UC Regents

Displaying 1-40 of 287 results

  • White Papers // Apr 2015

    Per-Core DVFS With Switched-Capacitor Converters for Energy Efficiency in Manycore Processors

    Integrating multiple power converters on-chip improves energy efficiency of many core architectures. Switched Capacitor (SC) DC-DC converters are compatible with conventional CMOS processes, but traditional implementations suffer from limited conversion efficiency. The authors propose a dynamic voltage and frequency scaling scheme with SC converters that achieves high converter efficiency by...

    Provided By UC Regents

  • White Papers // Nov 2014

    Constrained Interpolation for Guided Logic Synthesis

    Craig interpolation is a known method for expressing a target function f as a function of a given set of base functions G. The resulting interpolant represents the dependency function h, such that f

    Provided By UC Regents

  • White Papers // Apr 2014

    m-Inductive Properties of Logic Circuits

    In this paper, the authors introduce the concept of m-inductiveness over a set of signals S in a sequential circuit. The m-inductive property can be used for equivalence-checking or improved sequential optimization. When applied to verification, only equivalency of signals in S and primary outputs need to be checked. When...

    Provided By UC Regents

  • White Papers // Apr 2014

    Enumeration of Irredundant Circuit Structures

    A new approach to Boolean decomposition and matching is proposed. It uses enumeration of all support-reducing decompositions of Boolean functions up to 16 inputs. The approach is implemented in a new framework that compactly stores multiple circuit structures. The method makes use of pre-computations performed offline, before the framework is...

    Provided By UC Regents

  • White Papers // Oct 2013

    Algebraic MACs and Keyed-Verification Anonymous Credentials

    The authors consider the problem of constructing anonymous credentials for use in a setting where the issuer of credentials is also the verifier, or more generally where the issuer and verifier have a shared key. In this setting they can use Message Authentication Codes (MACs) instead of public key signatures...

    Provided By UC Regents

  • White Papers // Oct 2013

    New Trapdoor Projection Maps for Composite-Order Bilinear Groups

    An asymmetric pairing over groups of composite order is a bilinear map e: G1 G2 - GT for groups G1 and G2 of composite order N = pq. The authors observe that a recent construction of pairing-friendly elliptic curves in this setting by the researcher exhibits surprising and unprecedented structure:...

    Provided By UC Regents

  • White Papers // Jun 2013

    Measuring the Practical Impact of DNSSEC Deployment

    DNSSEC extends DNS with a public-key infrastructure, providing compatible clients with cryptographic assurance for DNS records they obtain, even in the presence of an active network attacker. As with many internet protocol deployments, administrators deciding whether to deploy DNSSEC for their DNS zones must perform cost/benefit analysis. For some fraction...

    Provided By UC Regents

  • White Papers // Jun 2012

    Establishing Browser Security Guarantees through Formal Shim Verification

    Web browsers mediate access to valuable private data in domains ranging from health care to banking. Despite this critical role, attackers routinely exploit browser vulnerabilities to exfiltrate private data and take over the underlying system. The authors present QUARK, a browser whose kernel has been implemented and verified in Coq....

    Provided By UC Regents

  • White Papers // Mar 2012

    Logic Synthesis for Disjunctions of Boolean Functions

    In this paper, the authors develop theoretical foundations and present a practical algorithm for optimizing multi-output Boolean function M(x) whose outputs are combined using Boolean OR operator into a single-output Boolean function S(x). The proposed algorithm simplifies the logic structure of function M(x) and may change or remove some of...

    Provided By UC Regents

  • White Papers // Mar 2012

    Sequential Logic Synthesis Using Symbolic Bi-Decomposition

    The authors review some general theorems, proved in a previous paper, about situations when SEC can be reduced to a Combinational Equivalence Checking (CEC) problem. Then, they show how these can be applied to the verification of sequentially clock-gated circuits. A new method based on these theorems was applied to...

    Provided By UC Regents

  • White Papers // Feb 2012

    Multiple-Input Relay Design for More Compact Implementation of Digital Logic Circuits

    Multiple-input relays have been proposed to implement digital logic more compactly than single-input relays. Although a multiple-input relay has a larger footprint than a single-input relay for the same input voltage range, the reduction in device count is advantageous because of the significant area required for the suspension beams and...

