UC Regents

Displaying 1-40 of 298 results

  • White Papers // Oct 2013

    Algebraic MACs and Keyed-Verification Anonymous Credentials

    The authors consider the problem of constructing anonymous credentials for use in a setting where the issuer of credentials is also the verifier, or more generally where the issuer and verifier have a shared key. In this setting they can use Message Authentication Codes (MACs) instead of public key signatures...

    Provided By UC Regents

  • White Papers // Oct 2013

    New Trapdoor Projection Maps for Composite-Order Bilinear Groups

    An asymmetric pairing over groups of composite order is a bilinear map e: G1 G2 - GT for groups G1 and G2 of composite order N = pq. The authors observe that a recent construction of pairing-friendly elliptic curves in this setting by the researcher exhibits surprising and unprecedented structure:...

    Provided By UC Regents

  • White Papers // Jun 2013

    Measuring the Practical Impact of DNSSEC Deployment

    DNSSEC extends DNS with a public-key infrastructure, providing compatible clients with cryptographic assurance for DNS records they obtain, even in the presence of an active network attacker. As with many internet protocol deployments, administrators deciding whether to deploy DNSSEC for their DNS zones must perform cost/benefit analysis. For some fraction...

    Provided By UC Regents

  • White Papers // Jun 2012

    Establishing Browser Security Guarantees through Formal Shim Verification

    Web browsers mediate access to valuable private data in domains ranging from health care to banking. Despite this critical role, attackers routinely exploit browser vulnerabilities to exfiltrate private data and take over the underlying system. The authors present QUARK, a browser whose kernel has been implemented and verified in Coq....

    Provided By UC Regents

  • White Papers // Aug 2011

    Improved Spectrum Access Control of Cognitive Radios Based on Primary ARQ Signals

    Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilization. In this paper, the authors present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme...

    Provided By UC Regents

  • White Papers // Aug 2011

    Quality-of-Information Aware Networking for Tactical Military Networks

    In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information....

    Provided By UC Regents

  • White Papers // Aug 2011

    FERMI: A FEmtocell Resource Management System for Interference Mitigation in OFDMA Networks

    The demand for increased spectral efficiencies is driving the next generation broadband access networks towards deploying smaller cells (femtocells) and sophisticated air interface technologies (Orthogonal Frequency Division Multiple Access or OFDMA). The dense deployment of femtocells however, makes interference and hence resource management both critical and extremely challenging. In this...

    Provided By UC Regents

  • White Papers // Aug 2011

    LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement

    Network-wide traffic measurement is of interest to network operators to uncover global network behavior for the management tasks of traffic accounting, debugging or troubleshooting, security, and traffic engineering. Increasingly, sophisticated network measurement tasks such as anomaly detection and security forensic analysis are requiring in-depth fine-grained flow-level measurements. However, performing in-depth...

    Provided By UC Regents

  • White Papers // Jul 2011

    On the Empirical Performance of Self-Calibrating WiFi Location Systems

    The pervasive deployment of 802.11 in modern enterprise buildings has long made it an attractive technology for constructing indoor location services. To this end, a broad range of algorithms have been proposed to accurately estimate location from 802.11 signal strength measurements, some without requiring manual calibration for each physical location....

    Provided By UC Regents

  • White Papers // Jul 2011

    Enhanching in Vehicle Digital Maps Via GPS Crowdsourcing

    In this paper, the authors propose a simple and effective method to extend digital maps with the location and timing of stop-signs and traffic lights in a city, given GPS traces collected by on-road vehicles. Their system finds the location and timing of traffic lights and stop-signs using a small...

    Provided By UC Regents

  • White Papers // Jul 2011

    TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion

    Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are ineffective on smartphones without physical keyboards. The authors describe a new side channel, motion, on touch screen smartphones with only soft keyboards. Since typing on different locations on the screen causes different...

    Provided By UC Regents

  • White Papers // Jul 2011

    Cooperative Jamming for Secure Communications in MIMO Relay Networks

    Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. In these approaches, the normally inactive nodes in the relay network can be used as cooperative jamming sources...

