Stanford University

Displaying 1-40 of 669 results

  • White Papers // May 2012

    Channel Capacity Under General Nonuniform Sampling

    This paper develops the fundamental capacity limits of a sampled analog channel under a sub-Nyquist sampling rate constraint. In particular, the authors derive the capacity of sampled analog channels over a general class of time-preserving sampling methods including irregular non-uniform sampling. Their results indicate that the optimal sampling structures extract...

    Provided By Stanford University

  • White Papers // May 2012

    EyeQ: Practical Network Performance Isolation for the Multi-Tenant Cloud

    The shared multi-tenant nature of the cloud has raised serious concerns about its security and performance for high valued services. Of many shared resources like CPU, memory, etc., the network is pivotal for distributed applications. Benign, or perhaps malicious traffic interference between tenants can cause significant performance degradation that hurts...

    Provided By Stanford University

  • White Papers // Apr 2012

    Shannon Meets Nyquist: Capacity Limits of Sampled Analog Channels

    The authors explore two fundamental questions at the intersection of sampling theory and information theory: how is channel capacity affected by sampling below the channel's Nyquist rate, and what sub-Nyquist sampling strategy should be employed to maximize capacity. In particular, they first derive the capacity of sampled analog channels for...

    Provided By Stanford University

  • White Papers // Apr 2012

    Synthesis for Optimal Two-Player Decentralized Control Over TCP Erasure Channels With State Feedback

    Recent advances in communication networks and VLSI have made it possible to provide services remotely. In fact, an increasing number of current services and future deployments, such as distributed database management, grid computing, and the smart grid, are now being built over the cloud, making it inevitable that the control,...

    Provided By Stanford University

  • White Papers // Apr 2012

    Coding Strategies for a Class of Decentralized Control Problems With Limited Communication

    The authors propose a large class of decentralized control problems with non-classical information structure for which a coding strategy is optimal. This class is a generalized version of the hats problem with statistically dependent hat colors where implicit communication via action is allowed. They propose a sufficient condition on the...

    Provided By Stanford University

  • White Papers // Mar 2012

    Optimal Cooperative Control of Dynamically Decoupled Systems

    The authors consider optimal cooperative control problems where multiple dynamically decoupled players cooperate to optimize a coupled objective under limited communication between each player. They present the explicit optimal control in terms of the solutions to a series of Riccati equations, therefore it can be computed in a distributed manner...

    Provided By Stanford University

  • White Papers // Mar 2012

    Achievable Error Exponents in the Gaussian Channel With Rate-Limited Feedback

    The authors investigate the achievable error probability in communication over an AWGN discrete time memoryless channel with noiseless delay-less rate-limited feedback. For the case where the feedback rate RFB is lower than the data rate R transmitted over the forward channel, they show that the decay of the probability of...

    Provided By Stanford University

  • White Papers // Mar 2012

    Identity-Based Encryption Is Secure in the Quantum Random Oracle Model

    The authors give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first unconditional proof of security for any scheme in this model. Their techniques are quite general and they use them to obtain (unconditional) security proofs for two random...

    Provided By Stanford University

  • White Papers // Mar 2012

    Improved Security for Linearly Homomorphic Signatures: A Generic Framework

    The authors propose a general framework that converts (ordinary) signature schemes having certain properties into linearly homomorphic signature schemes, i.e., schemes that allow authentication of linear functions on signed data. The security of the homomorphic scheme follows from the same computational assumption as is used to prove security of the...

    Provided By Stanford University

  • White Papers // Feb 2012

    Header Space Analysis: Static Checking for Networks

    Today's networks typically carry or deploy dozens of protocols and mechanisms simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual protocols function correctly, failures can arise from the complex interactions of their aggregate, requiring network administrators to be masters of detail. The authors' goal is to automatically...

    Provided By Stanford University

  • White Papers // Feb 2012

    Less is More: Trading a Little Bandwidth for Ultra-Low Latency in the Data Center

    Traditional measures of network goodness - goodput, quality of service, fairness - are expressed in terms of bandwidth. Network latency has rarely been a primary concern because delivering the highest level of bandwidth essentially entails driving up latency - at the mean and, especially, at the tail. Recently, however, there...