    Provided By UC Regents

  • White Papers // Nov 2011

    Characterization of Dynamic SRAM Stability in 45 nm CMOS

    Optimization of SRAM yield using dynamic stability metrics has been evaluated in the past to ensure continued scaling of bit-cell size and supply voltage in future technology nodes. Various dynamic stability metrics have been proposed but they have not been used in practical failure analysis and compared with conventional static...

    Provided By UC Regents

  • White Papers // Aug 2011

    Improved Spectrum Access Control of Cognitive Radios Based on Primary ARQ Signals

    Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilization. In this paper, the authors present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme...

    Provided By UC Regents

  • White Papers // Aug 2011

    Quality-of-Information Aware Networking for Tactical Military Networks

    In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information....

    Provided By UC Regents

  • White Papers // Aug 2011

    FERMI: A FEmtocell Resource Management System for Interference Mitigation in OFDMA Networks

    The demand for increased spectral efficiencies is driving the next generation broadband access networks towards deploying smaller cells (femtocells) and sophisticated air interface technologies (Orthogonal Frequency Division Multiple Access or OFDMA). The dense deployment of femtocells however, makes interference and hence resource management both critical and extremely challenging. In this...

    Provided By UC Regents

  • White Papers // Aug 2011

    LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement

    Network-wide traffic measurement is of interest to network operators to uncover global network behavior for the management tasks of traffic accounting, debugging or troubleshooting, security, and traffic engineering. Increasingly, sophisticated network measurement tasks such as anomaly detection and security forensic analysis are requiring in-depth fine-grained flow-level measurements. However, performing in-depth...

    Provided By UC Regents

  • White Papers // Jul 2011

    On the Empirical Performance of Self-Calibrating WiFi Location Systems

    The pervasive deployment of 802.11 in modern enterprise buildings has long made it an attractive technology for constructing indoor location services. To this end, a broad range of algorithms have been proposed to accurately estimate location from 802.11 signal strength measurements, some without requiring manual calibration for each physical location....

    Provided By UC Regents

  • White Papers // Jul 2011

    Quasi-Planar Bulk CMOS Technology for Improved SRAM Scalability

    Following Moore's law, transistor density has roughly doubled with each new CMOS technology generation largely due to the steady miniaturization of the transistor. A simple approach for manufacturing quasi-planar bulk MOSFET structures is demonstrated and shown to be effective not only for improving device performance but also for reducing variation...

    Provided By UC Regents

  • White Papers // Jul 2011

    Enhanching in Vehicle Digital Maps Via GPS Crowdsourcing

    In this paper, the authors propose a simple and effective method to extend digital maps with the location and timing of stop-signs and traffic lights in a city, given GPS traces collected by on-road vehicles. Their system finds the location and timing of traffic lights and stop-signs using a small...

    Provided By UC Regents

  • White Papers // Jul 2011

    TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion

    Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are ineffective on smartphones without physical keyboards. The authors describe a new side channel, motion, on touch screen smartphones with only soft keyboards. Since typing on different locations on the screen causes different...

    Provided By UC Regents

  • White Papers // Jul 2011

    Cooperative Jamming for Secure Communications in MIMO Relay Networks

    Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. In these approaches, the normally inactive nodes in the relay network can be used as cooperative jamming sources...

    Provided By UC Regents

  • White Papers // Jul 2011

    No Plan Survives Contact: Experience With Cybercrime Measurement

    An important mode of empirical security research involves analyzing the behavior, capabilities, and motives of adversaries. By definition, such measurements cannot be conducted in controlled settings and require "Engagement" directly with adversaries, their infrastructure or their ecosystem. However, the operational complexities required to successfully carry out such measurements are significant...

    Provided By UC Regents

  • White Papers // Jul 2011

    Improving the Way We Design Games for Learning by Examining How Popular Video Games Teach

    One of the reasons why commercial video games are popular is that they effectively teach players how to play the game - in many cases as the player plays the game itself. This paper focuses on how to effectively integrate teaching "How to play a game" with teaching an "Instructional...