    Provided By UC Regents

  • White Papers // Jul 2011

    No Plan Survives Contact: Experience With Cybercrime Measurement

    An important mode of empirical security research involves analyzing the behavior, capabilities, and motives of adversaries. By definition, such measurements cannot be conducted in controlled settings and require "Engagement" directly with adversaries, their infrastructure or their ecosystem. However, the operational complexities required to successfully carry out such measurements are significant...

    Provided By UC Regents

  • White Papers // Jul 2011

    Improving the Way We Design Games for Learning by Examining How Popular Video Games Teach

    One of the reasons why commercial video games are popular is that they effectively teach players how to play the game - in many cases as the player plays the game itself. This paper focuses on how to effectively integrate teaching "How to play a game" with teaching an "Instructional...

    Provided By UC Regents

  • White Papers // Jul 2011

    Variability of Location Management Costs With Different Mobilities and Timer Periods to Update Locations

    In this paper, the authors examine the location management costs in mobile communication networks utilizing the timer-based method. From the study of the probabilities that a mobile terminal changes a number of Location Areas between two calls, they identify a threshold value of 0.7 for the Call-to-Mobility Ratio (CMR) below...

    Provided By UC Regents

  • White Papers // Jun 2011

    Measuring Pay-Per-Install: The Commoditization of Malware Distribution

    Recent years have seen extensive diversification of the "Underground economy" associated with malware and the subversion of Internet-connected systems. This trend towards specialization has compelling forces driving it: miscreants readily apprehend that tackling the entire value-chain from malware creation to monetization in the presence of ever-evolving countermeasures poses a daunting...

    Provided By UC Regents

  • White Papers // Jun 2011

    BOTMAGNIFIER: Locating Spambots on the Internet

    Unsolicited bulk email (spam) is used by cyber-criminals to lure users into scams and to spread malware infections. Most of these unwanted messages are sent by spam botnets, which are networks of compromised machines under the control of a single (malicious) entity. Often, these botnets are rented out to particular...

    Provided By UC Regents

  • White Papers // May 2011

    Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

    This paper provides a comprehensive treatment of the security of Authenticated Encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. The authors present attacks showing that...

    Provided By UC Regents

  • White Papers // May 2011

    Just-in-Time Compilation for FPGA Processor Cores

    Portability benefits have encouraged the trend of distributing applications using processor-independent instructions, a.k.a. bytecode, and executing that bytecode on an emulator running on a target processor. Transparent Just-In-Time (JIT) compilation of bytecode to native instructions is often used to increase application execution speed without sacrificing portability. Recent work has proposed...

    Provided By UC Regents

  • White Papers // May 2011

    Concurrently Secure Computation in Constant Rounds

    The authors study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, a meaningful notion of concurrent security based on Super-Polynomial...

    Provided By UC Regents

  • White Papers // May 2011

    Exploring the Effects of Feed-Forward and Feedback on Information Disclosure and User Experience in a Context-Aware Recommender System

    When disclosing information to a recommender system, users need to trade off its usefulness for receiving better recommendations with the privacy risks incurred through its disclosure. The paper describes a series of studies that will investigate the use of feed-forward and feedback messages to inform users about the potential usefulness...

    Provided By UC Regents

  • White Papers // May 2011

    RFID Assisted Vehicle Positioning in VANETs

    With technological advancement, recent VANET applications such as safe driving and emergency rescue often demand high position accuracy. Unfortunately, however, conventional localization systems, e.g., GPS, hardly meet new accuracy requirements. To overcome this limitation, this paper proposes an RFID-assisted localization system. The proposed system employs the DGPS concept to improve...

    Provided By UC Regents

  • White Papers // May 2011

    Some Issues in WSN, MANET and Cellular Security

    In this position paper, the authors address some current limitations and challenges as well as emerging directions in three related areas of secure communication: security in Wireless Sensor Networks - WSNs, security in Mobile Ad hoc NETworks - MANETs, and security in Cellular Phone Networks. Sensors that obtain information by...

    Provided By UC Regents

  • White Papers // May 2011

    Analyzing Interaction Communication Networks in Enterprises and Identifying Hierarchies

    With the proliferation of electronic modes of communication (e.g., e-mails, short messages), a group of people in an enterprise can form several distinct Communication Interaction Networks, or CINs for short. A CIN is essentially a graph representation of "Who talks to whom" among a group of individuals. In this paper,...