    Provided By Stanford University

  • White Papers // Jan 2012

    Initial Thoughts on Custom Network Processing Via Waypoint Services

    Network operators want additional functionality from the networks they manage. The current approach to add functionality is to deploy middleboxes. Unfortunately middle-boxes raise concerns regarding robustness, correctness, and efficiency due to their need to be deployed at chokepoints. This paper provides some initial thoughts for solving the middlebox problem in...

    Provided By Stanford University

  • White Papers // Jan 2012

    SCD: A Scalable Coherence Directory With Flexible Sharer Set Encoding

    Large-scale CMPs with hundreds of cores require a directory-based protocol to maintain cache coherence. However, previously proposed coherence directories are hard to scale beyond tens of cores, requiring either excessive area or energy, complex hierarchical protocols, or inexact representations of sharer sets that increase coherence traffic and degrade performance. The...

    Provided By Stanford University

  • White Papers // Jan 2012

    Network Congestion Avoidance Through Speculative Reservation

    Congestion caused by hot-spot traffic can significantly degrade the performance of a computer network. In this paper, the authors present the Speculative Reservation Protocol (SRP), a new network congestion control mechanism that relieves the effect of hot-spot traffic in high bandwidth, low latency, lossless computer networks. Compared to existing congestion...

    Provided By Stanford University

  • White Papers // Jan 2012

    Minimum Expected Distortion in Gaussian Layered Broadcast Coding With Successive Refinement

    A transmitter without Channel State Information (CSI) wishes to send a delay-limited Gaussian source over a slowly fading channel. The source is coded in superimposed layers, with each layer successively refining the description in the previous one. The receiver decodes the layers that are supported by the channel realization and...

    Provided By Stanford University

  • White Papers // Jan 2012

    A Methodology for Mapping Multiple Use-Cases Onto Networks on Chips

    A communication-centric design approach, Networks on Chips (NoCs), has emerged as the design paradigm for designing a scalable communication infrastructure for future Systems on Chips (SoCs). As technology advances, the number of applications or use-cases integrated on a single chip increases rapidly. The different use-cases of the SoC have different...

    Provided By Stanford University

  • White Papers // Jan 2012

    Mapping and Configuration Methods for Multi-Use-Case Networks on Chips

    To provide a scalable communication infrastructure for Systems on Chips (SoCs), Networks on Chips (NoCs), a communication centric design paradigm is needed. To be cost effective, SoCs are often programmable and integrate several different applications or use-cases on to the same chip. For the SoC platform to support the different...

    Provided By Stanford University

  • White Papers // Jan 2012

    The Role of SNR in Achieving MIMO Rates in Cooperative Systems

    The authors compare the rate of a multiple-antenna relay channel to the capacity of multiple-antenna systems to characterize the cooperative capacity in different SNR regions. While it is known that in the asymptotic regime, at a high SNR or with a large number of cooperating nodes, cooperative systems lack full...

    Provided By Stanford University

  • White Papers // Jan 2012

    Architectural Support for the Stream Execution Model on General-Purpose Processors

    There has recently been much interest in stream processing, both in industry (e.g., Cell, NVIDIA G80, ATI R580) and academia (e.g., Stanford Merrimac, MIT RAW), with stream programs becoming increasingly popular for both media and more general-purpose computing. Although a special style of programming called stream programming is needed to...

    Provided By Stanford University

  • White Papers // Jan 2012

    Service Differentiation in the Internet to Support Multimedia Traffic

    The current best-effort infrastructure in the Internet lacks key characteristics in terms of delay, jitter, and loss, which are required for multimedia applications (voice, video, and data). Recently, significant progress has been made toward specifying the service differentiation to be provided in the Internet for supporting multimedia applications. In this...

    Provided By Stanford University

  • White Papers // Oct 2011

    Efficient Parallel Graph Exploration on Multi-Core CPU and GPU

    Graphs are a fundamental data representation that have been used extensively in various domains. In graph-based applications, a systematic exploration of the graph such as a Breadth-First Search (BFS) often serves as a key component in the processing of their massive data sets. In this paper, the authors present a...

    Provided By Stanford University

  • White Papers // Oct 2011

    Reduced-Dimension Multiuser Detection

    The authors present a Reduced-Dimension MultiUser Detector (RD-MUD) structure that significantly decreases the number of required correlation branches at the receiver front-end, while still achieving performance similar to that of the conventional Matched-Filter (MF) bank. RD-MUD exploits the fact that the number of active users is typically small relative to...