    Provided By UC Regents

  • White Papers // Jul 2011

    Variability of Location Management Costs With Different Mobilities and Timer Periods to Update Locations

    In this paper, the authors examine the location management costs in mobile communication networks utilizing the timer-based method. From the study of the probabilities that a mobile terminal changes a number of Location Areas between two calls, they identify a threshold value of 0.7 for the Call-to-Mobility Ratio (CMR) below...

    Provided By UC Regents

  • White Papers // Jul 2011

    Performance and Yield Benefits of Quasi-Planar Bulk CMOS Technology for 6-T SRAM at the 22-nm Node

    The performance and threshold voltage variability of quasi-planar bulk MOSFETs are compared against those of conventional bulk MOSFETs, via Three-Dimensional (3-D) device simulations with gate line-edge roughness and atomistic doping profiles, at 25nm gate length. The nominal performance of Six Transistor (6-T) SRAM cells is studied via 3-D simulation of...

    Provided By UC Regents

  • White Papers // Jun 2011

    Measuring Pay-Per-Install: The Commoditization of Malware Distribution

    Recent years have seen extensive diversification of the "Underground economy" associated with malware and the subversion of Internet-connected systems. This trend towards specialization has compelling forces driving it: miscreants readily apprehend that tackling the entire value-chain from malware creation to monetization in the presence of ever-evolving countermeasures poses a daunting...

    Provided By UC Regents

  • White Papers // Jun 2011

    BOTMAGNIFIER: Locating Spambots on the Internet

    Unsolicited bulk email (spam) is used by cyber-criminals to lure users into scams and to spread malware infections. Most of these unwanted messages are sent by spam botnets, which are networks of compromised machines under the control of a single (malicious) entity. Often, these botnets are rented out to particular...

    Provided By UC Regents

  • White Papers // May 2011

    Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

    This paper provides a comprehensive treatment of the security of Authenticated Encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. The authors present attacks showing that...

    Provided By UC Regents

  • White Papers // May 2011

    Just-in-Time Compilation for FPGA Processor Cores

    Portability benefits have encouraged the trend of distributing applications using processor-independent instructions, a.k.a. bytecode, and executing that bytecode on an emulator running on a target processor. Transparent Just-In-Time (JIT) compilation of bytecode to native instructions is often used to increase application execution speed without sacrificing portability. Recent work has proposed...

    Provided By UC Regents

  • White Papers // May 2011

    Concurrently Secure Computation in Constant Rounds

    The authors study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, a meaningful notion of concurrent security based on Super-Polynomial...

    Provided By UC Regents

  • White Papers // May 2011

    Exploring the Effects of Feed-Forward and Feedback on Information Disclosure and User Experience in a Context-Aware Recommender System

    When disclosing information to a recommender system, users need to trade off its usefulness for receiving better recommendations with the privacy risks incurred through its disclosure. The paper describes a series of studies that will investigate the use of feed-forward and feedback messages to inform users about the potential usefulness...

    Provided By UC Regents

  • White Papers // May 2011

    RFID Assisted Vehicle Positioning in VANETs

    With technological advancement, recent VANET applications such as safe driving and emergency rescue often demand high position accuracy. Unfortunately, however, conventional localization systems, e.g., GPS, hardly meet new accuracy requirements. To overcome this limitation, this paper proposes an RFID-assisted localization system. The proposed system employs the DGPS concept to improve...

    Provided By UC Regents

  • White Papers // May 2011

    Some Issues in WSN, MANET and Cellular Security

    In this position paper, the authors address some current limitations and challenges as well as emerging directions in three related areas of secure communication: security in Wireless Sensor Networks - WSNs, security in Mobile Ad hoc NETworks - MANETs, and security in Cellular Phone Networks. Sensors that obtain information by...

    Provided By UC Regents

  • White Papers // May 2011

    Analyzing Interaction Communication Networks in Enterprises and Identifying Hierarchies

    With the proliferation of electronic modes of communication (e.g., e-mails, short messages), a group of people in an enterprise can form several distinct Communication Interaction Networks, or CINs for short. A CIN is essentially a graph representation of "Who talks to whom" among a group of individuals. In this paper,...

    Provided By UC Regents

  • White Papers // May 2011

    Correlated-Input Secure Hash Functions

    The authors undertake a general study of hash functions secure under correlated inputs, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs. Such a property is satisfied by a random oracle, and its importance is illustrated by study of the "Avalanche effect,"...