    Provided By UC Regents

  • White Papers // May 2011

    Correlated-Input Secure Hash Functions

    The authors undertake a general study of hash functions secure under correlated inputs, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs. Such a property is satisfied by a random oracle, and its importance is illustrated by study of the "Avalanche effect,"...

    Provided By UC Regents

  • White Papers // May 2011

    Database-Agnostic Transaction Support for Cloud Infrastructures

    In this paper, the authors present and empirically evaluate the performance of Database-Agnostic Transaction (DAT) support for the cloud. Their design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Their approach enables applications to employ a single transactional datastore API that...

    Provided By UC Regents

  • White Papers // May 2011

    SAIL: A Scalable Approach for Wide-Area IP Mobility

    The Internet is becoming increasingly mobile, with not only smartphones outnumbering stationary hosts, but also cars, buses, trains and airplanes all coming online. This makes Internet mobility support more important than ever. However, the existing standard mobility support protocols, mainly Mobile IPv6 and NEtwork MObility (NEMO), suffer from triangle routing...

    Provided By UC Regents

  • White Papers // May 2011

    On the Symmetry of User Mobility in Wireless Networks

    In this paper analyzed WLAN - GPS -and synthetic traces that record mobility in a variety of network environments. The authors observe that from a macroscopic level, human mobility is symmetric. In other words, the number of users that move from point A to point B approximates the number of...

    Provided By UC Regents

  • White Papers // May 2011

    GQ: Practical Containment for Measuring Modern Malware Systems

    Measurement and analysis of modern malware systems such as botnets relies crucially on execution of specimens in a setting that enables them to communicate with other systems across the Internet. Ethical, legal, and technical constraints, however, demand containment of resulting network activity in order to prevent the malware from harming...

    Provided By UC Regents

  • White Papers // May 2011

    A Comparitive Study of Achievability of Security Against Related-Key Attack

    This paper begins with a practical contribution, namely a way to leverage the RKA security of blockciphers to provide RKA security for a suite of high-level primitives. This motivates a more general theoretical question, namely, when is it possible to transfer RKA security from a primitive P1 to a primitive...

    Provided By UC Regents

  • White Papers // Apr 2011

    Seeker - A Bandwidth-Based Association Control Framework for Wireless Mesh Networks

    The rapid deployment of wireless mesh networks across universities and enterprises, and the pervasiveness of mobile devices equipped with Wi-Fi connectivity, has resulted in a scenario wherein end users have the option to choose from a multitude of access points at any given location. Moreover, with the increasing availability of...

    Provided By UC Regents

  • White Papers // Apr 2011

    Programming Support for Distributed Optimization and Control in Cyber-Physical Systems

    Large-scale actuator control problems in Cyber-Physical Systems (CPSs) are often expressed within the networked optimization model. While significant advances have taken place in optimization techniques, their widespread adoption in practical implementations is impeded by the complexity of inter-node coordination and lack of programming support that is necessary for sharing information...

    Provided By UC Regents

  • White Papers // Apr 2011

    (Im)Possible Frontiers: A Comment

    The existence of mean-variance efficient positive portfolios - portfolios with no negative weights - is a key requirement for equilibrium in the Capital Asset Pricing Model (CAPM). Brennan and Lo (2010) define an "Impossible frontier" as a frontier on which all portfolios have at least one negative weight. They prove...

    Provided By UC Regents

  • White Papers // Apr 2011

    Collusion-Resilient Quality of Information Evaluation Based on Information Provenance

    The quality of information is crucial for decision making in many dynamic information sharing environments such as sensor and tactical networks. Information trustworthiness is an essential parameter in assessing the information quality. In this paper, the authors present a trust model to evaluate the trustworthiness of information as well as...

    Provided By UC Regents

  • White Papers // Apr 2011

    Digitizing Physical Objects in the Home

    Technology in the home has brought about a number of changes in the way things are being done. Particularly interesting is the question as to whether some ways of doing activities are now being replaced given the availability of technology at an affordable cost. The ownership of a home computer...