    Provided By Stanford University

  • White Papers // Oct 2011

    An Explicit Solution for Optimal Two-Player Decentralized Control Over TCP Erasure Channels With State Feedback

    The authors develop an optimal controller synthesis algorithm for decentralized control problems where control actions are transmitted through TCP-like erasure channels. They consider a simple two-player interconnected linear system and Bernoulli distributed erasure channels. They recast the problem to a centralized Partially Observed Markov Decision Process (POMDP) under the fictitious...

    Provided By Stanford University

  • White Papers // Sep 2011

    Decoupling Datacenter Studies From Access to Large-Scale Applications: A Modeling Approach for Storage Workloads

    The cost and power impact of suboptimal storage configurations is significant in DataCenters (DCs) as inefficiencies are aggregated over several thousand servers and represent considerable losses in capital and operating costs. Designing performance, power and cost-optimized systems requires a deep understanding of target workloads, and mechanisms to effectively model different...

    Provided By Stanford University

  • White Papers // Sep 2011

    Micro-Interactions With NFC-Enabled Mobile Phones

    This paper coins the term micro-interactions to refer to the class of small exchanges between devices that occur almost instantaneously. For example, a mobile payment using Near-Field Communication (NFC) is a micro-interaction. The arrival of NFC on smart phones makes possible a wide array of applications using micro-interactions, from sharing...

    Provided By Stanford University

  • White Papers // Aug 2011

    Buffer Sizing in 802.11 Wireless Mesh Networks

    The authors analyze the problem of buffer sizing for TCP flows in 802.11-based Wireless Mesh Networks. Their objective is to maintain high network utilization while providing low queueing delays. The problem is complicated by the time-varying capacity of the wireless channel as well as the random access mechanism of 802.11...

    Provided By Stanford University

  • White Papers // Aug 2011

    Dynamic Fine-Grain Scheduling of Pipeline Parallelism

    Scheduling pipeline-parallel programs, defined as a graph of stages that communicate explicitly through queues, is challenging. When the application is regular and the underlying architecture can guarantee predictable execution times, several techniques exist to compute highly optimized static schedules. However, these schedules do not admit run-time load balancing, so variability...

    Provided By Stanford University

  • White Papers // Aug 2011

    Black-Box Randomized Reductions in Algorithmic Mechanism Design

    The authors give the first black-box reduction from arbitrary approximation algorithms to truthful approximation mechanisms for a non-trivial class of multi-parameter problems. Specifically, they prove that every welfare-maximization problem that admits an FPTAS and can be encoded as a packing problem also admits a truthful-in-expectation randomized mechanism that is an...

    Provided By Stanford University

  • White Papers // Aug 2011

    On the Role of Mobility for Multi-Message Gossip

    In wireless ad hoc or social networks, a variety of scenarios require agents to share their individual information or resources with each other for mutual benefit. A partial list includes file sharing and rumor spreading, distributed computation and parameter estimation, and scheduling and control. Due to the huge centralization overhead...

    Provided By Stanford University

  • White Papers // Jul 2011

    Time and Cost-Efficient Modeling and Generation of Large-Scale TPCC/TPCE/TPCH Workloads

    Large-scale TPC workloads are critical for the evaluation of datacenter-scale storage systems. However, these workloads have not been previously characterized, in-depth, and modeled in a DC environment. In this paper, the authors categorize the TPC workloads into storage threads that have unique features and characterize the storage activity of TPCC,...

    Provided By Stanford University

  • White Papers // Jul 2011

    Uplink Resource Allocation for Frequency Selective Channels and Fractional Power Control in LTE

    The authors consider the allocation of spectral and power resources every subframe (1 ms) on the uplink of the Long Term Evolution (LTE) wideband Orthogonal Frequency Division Multiple Access (OFDMA) cellular network. System bandwidth is divided into multiple sub-bands. The fractional power control to manage interference is allowed to be...

    Provided By Stanford University

  • White Papers // Jun 2011

    Targeted Malleability: Homomorphic Encryption for Restricted Computations

    The authors put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios they would like to restrict the homomorphic computations one can perform on encrypted data. They introduced a precise framework, generalizing the foundational notion of non-malleability introduced by Dolev, Dwork, and Naor (SICOMP '00),...