    Provided By UC Regents

  • White Papers // May 2011

    Database-Agnostic Transaction Support for Cloud Infrastructures

    In this paper, the authors present and empirically evaluate the performance of Database-Agnostic Transaction (DAT) support for the cloud. Their design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Their approach enables applications to employ a single transactional datastore API that...

    Provided By UC Regents

  • White Papers // May 2011

    SAIL: A Scalable Approach for Wide-Area IP Mobility

    The Internet is becoming increasingly mobile, with not only smartphones outnumbering stationary hosts, but also cars, buses, trains and airplanes all coming online. This makes Internet mobility support more important than ever. However, the existing standard mobility support protocols, mainly Mobile IPv6 and NEtwork MObility (NEMO), suffer from triangle routing...

    Provided By UC Regents

  • White Papers // May 2011

    On the Symmetry of User Mobility in Wireless Networks

    In this paper analyzed WLAN - GPS -and synthetic traces that record mobility in a variety of network environments. The authors observe that from a macroscopic level, human mobility is symmetric. In other words, the number of users that move from point A to point B approximates the number of...

    Provided By UC Regents

  • White Papers // May 2011

    GQ: Practical Containment for Measuring Modern Malware Systems

    Measurement and analysis of modern malware systems such as botnets relies crucially on execution of specimens in a setting that enables them to communicate with other systems across the Internet. Ethical, legal, and technical constraints, however, demand containment of resulting network activity in order to prevent the malware from harming...

    Provided By UC Regents

  • White Papers // May 2011

    A Comparitive Study of Achievability of Security Against Related-Key Attack

    This paper begins with a practical contribution, namely a way to leverage the RKA security of blockciphers to provide RKA security for a suite of high-level primitives. This motivates a more general theoretical question, namely, when is it possible to transfer RKA security from a primitive P1 to a primitive...

    Provided By UC Regents

  • White Papers // Oct 2009

    Ziv-Lempel Data Compression

    Large text or graphics files are often compressed in order to save storage space or to speed up transmission when the file is shipped. Most operating systems have compression utilities, and some file transfer programs automatically compress, ship, and uncompress the file, without user intervention. However, a popular compression method...

    Provided By UC Regents

  • White Papers // Sep 2010

    Development And Freedom As Risk Management

    The author has argued that many development and freedom measures such as health, education, political and civil liberties are important constituents of human welfare. The author concur with conjecture that an important reason these measures affect human welfare is because they allow individuals to better cope with risk and uncertainty...

    Provided By UC Regents

  • White Papers // Jan 2011

    Induced Churn as Shelter From Routing-Table Poisoning

    Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving millions of user-managed machines on the Internet. In this paper the authors address routing-table poisoning attacks against structured overlays, in which adversaries attempt to intercept...

    Provided By UC Regents

  • White Papers // Sep 2009

    Reflections on UNIX Vulnerabilities

    The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded its functionality, and became the basis for commercial, infrastructure, and home systems, vulnerabilities in the system affected its robustness and security. This paper presents a brief history...

    Provided By UC Regents

  • White Papers // Sep 2010

    Ten Years Past and Ten Years From Now

    Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of the lives, and the interconnections with more traditional academic disciplines such as analysis of...

    Provided By UC Regents

  • White Papers // Oct 2010

    A Data-First Architecture for Unstructured Wireless Networks

    The authors have returned to the drawing board to rethink the basic approach to unstructured wireless networks connected or disconnected multi-hop wireless networks whose topology is in a constant state of ux. Current protocols for these networks tend to adopt the Internet protocol stack, originally designed for static, wired networks....

    Provided By UC Regents

  • White Papers // Nov 2008

    Joint Guidance on the Application of the Family Educational Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to Student Health Records

    The purpose of this guidance is to explain the relationship between the Family Educational Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule, and to address apparent confusion on the part of school administrators, health care professionals, and others as to...

    Provided By UC Regents

  • White Papers // Sep 2009

    Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine

    Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is common to see cryptographic protocols rely on the assumption that fresh random numbers can be continually generated. In this paper, the authors...

