators and analysis of configuration data, the authors describe how three university campuses and...

    Provided By Princeton University

  • White Papers // Jan 2011

    A Service Access Layer, at Your Service

    Historically, Internet services provided clients with access to the resources of a particular host. However, today's services are no longer defined by a single host or confined to a fixed location. Yet, the network architecture continues to impose an unfortunate coupling between hosts and services by binding connections to topology-dependent...

    Provided By Princeton University

  • White Papers // Jan 2011

    Is There Learning By Exporting: Evidence From The Automobile Industry In China

    Do exporters learn from their exporting experience? While this question seems to have been proven in theory, it nevertheless needs to be tested empirically. In this paper, the author uses an approach, suggested by De Loecker, which corrects for econometric and consistency problems, to estimate productivity. Using data from the...

    Provided By Princeton University

  • White Papers // Jan 2011

    There's Something About MRAI: Timing Diversity May Exponentially Worsen BGP Convergence

    To better support interactive applications, individual network operators are decreasing the timers that affect BGP convergence, leading to greater diversity in the timer settings across the Internet. While decreasing timers is intended to improve routing convergence, the authors show that, ironically, the resulting timer heterogeneity can make routing convergence substantially...

    Provided By Princeton University

  • White Papers // Jan 2011

    BGP Safety With Spurious Updates

    The authors explore BGP safety, the question of whether a BGP system converges to a stable routing, in light of several BGP implementation features that have not been fully included in the previous theoretical analyses. They show that Route Flap Damping, MRAI timers, and other intra-router features can cause a...

    Provided By Princeton University

  • White Papers // Jan 2011

    Job Search And Job Finding In A Period Of Mass Unemployment: Evidence From High-Frequency Longitudinal Data

    Several findings in this paper shed light on job search behavior in a depressed job market. Some findings are consistent with the Mortensen (1977) sequential job search model and others are inconsistent with it. In contrast to the prediction of sequential, stationary job search model, the authors find that the...

    Provided By Princeton University

  • White Papers // Jan 2011

    Routing as a Service

    In Internet routing, there is a fundamental tussle between the end users who want control over the end-to-end paths and the Autonomous Systems (ASes) who want control over the flow of traffic through their infrastructure. To resolve this tussle and offer flexible routing control across multiple routing domains, the authors...

    Provided By Princeton University

  • White Papers // Jan 2011

    A General and Flexible Access-Control System for the Web

    The authors describe the design, implementation, and performance of a new system for access control on the web. To achieve greater flexibility in forming access-control policies-in particular, to allow better interoperability across administrative boundaries-the authors base the system on the ideas of Proof-Carrying Authorization (PCA). The authors extend PCA with...

    Provided By Princeton University

  • White Papers // Jan 2011

    Power-Driven Design of Router Microarchitectures in On-Chip Networks

    As demand for bandwidth increases in systems-on-a-chip and chip multiprocessors, networks are fast replacing buses and dedicated wires as the pervasive interconnect fabric for on-chip communication. The tight delay requirements faced by on-chip networks have resulted in prior microarchitectures being largely performance-driven. While performance is a critical metric, on-chip networks...

    Provided By Princeton University

  • White Papers // Jan 2011

    Optimality Certificate of Dynamic Spectrum Management in Multi-Carrier Interference Channels

    The multi-carrier interference channel where interference is treated as additive white Gaussian noise, is a very active topic of research, particularly important in the area of Dynamic Spectrum Management (DSM) for Digital Subscriber Lines (DSL). Here, multiple users optimize their transmit power spectra so as to maximize the total weighted...

    Provided By Princeton University

  • White Papers // Jun 2004

    Healthy Baby, Healthy Marriage? The Effect of Children's Health on Divorce

    This paper investigates whether the health of children affects the likelihood that their parents divorce. Using data from the 1988 National Health Interview Survey, the National Longitudinal Survey of Adolescent Health, and the 1970 British Birth Cohort Study, It finds that low birth weight children are at a higher risk...

    Provided By Princeton University

  • White Papers // Aug 2001

    The Health Status & Behaviors of Unwed Fathers

    The purpose of the paper is to examine the capabilities of unwed fathers. Knowing more about fathers' capabilities is important for assessing the potential success of welfare reform insofar as the new welfare law envisions a much larger role for unwed parents in supporting their children. Time limits and work...

    Provided By Princeton University

  • White Papers // Jun 2004

    Healthy Baby, Healthy Marriage?: The Effect of Children's Health on Divorce

    This paper investigates whether the health of children affects the likelihood that their parents divorce. Using data from the 1988 National Health Interview Survey, the National Longitudinal Survey of Adolescent Health, and the 1970 British Birth Cohort Study, the author finds that low birth weight children are at a higher...