    Provided By Stanford University

  • White Papers // Jun 2011

    Parallelizing Machine Learning - Functionally

    Implementing machine learning algorithms for large data, such as the Web graph and social networks, is challenging. Even though much research has focused on making sequential algorithms more scalable, their running times continue to be prohibitively long. Meanwhile, parallelization remains a formidable challenge for this class of problems, despite frameworks...

    Provided By Stanford University

  • Webcasts // May 2011

    Innovate For America

    The presenter focuses on advancing technology and innovation to unlock national economic growth and prosperity. In this webcast, the presenter challenges students and entrepreneurs to take action now to bring innovation to the healthcare, education and government sectors.

    Provided By Stanford University

  • White Papers // May 2011

    Performance Implications of Age-Based Allocation in On-Chip-Networks

    Age-based priority is a common mechanism used to improve the fairness and Quality-of-Service (QoS) characteristics of interconnection networks. Packet age can provide remote network state information that enables routers to service packets in a globally optimal fashion. In the Network-on-Chip (NoC) setting, age-based allocation is implemented by assigning priorities to...

    Provided By Stanford University

  • Webcasts // May 2011

    The Value Of True Partnerships

    The presenters are serial entrepreneurs who believe in the fundamental power of partnerships. Empowered by working in close collaboration for years, these co-founders have started multiple companies including Patagon, Lemon Bank and Bling Nation. In this webcast, the presenters describe the value of over-communication, the decision process in making a...

    Provided By Stanford University

  • Webcasts // May 2011

    From Stanford To Startup

    In this webcast, the presenters challenge many of the myths surrounding startups and the lives of entrepreneurs. Both the presenters share their first-hand experiences of the entrepreneurial process, including identifying good problems to solve and the value in building simple solutions and minimum viable products.

    Provided By Stanford University

  • White Papers // May 2011

    The Case for Prefetching and Prevalidating TLS Server Certificates

    A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before a secure connection can be established. The authors propose a mechanism by which a browser can pre-fetch and pre-validate server certificates so that by the time the user clicks on an...

    Provided By Stanford University

  • Webcasts // May 2011

    Reach Your Escape Velocity

    In this webcast, the presenter discusses how companies can build the escape velocity necessary to move beyond the successes and failures of the past. The presenter argues that when companies focus too much on performance, they miss out on building the power to become the industry leaders that other companies...

    Provided By Stanford University

  • White Papers // Apr 2011

    A Dynamic Programming Algorithm for Decentralized Markov Decision Processes With a Broadcast Structure

    The authors give an optimal dynamic programming algorithm to solve a class of finite-horizon decentralized Markov Decision Processes (MDPs). They consider problems with a broadcast information structure that consists of a central node that only has access to its own state but can affect several outer nodes, while each outer...

    Provided By Stanford University

  • White Papers // Aug 2002

    Seasonality and Competition in Time: An Empirical Analysis of Release Date Decisions in the U.S. Motion Picture Industry

    Strong seasonality in demand, a short product life cycle, and the absence of any price competition make the release date of first-run movies one of the main strategic decisions taken by movies? distributors. The absence of good observable measures of product quality creates a difficulty in separately identifying the two...

    Provided By Stanford University

  • White Papers // Sep 2008

    An Empirical Investigation of Opportunistic Programming: Interleaving Web Foraging, Learning, and Writing Code

    This paper investigates the role of online resources in problem solving. The paper looks specifically at how programmers - an exemplar form of knowledge workers - opportunistically interleave Web foraging, learning, and writing code. The paper describes two studies of how programmers use online resources. The first study, conducted in...

    Provided By Stanford University

  • White Papers // Oct 2008

    Hardware Enforcement of Application Security Policies Using Tagged Memory

    Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. This paper shows that enforcement of these policies can be pushed largely into the processor itself, by using tagged memory support, which can...

    Provided By Stanford University

  • White Papers // Jan 2009

    Using Semantic Analysis to Classify Search Engine Spam

    Due to the similarities between spam and non-spam their original semantic analyzers are not an effective method to classify spam content. Since spam and non-spam documents are so similar, it is sometimes very difficult for a human to differentiate between the two. Because of these similarities, it is unlikely that...