    Provided By UC Regents

  • White Papers // Nov 2009

    Secure Message Transmission With Small Public Discussion

    In the problem of Secure Message Transmission in the Public Discussion model (SMT-PD), a Sender wants to send a message to a Receiver privately and reliably. Sender and Receiver are connected by n channels, up to t < n of which may be maliciously controlled by a computationally unbounded adversary,...

    Provided By UC Regents

  • White Papers // Sep 2009

    Fuzzy Privacy Preserving Peer-to-Peer Reputation Management

    The P2PRep algorithm is a reputation-management mechanism in which a peer uses fuzzy techniques to compute local reputations and aggregates these results to compute a global reputation for another peer which has made an offer of service. While this mechanism is known to be extremely effective in the presence of...

    Provided By UC Regents

  • White Papers // Oct 2010

    New Constructions for UC Secure Computation Using Tamper-Proof Hardware

    The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. Unfortunately it was shown that in the so called plain model, a large class of functionalities cannot be securely realized. These severe impossibility results motivated...

    Provided By UC Regents

  • White Papers // Jan 2011

    A Replicated Monitoring Tool

    Modeling the reliability of distributed systems requires a good understanding of the reliability of the components. Careful modeling allows highly fault-tolerant distributed applications to be constructed at the least cost. Realistic estimates can be found by measuring the performance of actual systems. An enormous amount of information about system performance...

    Provided By UC Regents

  • White Papers // Jan 2011

    On Improving the Availability of Replicated Files

    To improve the availability and reliability of les the data are often replicated at several sites. A scheme must then be chosen to maintain the consistency of the le contents in the presence of site failures. The most commonly used scheme is voting. Voting is popular because it is simple...

    Provided By UC Regents

  • White Papers // Jan 2011

    Exploiting Multiple I/O Streams to Provide High Data-Rates

    The authors present an I/O architecture, called Swift, that addresses the problem of data-rate mismatches between the requirements of an application, the maximum data-rate of the storage devices, and the data-rate of the interconnection medium. The goal of Swift is to support integrated continuous multimedia in general purpose distributed systems....

    Provided By UC Regents

  • White Papers // Jan 2011

    A Dynamic Disk Spin-Down Technique for Mobile Computing

    The authors address the problem of deciding when to spin down the disk of a mobile computer in order to extend battery life. Since one of the most critical resources in mobile computing environments is battery life, good energy conservation methods can dramatically increase the utility of mobile systems. They...

    Provided By UC Regents

  • White Papers // Jan 2011

    Using an Object-Oriented Framework to Construct Wide-Area Group Communication Mechanisms

    Many wide-area distributed applications, including distributed databases, can be implemented using a group communication mechanism. The authors have developed a family of weak-consistency group communication mechanisms, based on the timestamped anti-entropy communication protocol, that provides the scalability and fault-tolerance needed by wide-area systems. They discuss an object-oriented framework for constructing...

    Provided By UC Regents

  • White Papers // May 2010

    A Realistic Evaluation of Consistency Algorithms for Replicated Files

    Data are often replicated in distributed systems to protect them against site failures and network malfunctions. When this is the case, an access policy must be chosen to insure that a consistent view of the data is always presented. Voting protocols guarantee consistency of replicated data in the presence of...

    Provided By UC Regents

  • White Papers // Oct 2010

    Safety-Guarantee Controller Synthesis for Cyber-Physical Systems

    The verification and validation of cyber-physical systems is known to be a difficult problem due to the different modeling abstractions used for control components and for software components. A recent trend to address this difficulty is to reduce the need for verification by adopting correct-by-design methodologies. According to the correct-by-design...

    Provided By UC Regents

  • White Papers // Jan 2011

    Storing and Querying Multiversion XML Documents Using Durable Node Numbers

    Managing multiple versions of XML documents represents an important problem for many traditional applications, such as software configuration control, as well as new ones, such as link permanence of web documents. Research on managing multiversion XML documents seeks to provide efficient and robust techniques for storing, retrieving and querying such...

    Provided By UC Regents

  • White Papers // Oct 2009

    An Energy Efficient Wireless Communication Mechanism for Sensor Node Cluster Heads

    This paper presents an efficient mechanism to achieve significant energy savings in heterogeneous wireless sensor networks such as HPWREN. Environmental sensors are typically located in remote and hard-to-reach locations far from the main high-bandwidth data links. Therefore the sensed data needs to be routed through multiple hops before reaching the...