    Provided By UC Regents

  • White Papers // Apr 2011

    Systemic Sovereign Credit Risk: Lessons From The U.S. And Europe

    The authors study the nature of systemic sovereign credit risk using CDS spreads for the U.S. Treasury, individual U.S. states, and major European countries. Using a multifactor affine framework that allows for both systemic and sovereign-specific credit shocks, they find that there is considerable heterogeneity across U.S. and European issuers...

    Provided By UC Regents

  • White Papers // Mar 2011

    Database Scalability, Elasticity, and Autonomy in the Cloud

    The proliferation of technology in the past two decades has created an interesting dichotomy for users. There is very little disagreement that an individual's life is significantly enriched as a result of easy access to information and services using a wide spectrum of computing platforms such as personal workstations, laptop...

    Provided By UC Regents

  • White Papers // Mar 2011

    SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation

    The use of Wireless Sensor Networks (WSNs) is expanding rapidly in a variety of fields. As the use of sensors evolves from merely capturing data to real-time event detection and response, sensor networks must provide accurate and authentic data to guarantee operational integrity. Security solutions are necessary to prevent malicious...

    Provided By UC Regents

  • White Papers // Mar 2011

    Learning From Repetitive Acquisitions: Evidence From The Time Between Deals

    Repetitive acquisitions involve benefits and costs. Benefits accrue from learning about the takeover process while costs involve integrating the combined firms. These benefits and costs are not directly observable from outside the firm but this paper proposes a simple model to infer their relative importance from the time between successive...

    Provided By UC Regents

  • White Papers // Mar 2011

    Usability of Display-Equipped RFID Tags for Security Purposes

    Recent emergence of high-end RFID tags capable of performing public key operations enables some new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access control badges). While the use of public key cryptography mitigates many difficult security issues, certain important usability-related issues remain, particularly, when RFID...

    Provided By UC Regents

  • White Papers // Jan 2011

    Methodological Reflections on a Field Study of a Globally Distributed Software Project

    The authors describe the methodology of a field study of a globally distributed software development project in a multinational corporation. The project spanned four sites in the U.S. and one in India, and is a representative example of the complexities and intricacies of global corporate software development. The goal is...

    Provided By UC Regents

  • White Papers // Mar 2011

    Usability of Display-Equipped RFID Tags for Security Purposes

    Recent emergence of high-end RFID tags capable of performing public key operations enables some new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access control badges). While the use of public key cryptography mitigates many difficult security issues, certain important usability-related issues remain, particularly, when RFID...

    Provided By UC Regents

  • White Papers // May 2011

    Exploring the Effects of Feed-Forward and Feedback on Information Disclosure and User Experience in a Context-Aware Recommender System

    When disclosing information to a recommender system, users need to trade off its usefulness for receiving better recommendations with the privacy risks incurred through its disclosure. The paper describes a series of studies that will investigate the use of feed-forward and feedback messages to inform users about the potential usefulness...

    Provided By UC Regents

  • White Papers // May 2010

    Privacy in Instant Messaging: An Impression Management Model

    Instant Messaging (IM) has evolved into an important tool for collaborative work. It supports informal near-synchronous communication and fosters awareness of the online presence of one's communication partners. Like all awareness systems, IM runs into concerns regarding privacy. Drawing upon prior literature and exploratory interviews, the authors postulate a model...

    Provided By UC Regents

  • White Papers // Jan 2010

    Navigating the Social Terrain With Google Latitude

    Although researchers have been building location-based social services for some time now, sharing one's location has only recently been introduced to the more general population. This paper examines real-world adoption of and resistance to Google Latitude, a social mobile-device application for people to share their locations. The authors report findings...

    Provided By UC Regents

  • White Papers // Nov 2010

    The Hybrid-Layer Index: A Synergic Approach to Answering Top-K Queries in Arbitrary Subspaces

    In this paper, the authors propose the Hybrid-Layer Index (simply, the HL-index) that is designed to answer top-k queries efficiently when the queries are expressed on any arbitrary subset of attributes in the database. Compared to existing approaches, the HL-index significantly reduces the number of tuples accessed during query processing...