    Provided By Stanford University

  • White Papers // Jan 2009

    Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach

    This paper proposes an interference-aware MAC protocol using a simple transmission strategy motivated by a game-theoretic approach. The paper formulates a channel access game, which considers nodes concurrently transmitting in nearby clusters, incorporating a realistic wireless communication model - the SINR model. Under inter-cluster interference, one derives a decentralized transmission...

    Provided By Stanford University

  • White Papers // Oct 2009

    Blueprint for Introducing Innovation Into the Wireless Networks We Use Every Day

    Few changes are occurred in the past couple of years in wireless industry: Handsets have become mobile computers running user-contributed applications on (potentially) open operating systems. It seems world is on an unstoppable path towards a more open ecosystem; one that has been previously closed and proprietary. The biggest winners...

    Provided By Stanford University

  • White Papers // Nov 2008

    Game-Based Admission Control for Wireless Systems

    Much previous work has examined the wireless power control problem using tools from game theory, an economic concept which describes the behavior of interdependent but non-cooperative users. This paper expands these ideas to the antecedent process of deciding which users may participate in the network, i.e. the admission control problem....

    Provided By Stanford University

  • Webcasts // Jul 2009

    The Spread of Web-Based Malware and New Defenses

    Web sites and web pages have become the new frontier for malware distribution. Over the past two years, there has been a fundamental shift in how malware is distributed - while teenagers used to write viruses which required users to click on email attachments to propagate, financially motivated cybercriminals now...

    Provided By Stanford University

  • White Papers // Jul 2009

    Embedded Management Interfaces: Emerging Massive Insecurity

    T he secure embedded management interface project is being conducted at the Stanford Security Lab. Its objective is to assess the state of the art of embedded management interfaces and develop more secure solutions. This paper summarizes the result of the first part of project: the assessment of the security...

    Provided By Stanford University

  • White Papers // Jan 2009

    Cache-Collision Timing Attacks Against AE

    This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. It defines a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should...

    Provided By Stanford University

  • White Papers // Feb 2009

    Physical Pseudo Random Function in Radio Frequency Sources for Security

    There is tremendous market potential for Location-Based Services (LBS), enabled by the rapid growth in the numbers of personal navigation devices and GPS-enabled mobile handsets. One of the major difficulties for LBS applications is accurate and reliable indoor positioning caused by the difficulty of acquiring and tracking GPS satellite signals...

    Provided By Stanford University

  • White Papers // Jan 2010

    Ground Station Virtualization

    This paper discusses the application of the end-to-end principle to ground station systems. It states that lower layers of systems should support the widest possible variety of services and functions. This is applied to ground stations to derive a core set of services that are used across multiple missions while...

    Provided By Stanford University

  • White Papers // Dec 2008

    Towards Service Enabled Network Architecture (SENA) Service Directory and Routing in OpenFlow Network

    The way that users use the Internet changed from host-to-host communications to service-oriented paradigms. Develop, deploy, advertise and use services in the networks become very challenging due to the historical design of the networks and the nature of coupling service with transport layer network. This calls for novel architectural designs...

    Provided By Stanford University

  • White Papers // Dec 2009

    Unifying Packet and Circuit Switched Networks With OpenFlow

    There have been many attempts to unify the control and management of circuit and packet switched networks, but none have taken hold. This paper proposes a simple way to unify both types of network using OpenFlow. The basic idea is that a simple flow abstraction fits well with both types...

    Provided By Stanford University

  • White Papers // Sep 2009

    Unifying Packet and Circuit Switched Networks

    There have been many attempts to unify the control and management of circuit and packet switched networks, but none have taken hold. This paper proposes a simple way to unify both types of network using OpenFlow. The basic idea is that a simple flow abstraction fits well with both types...

    Provided By Stanford University

  • Case Studies // Aug 2009

    Performance of XML-Based Applications: A Case-Study

    One of the most challenging situations that High Wire has faced as an organization is educating everyone within the organization. Their developers have always demanded better documentation and clearer explanation of how the new systems work. Keeping this in mind, in 2006 High Wire was wondering if implementing a radical...

    Provided By Stanford University

  • White Papers // May 2009

    Internet-in-a-Box: Emulating Datacenter Network Architectures Using FPGAs

    The Internet-in-a-Box datacenter network emulator is an FPGA-based tool for researchers to rapidly experiment with O (10,000) node datacenter network architectures. The basic approach to emulation involves constructing a model of the target architecture by composing simplified hardware models of key datacenter building blocks, including switches, routers, links, and servers....