    Provided By Princeton University

  • White Papers // Apr 2004

    The Economics of Real Superstars: The Market for Rock Concerts in the Material World

    Beginning in 1997, the price of concert tickets took off, and ticket sales and the number of concerts performed by top artists declined. From 1996 to 2003, for example, the average concert price increased by 82 percent while the CPI increased by just 17 percent. This paper summarizes and seeks...

    Provided By Princeton University

  • White Papers // Jan 2011

    A General and Flexible Access-Control System for the Web

    The authors describe the design, implementation, and performance of a new system for access control on the web. To achieve greater flexibility in forming access-control policies-in particular, to allow better interoperability across administrative boundaries-the authors base the system on the ideas of Proof-Carrying Authorization (PCA). The authors extend PCA with...

    Provided By Princeton University

  • White Papers // Jan 2011

    Power-Driven Design of Router Microarchitectures in On-Chip Networks

    As demand for bandwidth increases in systems-on-a-chip and chip multiprocessors, networks are fast replacing buses and dedicated wires as the pervasive interconnect fabric for on-chip communication. The tight delay requirements faced by on-chip networks have resulted in prior microarchitectures being largely performance-driven. While performance is a critical metric, on-chip networks...

    Provided By Princeton University

  • White Papers // Apr 2011

    Identifying Performance Bottlenecks in CDNs Through TCP-Level Monitoring

    Content Distribution Networks (CDNs) need to make decisions, such as server selection and routing, to improve performance for their clients. The performance may be limited by various factors such as packet loss in the network, a small receive buffer at the client, or constrained server CPU and disk resources. Conventional...

    Provided By Princeton University

  • White Papers // May 2011

    Levels of Awareness: Design Considerations for Web Crawlers and Censorware Detection

    Search engines are tremendous force-multipliers for end-hosts trying to discover content on the Web. As the amount of content online grows, so does dependence on web crawlers to discover content. The desire for adversaries to censor search engines from detecting content on the Internet has scaled accordingly. Web crawlers, programs...

    Provided By Princeton University

  • White Papers // Dec 2010

    Pricing And Hedging In Affine Models With Possibility Of Default

    The authors propose a general class of models for the simultaneous treatment of equity, corporate bonds, government bonds and derivatives. The noise is generated by a general affine Markov process. The framework allows for stochastic volatility, jumps, the possibility of default and correlations between different assets. They extend the notion...

    Provided By Princeton University

  • White Papers // Dec 2010

    Optimal Consumption And Investment In Incomplete Markets With General Constraints

    The authors study an optimal consumption and investment problem in a possibly incomplete market with general, not necessarily convex, stochastic constraints. They provide explicit solutions for investors with exponential, logarithmic as well as power utility and show that they are unique if the constraints are convex. The approach is based...

    Provided By Princeton University

  • White Papers // Sep 2009

    Household Inflation Experiences In The U.S.: A Comprehensive Approach

    The authors present new measures of household-specific inflation experiences based on comprehensive information from the Consumer EXpenditure Survey (CEX). They match households in the Interview and the Diary Surveys from the CEX to produce both complete and detailed pictures of household expenditures. The resulting household inflation measures are based on...

    Provided By Princeton University

  • White Papers // Jun 2010

    Renovation Of The Global Reserve Regime: Concepts And Proposals

    The subject of this paper is one about which the author had written before, but this paper goes further than those published previously. It contemplates the gradual transformation of the global reserve regime by making the IMF's quasi-currency, the SDR, the primary reserve asset of the international monetary system, which...

    Provided By Princeton University

  • White Papers // Nov 2010

    Labor Market Frictions, Firm Growth And International Trade

    Hiring new workers takes time. Yet firms must employ a sufficient number of workers to justify paying the fixed costs of entry into export markets. This paper studies how characteristics of the labor market impact income and trade via the time it takes for firms to grow large enough to...

    Provided By Princeton University

  • White Papers // Nov 2010

    Firm Experimentation in New Markets

    An important feature of the data on new exporters is the evolution over time of their export size and exit rate. As the exporting age of firms increases, their average export volumes grow and the exit rate decreases. In particular, the author observes cases of new exporters expanding slowly initially,...

    Provided By Princeton University

  • White Papers // Nov 2010

    Structural Estimation Of The Model Of Firm Experimentation

    The authors present the structural estimation of the model of firm experimentation of Akhmetova (2010). They make the following empirical interpretation of the model. They assume that a firm can learn about the demand for its good by observing its exports of individual subcategories of the good. That is, sales...