    Provided By UC Regents

  • White Papers // Feb 2011

    Language and Tool Support for Semantic Bug Analysis

    Some bugs, among the millions that exist, are similar to each other. When fixing a bug, a programmer tends to search for similar bugs that have been reported and resolved in the past. A fix for a similar bug can help him understand his bug, or even directly fix his...

    Provided By UC Regents

  • White Papers // Oct 2010

    Capacity Enhancement and Reliability of Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have gained considerable interest in expanding IEEE 802.11 networks to large-scale enterprise and community scenarios, primarily because its capability of providing wide-band ubiquitous network access to a significant number of users. However, the mesh nodes are typically limited in resources such as bandwidth, computation power and...

    Provided By UC Regents

  • White Papers // Dec 2010

    Towards Reliable, Performant Workflows for Streaming-Applications on Cloud Platforms

    Scientific workflows are commonplace in eScience applications. Yet, the lack of integrated support for data models, including streaming data, structured collections and files, is limiting the ability of workflows to support emerging applications in energy informatics that are stream oriented. This is compounded by the absence of Cloud data services...

    Provided By UC Regents

  • White Papers // Dec 2009

    Taint Propagation in Database Systems

    The goal of the project is to develop a rule set to describe the propagation of taintness through a database. Existing research already described how to insert taintness information into a database, but lags a complete set of rules for how this taint information affects the results of queries. The...

    Provided By UC Regents

  • White Papers // Mar 2010

    Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software

    The analysis of software similarity has many applications such as detecting code clones, software plagiarism, code theft, and polymorphic malware. Because often source code is unavailable and code obfuscation is used to avoid detection, there has been much research on developing effective models to capture runtime behavior to aid detection....

    Provided By UC Regents

  • White Papers // Nov 2009

    Privacy in Cross-System Personalization

    Cross-System personalization (CSP), an innovative technology that enables consistent personalized user experience across different applications, platforms and even devices, is gaining substantial momentum both in academia and industry. Despite the potential benefits to both service providers and end users, CSP raises thorny privacy issues. This paper discusses these potential privacy...

    Provided By UC Regents

  • White Papers // Dec 2009

    The Importance of Including Dependencies in Trace Based Performance Analysis of On-Chip Networks

    With the advent of large scale chip-level multiprocesssors, there is renewed interest in the design and analysis of on-chip networks. The use of full system simulation is the most accurate way to perform such an analysis, but unfortunately it is very slow and thus limits the design space exploration. In...

    Provided By UC Regents

  • White Papers // Mar 2010

    What Do Firewalls Protect? an Empirical Study of Firewalls, Vulnerabilities, and Attacks

    Firewalls are a cornerstone of how sites implement "Defense in depth." Many security policies assume that outside attackers must first penetrate a firewall configured to block their access. This paper examines what firewalls protect against, and whether those protections are sufficient to warrant placing the current level of trust in...

    Provided By UC Regents

  • White Papers // Feb 2010

    Good Neighbor: Ad-Hoc Authentication of Nearby Wireless Devices by Multiple Antenna Diversity

    As wireless devices proliferate, in many situations the authors wish to authenticate devices by mere proximity. This is the common authentication mechanism for wired devices where they plug them into each other. In this paper the authors propose a scheme for authenticating nearby wireless devices that share no prior secrets....

    Provided By UC Regents

  • White Papers // Dec 2009

    Automatic Detection of Vulnerable Dynamic Component Loadings

    Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. In general, an operating system or a runtime environment resolves the loading of a specifically named component by searching for its first occurrence in a sequence of directories determined at...

    Provided By UC Regents

  • White Papers // Dec 2009

    Dynamic Detection of Process-Hiding Kernel Rootkits

    Stealth rootkits that hide themselves on victim systems pose a major threat to computer systems. They are usually evasive as they use sophisticated stealth techniques to conceal files, processes, kernel modules, and other types of objects, making it extremely challenging to detect their presence in the victim system. However, current...

    Provided By UC Regents

  • White Papers // Jul 2009

    Parallelizing XML Processing Pipelines Via MapReduce

    The authors present approaches for exploiting data parallelism in XML processing pipelines through novel compilation strategies to the Map-Reduce framework. Pipelines in the approach consist of sequences of processing steps that consume XML-structured data and produce, often through calls to "Black-box" functions, modified (i.e., updated) XML structures. The main contributions...