    Provided By Stanford University

  • White Papers // Jan 2010

    A Modular Correctness Proof of IEEE 802.11i and SSL/TLS

    When networks are required to have mutual authentication between network access point and user devices, the IEEE 802.11i wireless networking protocol is often put to use. This authentication is usually provided before user connectivity and it comprises several parts such as an 802.1X authentication phase, allowing TLS over EAP, the...

    Provided By Stanford University

  • White Papers // Feb 2009

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    There is a new method to prevent attacks on authentication and access control bypass in web based applications. This method is called Nemesis. How Nemesis works is that it uses Dynamic Information Flow Tracking to identify whenever users that are application specific are being authenticated and then makes use of...

    Provided By Stanford University

  • White Papers // Apr 2009

    Delegation Vs. Control Of Component Procurement Under Asymmetric Cost Information & Price-Only Contracts

    A manufacturer must choose to delegate component procurement to her tier-1 supplier, or to control component procurement by contracting with both the tier-1 supplier and the tier-2 component supplier. Each supplier knows its own production cost, but the other firms have only limited information about that cost. If the firms...

    Provided By Stanford University

  • White Papers // Jul 2008

    Quota Dynamics And The Intertemporal Allocation Of Sales-Force Effort

    The authors empirically investigate the effect of sales-force compensation schemes on the intertemporal allocation of sales-agents effort. Real-world sales force compensation schemes are typically concave and non-linear, involving quotas and bonuses that depend on outputs. Such non-linearities may introduce intertem-poral inefficiencies, arising from the potential for strategic timing on the...

    Provided By Stanford University

  • White Papers // Jan 2010

    Beating The Crowd At Picking Stocks

    Charles Lee's portfolio management style requires accounting for human biases to nudge prices closer to their real value. By now, the fallout from the epic financial crisis is both familiar and tangible: foreclosed mortgages, failed banks, lost jobs, recession. On the less tangible side, the meltdown also shook faith in...

    Provided By Stanford University

  • White Papers // May 2010

    Nonprofits Are Seen As Warm And For-Profits As Competent: Firm Stereotypes Matter

    Consumers use warmth and competence, two fundamental dimensions that govern social judgments of people, to form perceptions of firms. Three experiments showed that consumers perceive nonprofits as being warmer than for-profits but as less competent. Further, consumers are less willing to buy a product made by a nonprofit than a...

    Provided By Stanford University

  • White Papers // Oct 2009

    Eliminating Sales Quotas May Stimulate Profits

    Eliminating sales quotas boosts company profits says Professor Harikesh Nair. In one case, the new sales compensation plan without quotas resulted in a 9% improvement in overall revenues, which translates to about $1 million of incremental revenues per month. How do you pay your sales force in a way that...

    Provided By Stanford University

  • White Papers // Sep 2008

    Firms Survive By Recognizing Fundamental Industry Changes

    Enduring companies survive because employees throughout the firm, not just those in the executive suite, learn to keep an eye on how related industries are evolving. Longevity comes not just from matching the competition but also from recognizing fundamental changes in how the game is played and moving strategically to...

    Provided By Stanford University

  • White Papers // Jan 2010

    Outsourcing May Hurt Fashion Manufacturers' Bottom Line

    Fast fashion-designing products that capture the latest consumer trends, and then spending extra money to get them to market quickly, can be well worth the extra expense, increasing profits exponentially, says Stanford Graduate School of Business Professor Robert Swinney, coauthor of a recent study. Most companies in the fashion industry...

    Provided By Stanford University

  • White Papers // Sep 2008

    Businesses Can Win The Competition With Open-Source Technology

    How can a business compete with a free product? It's not easy, and it's more than just a theoretical question. U.S. newspapers are finding it difficult to compete with free news and the commentary of bloggers and other internet sources. And in the software world, the rise of open source...

    Provided By Stanford University

  • White Papers // Aug 2008

    Investment Needed In Nonprofit Policy Work

    Nonprofits can do a lot more to help shape the public policies that affect their work and constituents. Working to fix flawed policies at the root of social problems is a key role nonprofits should play. But far too many nonprofits fail to play that role because of concerns that...