    Provided By Princeton University

  • White Papers // Nov 2010

    International Reserves Accumulation And Endogenous Growth

    This paper investigates the interaction between capital flows and economic development in a dual-economy growth model. In the presence of a market failure in the allocation of resources between a traditional non-traded sector and a modern capital-intensive sector, a government can enhance welfare by a second-best policy that encourages investment...

    Provided By Princeton University

  • White Papers // Jul 2010

    Endogenous Ranking And Equilibrium Lorenz Curve Across (Ex-Ante) Identical Countries

    This paper considers a model of the world economy with a finite number of ex-ante identical countries and a continuum of tradeable goods. Productivity differences across countries arise endogenously through free entry to the local differentiated producer service sector in each country. It is shown that, in any stable equilibrium,...

    Provided By Princeton University

  • White Papers // Nov 2010

    An Investment Model Via Regime-Switching Economic Indicators

    The Internet bubble and 2008-2009 economic crash exposed severe limitations of traditional portfolio models, especially the dependence on a static framework e.g. a constant covariance matrix. This paper develops a novel dynamic optimization model for constructing a long-short equity portfolio. A hidden Markov model captures the critical market sentiments, with...

    Provided By Princeton University

  • White Papers // Mar 2010

    Financial Intermediation And Credit Policy In Business Cycle Analysis

    The authors develop a canonical framework to think about credit market frictions and aggregate economic activity in the context of the current crisis. They use the framework to address two issues in particular: first, how disruptions in financial intermediation can induce a crisis that affects real activity; and second, how...

    Provided By Princeton University

  • White Papers // Apr 2010

    Cooperative Relaying in Sensor Networks

    Reliable transmission of a discrete memoryless source over a multiple-relay network is considered. Motivated by sensor network applications, it is assumed that the relays and the destination all have access to side information correlated with the underlying source signal. Joint source-channel cooperative transmission is studied in which the relays help...

    Provided By Princeton University

  • White Papers // Apr 2010

    Will China Have Serious Inflation?

    There has been much concern about inflation in China recently. The People's Bank in the last few months has raised the reserve requirement several times to control the money supply to slow down inflation. In 1985 when the author was organizing a summer workshop on macroeconomics in cooperation with the...

    Provided By Princeton University

  • White Papers // May 2010

    To Infinity and Not Beyond: Scaling Communication in Virtual Worlds With Meru

    Virtual worlds seek to provide an online setting where users can interact in a shared environment. Popular virtual worlds such as Second Life and World of Warcraft, however, rely on share-nothing data and strict partitioning as much as possible. They translate a large world into many tiny worlds. This partitioning...

    Provided By Princeton University

  • White Papers // Feb 2011

    A Macroeconomic Model With A Financial Sector

    This paper studies the full equilibrium dynamics of an economy with financial frictions. Due to highly non-linear amplification effects, the economy is prone to instability and occasionally enters volatile episodes. Risk is endogenous and asset price correlations are high in down turns. In an environment of low exogenous risk experts...

    Provided By Princeton University

  • White Papers // Sep 2010

    Financial Crises, Bank Risk Exposure And Government Financial Policy

    The authors develop a macroeconomic model with financial intermediation that allows the intermediaries (banks) to issue outside equity as well as short term debt. This makes bank risk exposure an endogenous choice. The goal is to have a model that can not only capture a crisis when banks are highly...

    Provided By Princeton University

  • White Papers // Feb 2011

    Investing In Schooling In Chile: The Role Of Information About Financial Aid For Higher Education

    Recent economic research shows that imperfect information about Mincer returns to education (in developing countries) or about financial aid (in the US) may undermine investments in schooling and exacerbate inequalities in access to education. The authors extend this literature by presenting the results of an experiment that provided children and...

    Provided By Princeton University

  • White Papers // Aug 2010

    The Squam Lake Report: Fifteen Economists In Search Of Financial Reform

    The Squam Lake Report is a volume by economists for economists. It offers the fruits of the labors of 15 top economists who met at Squam Lake, New Hampshire, to discuss financial reform. While somewhat disjointed, and avoiding many important issues, the book is nonetheless a tour du force. Its...

    Provided By Princeton University

  • White Papers // Jul 2011

    Hiding Amongst the Clouds: A Proposal for Cloud-Based Onion Routing

    Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a...

    Provided By Princeton University

  • White Papers // Oct 2009

    A Survey of BGP Security Issues and Solutions

    As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its failure to adequately address security. Recent high-profile outages and security analyses clearly indicate that the Internet routing infrastructure...