    Provided By UC Regents

  • White Papers // Jan 2011

    Stargate: An Author-Centric Approach to Software Project Visualization

    With the success of open source software projects, such as Apache and Mozilla, comes the opportunity to study the development process. In this paper, the authors present StarGate: A novel system for visualizing software projects. Whereas previous software project visualizations concentrated mainly on the source code changes, they literally place...

    Provided By UC Regents

  • White Papers // Jun 2009

    Experimental Evaluation of Query Processing Techniques Over Multiversion XML Documents

    Various approaches have been recently proposed for storing the evolution of an XML document, thereby preserving useful past information about the document and thus the ability to query it. While the importance of maintaining a document's evolution has been recognized, relatively little research has been done on how to adapt...

    Provided By UC Regents

  • White Papers // Jun 2009

    FORWARD: Design Specification Techniques for Do-It-Yourself Application Platforms

    The FORWARD project, as well as its app2you predecessor, is a Do-It-Yourself web application platform that enables non-programmers to create custom forms-driven workflow applications, where users with potentially different roles and rights interact. The authors' experience with the commercialized version of app2you shows that forms-driven workflow applications exhibit a viable...

    Provided By UC Regents

  • White Papers // Jan 2011

    A Study on the Evolution of the Web

    The authors seek to gain improved insight into how Web search engines should cope with the evolving Web, in an attempt to provide users with the most up-to-date results possible. For this purpose they collected weekly snapshots of some 150 Web sites over the course of one year, and measured...

    Provided By UC Regents

  • White Papers // May 2010

    Cybercasing the Joint: On the Privacy Implications of Geo-Tagging

    This paper aims to raise awareness of a rapidly emerging privacy threat that the authors term cybercasing: leveraging geo-tagged information available online to mount real-world attacks. While users typically realize that sharing locations has some implications for their privacy, they provide evidence that many are unaware of the full scope...

    Provided By UC Regents

  • White Papers // May 2010

    Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance

    In this paper, the authors present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to prove both comprehensive in terms of the properties they measure and easy to employ and understand for users with little technical background. They structure...

    Provided By UC Regents

  • White Papers // May 2011

    GQ: Practical Containment for Measuring Modern Malware Systems

    Measurement and analysis of modern malware systems such as botnets relies crucially on execution of specimens in a setting that enables them to communicate with other systems across the Internet. Ethical, legal, and technical constraints, however, demand containment of resulting network activity in order to prevent the malware from harming...

    Provided By UC Regents

  • White Papers // Aug 2010

    The Effects of Information Transparency on Suppliers, Manufacturers, and Consumers in Online Markets

    This paper looks into the effects of information transparency on market participants in an online trading environment. The authors study these effects in business-to-business electronic markets with firms competing in both upstream and downstream industries. The prior literature generally assumes that either the downstream firm (buyer) or the upstream firm...

    Provided By UC Regents

  • White Papers // Apr 2011

    Digitizing Physical Objects in the Home

    Technology in the home has brought about a number of changes in the way things are being done. Particularly interesting is the question as to whether some ways of doing activities are now being replaced given the availability of technology at an affordable cost. The ownership of a home computer...

    Provided By UC Regents

  • White Papers // Jun 2009

    Supplement Explanation of Paper "Efficient Anomaly Monitoring Over Moving Object Trajectory Streams"

    The authors want to emphasize that it is difficult to extend the discord definition from that targeted at static time series to trajectory stream scenario. That is the major reason why the authors have this paper. This paper is not about "Efficient anomaly mining in static time series". Discord definition...

    Provided By UC Regents

  • White Papers // Jan 2011

    OM: A Tunable Framework for Optimizing Continuous Queries Over Data Streams

    Continuous Query (CQ) is an important class of queries in Data Stream Management Systems. While much work has been done on algorithms for processing CQs, less attention has been paid to the issue of optimizing such queries. In this paper, the authors first argue that parameters such as output rate...

    Provided By UC Regents

  • White Papers // Jan 2011

    A Dynamic Operating System for Sensor Nodes

    Sensor network nodes exhibit characteristics of both embedded systems and general-purpose systems. They must use little energy and be robust to environmental conditions, while also providing common services that make it easy to write applications. In TinyOS, the current state of the art in sensor node operating systems, reusable components...