    Provided By UC Regents

  • White Papers // Jan 2010

    A Taxonomy of Buffer Overflow Preconditions

    Recent work on vulnerabilities has focused on buffer overflows, in which data exceeding the bounds of an array is loaded into the array. The loading continues past the end of the array, causing variables and state information to change. As the process is not programmed to check for these additional...

    Provided By UC Regents

  • White Papers // Dec 2009

    Scalable Detection of Similar Code: Techniques and Applications

    Similar code, also known as cloned code, commonly exists in large software. Studies show that code duplication can incur higher software maintenance cost and more software defects. Thus, detecting similar code and tracking its migration have many important applications, including program understanding, refactoring, optimization, and bug detection. This dissertation presents...

    Provided By UC Regents

  • White Papers // Jan 2011

    Events Can Make Sense

    Tame is a new event-based system for managing concurrency in network applications. Code written with Tame abstractions does not suffer from the "Stack-ripping" problem associated with other event libraries. Like threaded code, tamed code uses standard control flow, automatically-managed local variables, and modular interfaces between callers and callees. Tame's implementation...

    Provided By UC Regents

  • White Papers // Jun 2010

    CapStart: A Path Capacity Adaptive TCP Slow Start for High Speed Network

    In this paper, the authors introduce CapStart TCP, an adaptive Slow Start scheme that consistently achieves fast TCP file transfer times regardless of high speed network scenario. Once the TCP session is established, they estimate TCP session path capacity scenario, and tune the transport protocol to deliver fast transfer times....

    Provided By UC Regents

  • White Papers // Feb 2010

    Secure, Selective Group Broadcast in Vehicular Networks Using Dynamic Attribute Based Encryption

    Ciphertext-Policy Attribute Based Encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is logically composed of attributes; receivers are able to decrypt the message when their attributes satisfy the policy tree. A user's attributes stand...

    Provided By UC Regents

  • White Papers // Jan 2011

    Modeling and Dynamic Management of 3D Multicore Systems With Liquid Cooling

    Three-Dimensional (3D) circuits reduce communication delay in multicore SoCs, and enable efficient integration of cores, memories, sensors, and RF devices. However, vertical integration of layers exacerbates the reliability and thermal problems, and cooling efficiency becomes a limiting factor. Liquid cooling is a solution to overcome the accelerated thermal problems imposed...

    Provided By UC Regents

  • White Papers // Jan 2011

    Temperature-And Cost-Aware Design of 3D Multiprocessor Architectures

    3D stacked architectures provide significant benefits in performance, footprint and yield. However, vertical stacking increases the thermal resistances, and exacerbates temperature induced problems that affect system reliability, performance, leakage power and cooling cost. In addition, the overhead due to Through-Silicon-Vias (TSVs) and scribe lines contribute to the overall area, affecting...

    Provided By UC Regents

  • White Papers // Jan 2011

    Utilizing Predictors for Efficient Thermal Management in Multiprocessor SoCs

    Conventional thermal management techniques are reactive in nature; that is, they take action after temperature reaches a predetermined threshold value. Such approaches do not always minimize and balance the temperature on the chip, and furthermore, control temperature at a noticeable performance cost. In this paper, the authors investigate how to...

    Provided By UC Regents

  • White Papers // Dec 2009

    GentleCool: Cooling Aware Proactive Workload Scheduling in Multi-Machine Systems

    In state of the art systems, workload scheduling and server fan speed operate independently leading to cooling inefficiencies. In this paper the authors propose GentleCool, a proactive multi-tier approach for significantly lowering the fan cooling costs without compromising the performance. The technique manages the fan speed through intelligently allocating the...

    Provided By UC Regents

  • White Papers // Nov 2009

    Hybrid Dynamic Energy and Thermal Management in Heterogeneous Embedded Multiprocessor SoCs

    Heterogeneous MultiProcessor System-on-Chips (MPSoCs) which consist of cores with various power and performance characteristics can customize their configuration to achieve higher performance per Watt. On the other hand, inherent imbalance in power densities across MPSoCs leads to non-uniform temperature distributions, which affect performance and reliability adversely. In addition, managing temperature...