    Provided By Princeton University

  • White Papers // Jan 2010

    Network Security Management With High-Level Security Policies

    A key issue in network security management is how to define a formal security policy. A good policy specification should be easy to get right and relatively stable, even in a dynamically changing network. Much work has been done in automating network security management. But the policy languages used are...

    Provided By Princeton University

  • White Papers // Jul 2009

    Hardware-Assisted Application-Level Access Control

    Applications typically rely on the operating system to en-force access control policies such as MAC, DAC, or other policies. How-ever, in the face of a compromised operating system, such protection mechanisms may be ineffective. Since security-sensitive applications are most motivated to maintain access control to their secret or sensitive in-formation,...

    Provided By Princeton University

  • White Papers // Jun 2009

    Can DREs Provide Long-Lasting Security?: The Case of Return-Oriented Programming and the AVC Advantage

    A secure voting machine design must withstand new attacks devised throughout its multi-decade service lifetime. This paper gives a case study of the long-term security of a voting machine, the Sequoia AVC Advantage, whose design dates back to the early 80s. The AVC Advantage was designed with promising security features:...

    Provided By Princeton University

  • White Papers // Nov 2009

    Compound Relay Channel With Informed Relay and Destination

    A two-state compound relay channel is considered where the relay and the destination are informed about the channel state while the source is not. Achievable rates and upper bounds are derived for discrete memoryless and Gaussian models, and specialized to a scenario with orthogonal components. It is shown that, apart...

    Provided By Princeton University

  • White Papers // Sep 2010

    CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution

    Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity with more powerful machines ranging from laptops and desktops to commercial clouds. This paper presents the design and implementation of CloneCloud, a system that automatically transforms...

    Provided By Princeton University

  • White Papers // Apr 2010

    The Multi-Way Relay Channel

    The multiuser communication channel, in which multiple users exchange information with the help of a relay terminal, termed the multi-way Relay Channel (mRC), is introduced. In this model, multiple interfering clusters of users communicate simultaneously, where the users within the same cluster wish to exchange messages among themselves. It is...

    Provided By Princeton University

  • White Papers // Jan 2010

    Understanding and Addressing Blocking-Induced Network Server Latency

    This paper investigate the origin and components of network server latency under various loads and find that filesystem-related kernel queues exhibit head-of-line blocking, which leads to bursty behavior in event delivery and process scheduling. In turn, these problems degrade the existing fairness and scheduling policies in the operating system, causing...

    Provided By Princeton University

  • White Papers // Aug 2011

    The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks With ARQ

    The authors study the tradeoff between reliability, data rate, and delay for half-duplex MIMO multi-hop networks that utilize the Automatic-Retransmission-reQuest (ARQ) protocol both in the asymptotic high Signal-to-Noise Ratio (SNR) regime and in the finite SNR regime. They propose novel ARQ protocol designs that optimize these tradeoffs. In particular, they...

    Provided By Princeton University

  • White Papers // Jul 2009

    Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence Via Max-Min SIR

    Maximizing the minimum weighted SIR, minimizing the weighted sum MSE and maximizing the weighted sum rate in a multiuser downlink system are three important performance objectives in joint transceiver and power optimization, where all the users have a total power constraint. The authors show that, through connections with the nonlinear...

    Provided By Princeton University

  • White Papers // Aug 2011

    Fair Greening of Broadband Access: Spectrum Management for Energy-Efficient DSL Networks

    Dynamic Spectrum Management (DSM) is recognized as a promising technology to reduce power consumption in DSL access networks. However, the correct formulation of power-aware DSM problem statements requires a proper understanding of greening, i.e., reducing power consumption. In this paper, the authors therefore investigate greening and show that it can...

    Provided By Princeton University

  • White Papers // May 2009

    Fair Greening for DSL Broadband Access

    Given that broadband access networks are an integral part of the ICT infrastructure and that DSL is the most widely deployed broadband access technology, greening DSL has become important. The authors' recent work demonstrated a promising trade-off between data rate performance and energy conservation. However, more greening still implies possibly...

    Provided By Princeton University

  • White Papers // Jan 2011

    Optimality Certificate of Dynamic Spectrum Management in Multi-Carrier Interference Channels

    The multi-carrier interference channel where interference is treated as additive white Gaussian noise, is a very active topic of research, particularly important in the area of Dynamic Spectrum Management (DSM) for Digital Subscriber Lines (DSL). Here, multiple users optimize their transmit power spectra so as to maximize the total weighted...

    Provided By Princeton University