    Provided By UC Regents

  • White Papers // May 2011

    Analyzing Interaction Communication Networks in Enterprises and Identifying Hierarchies

    With the proliferation of electronic modes of communication (e.g., e-mails, short messages), a group of people in an enterprise can form several distinct Communication Interaction Networks, or CINs for short. A CIN is essentially a graph representation of "Who talks to whom" among a group of individuals. In this paper,...

    Provided By UC Regents

  • White Papers // Mar 2010

    Comparing BitTorrent Clients in the Wild: The Case of Download Speed

    BitTorrent (BT) is currently the main P2P protocol used for sharing large files over the Internet. It is therefore important to understand the performance characteristics of existing real-world BT implementations (clients). In this paper, the authors measure the download speed of over 10 million BT users over one month. Surprisingly,...

    Provided By UC Regents

  • White Papers // Jan 2010

    Mapping the Spatiotemporal Dynamics of Calcium Signaling in Cellular Neural Networks Using Optical Flow

    An optical flow gradient algorithm was applied to spontaneously forming networks of neurons and glia in culture imaged by fluorescence optical microscopy in order to map functional calcium signaling with single pixel resolution. Optical flow estimates the direction and speed of motion of objects in an image between subsequent frames...

    Provided By UC Regents

  • White Papers // Apr 2010

    Parallel Computing on the Berkeley NOW

    The UC Berkeley Network Of Workstations (NOW) project demonstrates a new approach to large-scale system design enabled by technology advances that provide inexpensive, low latency, high bandwidth, scalable interconnection networks. This paper provides an overview of the hardware and software architecture of NOW and reports on the performance obtained at...

    Provided By UC Regents

  • White Papers // Apr 2010

    Managing Concurrent Access for Shared Memory Active Messages

    Passing messages through shared memory plays an important role on symmetric multiprocessors and on Clumps. The management of concurrent access to message queues is an important aspect of design for shared memory message passing systems. Using both microbenchmarks and applications, this paper compares the performance of concurrent access algorithms for...

    Provided By UC Regents

  • White Papers // Mar 2011

    Learning From Repetitive Acquisitions: Evidence From The Time Between Deals

    Repetitive acquisitions involve benefits and costs. Benefits accrue from learning about the takeover process while costs involve integrating the combined firms. These benefits and costs are not directly observable from outside the firm but this paper proposes a simple model to infer their relative importance from the time between successive...

    Provided By UC Regents

  • White Papers // Feb 2011

    A Simple Method For Assessing Project Risk By Adjusting For Growth Options Leverage

    Capital budgeting methods require estimates of project betas which, using the Capital Asset Pricing Model (CAPM), allow the authors to estimate the cost of capital used for discounting expected future cash flows. In practice, equity betas are estimated using stock returns of comparable firms which are then unlevered for financial...

    Provided By UC Regents

  • White Papers // Apr 2011

    (Im)Possible Frontiers: A Comment

    The existence of mean-variance efficient positive portfolios - portfolios with no negative weights - is a key requirement for equilibrium in the Capital Asset Pricing Model (CAPM). Brennan and Lo (2010) define an "Impossible frontier" as a frontier on which all portfolios have at least one negative weight. They prove...

    Provided By UC Regents

  • White Papers // Apr 2011

    Systemic Sovereign Credit Risk: Lessons From The U.S. And Europe

    The authors study the nature of systemic sovereign credit risk using CDS spreads for the U.S. Treasury, individual U.S. states, and major European countries. Using a multifactor affine framework that allows for both systemic and sovereign-specific credit shocks, they find that there is considerable heterogeneity across U.S. and European issuers...

    Provided By UC Regents

  • White Papers // Jul 2010

    CEO Narcissism And The Takeover Process

    The authors examine the influence of both acquirer and target CEO narcissism on the takeover process. They measure CEO narcissism using patterns of personal pronoun usage in more than 1,700 transcripts of CEO speech. Information on the private part of the takeover process is collected in Security and Exchange Commission...

    Provided By UC Regents