    Provided By Stanford University

  • White Papers // Jan 2010

    Services Market Is Key To Open Source Software

    Open source software has become a major and fast-growing presence in the computer industry in recent years. Professor Tunay Tunca of Stanford Graduate School of Business and his co-authors argue that the key factor in whether to create open source software is the strength of the market for support, integration,...

    Provided By Stanford University

  • White Papers // Nov 2008

    Developing Nations Offer Big Market Opportunities

    Paul Otellini knows a thing or two about making unorthodox career moves. In 2005, he became the first non-engineer named to the top post at Santa Clara-based Intel, the world's leading manufacturer of microprocessors for personal and business computing. His wide-ranging background at Intel contributed to his professional rise. Likewise,...

    Provided By Stanford University

  • White Papers // Jun 2009

    Specializing Can Mean Bigger Sales

    Product creators whose offerings or expertise are more clearly associated with one or two product categories have better sales than those whose goods or professional identity span multiple categories, according to a recently-published study. The more focused producers throw off subtle hints that they know their stuff a little better,...

    Provided By Stanford University

  • White Papers // Sep 2009

    You Can't Buy It If You Don't Know It Exists

    Rock groups can lose as much as 40% of their potential sales because consumers don't know enough about them, says the Stanford Business School's Alan Sorensen. There are lots of crowded markets out there where lack of information skews sales. You won't see anything written about bands like the Foo...

    Provided By Stanford University

  • White Papers // Jan 2010

    Sales Simulator Throws Curveballs To Students

    Sloan Fellow Jonathan Solomon has renewed sympathy for sales managers - particularly those he used to employ. That's because he took a Business School elective titled Building and Managing Professional Sales Organizations, a class that simulates the world of selling portable ultrasound devices. "I used to crush the VP of...

    Provided By Stanford University

  • White Papers // Feb 2009

    Selling Vs. Selling Out

    The real question is not whether social investing will become real, or whether it will become a more important asset class. Social investment is growing, and its growth is in line with societal trends that are both on the rise in their acceptance and in line with the realities of...

    Provided By Stanford University

  • White Papers // Jul 2009

    "The Time Vs. Money Effect": Shifting Product Attitudes And Decisions Through Personal Connection

    The results of five field and laboratory experiments reveal a "Time versus money effect" whereby activating time (vs. money) leads to a favorable shift in product attitudes and decisions. Because time increases focus on product experience, activating time (vs. money) augments one's personal connection with the product, thereby boosting attitudes...

    Provided By Stanford University

  • White Papers // Sep 2009

    Two Roads To Updating Brand Personality Impressions: Trait Versus Evaluative Inferencing

    This paper examines the dynamic process of inference updating. The authors present a framework that delineates two mechanisms that guide the updating of personality trait inferences about brands. The results of three experiments show that chronics (those for whom the trait is accessible) update their initial inferences on the basis...

    Provided By Stanford University

  • White Papers // Apr 2010

    Certified Lies: Detecting And Defeating Government Interception Attacks Against SSL

    This paper introduces compelled certificate creation attack, in which government agencies may compel a certificate authority to issue false SSL certificates that can be used by intelligence agencies to covertly intercept and hijack individuals' secure Web-based communications. Although, no direct evidences are available that this form of active surveillance is...

    Provided By Stanford University

  • White Papers // Jun 2009

    An Improved Method For The Quantitative Assessment Of Customer Priorities

    A number of marketing contexts require the quantitative assessment of customer priorities like - Consider the introduction of a newer version of a product, or consider enhancing a service such as a hotel or a airline. The focus in this paper is on measuring the importance's (or values) customers attach...

    Provided By Stanford University

  • White Papers // Jun 2009

    The Stock Market's Pricing Of Customer Satisfaction

    A number of recent marketing studies examine the stock market's response to the release of American Customer Satisfaction Index (ACSI) scores. The broad purpose of these studies is to investigate the stock market's valuation of customer satisfaction. However, a key focus is on whether customer satisfaction information predicts long-run returns....

    Provided By Stanford University

  • White Papers // Jan 2010

    Building Sustainable Organizations: The Human Factor

    Although most of the research and public pressure concerning sustainability has been focused on the effects of business and organizational activity on the physical environment, companies and their management practices profoundly affect the human and social environment as well. This paper briefly reviews the literature on the direct and indirect...

    Provided By Stanford University