    Provided By UC Regents

  • White Papers // Oct 2010

    Package-Aware Scheduling of Embedded Workloads for Temperature and Energy Management on Heterogeneous MPSoCs

    In this paper, the authors present PASTEMP, a solution for Package Aware Scheduling for Thermal and Energy management using Multi-Parametric programming in heterogeneous embedded multiprocessor SoCs (MPSoCs). Based on the current thermal state of the system and current performance requirements of the workload, PASTEMP finds thermally safe and energy efficient...

    Provided By UC Regents

  • White Papers // Sep 2009

    Energy Efficient Design of Battery Powered Embedded Systems

    Energy-efficient design of battery-powered systems demands optimizations in both hardware and software. The authors present a modular approach for enhancing instruction level simulators with cycle-accurate simulation of energy dissipation in embedded systems. The methodology has tightly coupled component models thus making the approach more accurate. Performance and energy computed by...

    Provided By UC Regents

  • White Papers // Jan 2011

    Temperature-Aware MPSoC Scheduling for Reducing Hot Spots and Gradients

    Thermal hot spots and temperature gradients on the die need to be minimized to manufacture reliable systems while meeting energy and performance constraints. In this paper, the authors solve the task scheduling problem for Multiprocessor System-on-Chips (MPSoCs) using Integer Linear Programming (ILP). The goal of the optimization is minimizing the...

    Provided By UC Regents

  • White Papers // Aug 2009

    Delay Tolerant Mobility Aware Routing/Mobility Dissemination Protocol for the Airborne Network

    Despite "Airborne Network (AN) topology design" and careful planning of AN trajectories, unexpected disruptions (from hardware failures to changes in mission requirements and hostile attacks) may cause nodes not to connect to one another directly or indirectly either because they are out of one another's range or because nodes do...

    Provided By UC Regents

  • White Papers // Aug 2009

    Towards Handoff Tolerance in TCP: Link Layer Handoff Detection for Optimized Data Transport

    With the proliferation of network management tools that adjust link and path characteristics to optimize network performance and health, TCP's are frequently incorporating path characteristic detection mechanisms to quickly adapt to the effects of these changes. Optimal TCP performance, including rapid adaptability, depends on, among other things, an accurate view...

    Provided By UC Regents

  • White Papers // Aug 2009

    RelayCast: Scalable Multicast Routing in Delay Tolerant Coalition Networks

    Mobile wireless networks with intermittent connectivity, often called Delay/Disruption Tolerant Networks (DTNs), have recently received a lot of attention because of their applicability in various applications, including multicasting. To overcome intermittent connectivity, DTN routing protocols utilize mobility-assist routing by letting the nodes carry and forward the data. In this paper,...

    Provided By UC Regents

  • White Papers // Jul 2010

    Content Centric Networking in Tactical and Emergency MANETs

    Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless protocols tend to perform poorly. In this paper, the authors propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. CCN is a novel...

    Provided By UC Regents

  • White Papers // Jan 2011

    A Dynamic Operating System for Sensor Nodes

    Sensor network nodes exhibit characteristics of both embedded systems and general-purpose systems. They must use little energy and be robust to environmental conditions, while also providing common services that make it easy to write applications. In TinyOS, the current state of the art in sensor node operating systems, reusable components...

    Provided By UC Regents

  • White Papers // Nov 2009

    The Sensitivity of Communication Mechanisms to Bandwidth and Latency

    The goal of this paper is to gain insight into the relative performance of communication mechanisms as bisection bandwidth and network latency vary. The authors compare shared memory with and without prefetching message passing with interrupts and with polling, and bulk transfer via DMA. They present two sets of experiments...

    Provided By UC Regents

  • White Papers // Nov 2009

    HLS: Combining Statistical and Symbolic Simulation to Guide Microprocessor Designs

    As microprocessors continue to evolve many optimizations reach a point of diminishing returns. The authors introduce HLS, a hybrid processor simulator which uses statistical models and symbolic execution to evaluate design alternatives. This simulation methodology allows for quick and accurate contour maps to be generated of the performance space spanned...

    Provided By UC Regents