University of California, Davis

Displaying 1-40 of 70 results

  • White Papers // Feb 2014

    Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices

    The authors present a suite of efficient novel TFA protocols which improve upon password-only authentication by a factor of 2t with regards to both the online guessing attack and the offline dictionary attack. To argue the security of the presented protocols, they first provide a formal treatment of TFA schemes...

    Provided By University of California, Davis

  • White Papers // Jan 2014

    Hardware-Dependent Software Synthesis for Many-Core Embedded Systems

    In this paper, the authors present synthesis of Hardware dependent Software (HdS) for multicore and many-core designs using Embedded System Environment (ESE). ESE is a tool set, developed at UC Irvine, for transaction level design of multicore embedded systems. HdS synthesis is a key component of ESE backend design flow....

    Provided By University of California, Davis

  • White Papers // Jan 2014

    Early Performance-Cost Estimation of Application-Specific Data Path Pipelining

    Application-Specific Processors (ASPs) are increasingly being adopted for optimized implementation of embedded systems. ASP design automation tools are, therefore, critical for meeting the time-to-market goals for ASP-based embedded systems. This paper targets the problem of determining the optimal data path pipeline configuration from a given application C code. The authors...

    Provided By University of California, Davis

  • White Papers // Jan 2014

    MPSoC Verification Using a Unified Random Program Approach

    In this paper, the authors discuss a simulation-based verification approach for Multi-Processor Systems-on-Chip (MPSoC) using a unified random program generator. Similar to design abstraction, they first explain the concept of verification abstraction. Then they analyze the typical bugs encountered in a MPSoC design and levels of verification abstraction at which...

    Provided By University of California, Davis

  • White Papers // Sep 2013

    REMEDIATE: A Scalable Fault-tolerant Architecture for Low-Power NUCA Cache in Tiled CMPs

    Technology scaling and process variation severely degrade the reliability of Chip Multi-Processors (CMPs), especially their large cache blocks. To improve cache reliability, the authors propose REMEDIATE, a scalable fault-tolerant architecture for low-power design of shared Non-Uniform Cache Access (NUCA) cache in Tiled CMPs. REMEDIATE achieves fault-tolerance through redundancy from multiple...

    Provided By University of California, Davis

  • White Papers // Aug 2013

    ARGO: Aging-aware GPGPU Register File Allocation

    State-of-the-art General-Purpose Graphic Processing Units (GPGPUs) implemented in nanoscale CMOS technologies offer very high computational throughput for highly-parallel applications using hundreds of integrated on-chip resources. These resources are stressed during application execution, subjecting them to degradation mechanisms such as Negative Bias Temperature Instability (NBTI) that adversely affect their reliability. To...

    Provided By University of California, Davis

  • White Papers // Jun 2013

    A User-level Thread Library Built on Linux Context Functions for Efficient ESL Simulation

    Before the popular use of multiprocessor machines, user-level thread library is widely adopted in multithreading programs to handle multiple concurrent tasks in a time-slice manner. Currently QuickThreads library is widely used in the multi-threaded programs such as Electronic System Level (ESL) simulation. As a user-level thread library, QuickThreads is very...

    Provided By University of California, Davis

  • White Papers // May 2013

    Multicast Packing for Coding Across Multiple Unicasts

    The authors consider the problem of inter-session network coding for multiple unicast flows over directed acyclic graphs. Their approach consists of the following steps: the unicast flows are partitioned into multiple disjoint subsets of unicast flows and each subset of unicast flows is mapped to a multicast flow, and linear...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    An Extended Eclipse Platform for Recoding System-Level Models

    System-level design methodology is developed to manage the increasing design complexity of embedded systems. With proper tools supporting system-level design, engineers can perform early design space exploration and automatic refinements on a high-level specification model of the embedded system. However, creating the initial specification model is a time-consuming process. This...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    RIDE: Recoding Integrated Development Environment

    One solution to address the steadily growing complexity of embedded computer systems is the modeling at higher levels of abstraction using System-Level Description Languages (SLDL) such as SpecC or SystemC. However, writing such executable system models is error-prone and extremely time-consuming. Little has been done to support system designers in...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    Instantly Decodable Network Codes for Real-Time Applications

    The authors consider the scenario of broadcasting for real-time applications and loss recovery via instantly decodable network coding. Past work focused on minimizing the completion delay, which is not the right objective for real-time applications that have strict deadlines. In this paper, they are interested in finding a code that...

    Provided By University of California, Davis

  • White Papers // Mar 2013

    Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications

    In this paper, the authors analytically study the regime in which practical full-duplex systems can achieve larger rates than equivalent half-duplex systems. The key challenge in practical full-duplex systems is un-cancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, they first present a signal...

    Provided By University of California, Davis

  • White Papers // Jan 2013

    2.5K-Graphs: From Sampling to Generation

    Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, the authors propose a complete, practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology they target to match are...

    Provided By University of California, Davis

  • White Papers // Dec 2012

    Compositional Stochastic Modeling and Probabilistic Programming

    Probabilistic programming is related to a compositional approach to stochastic modeling by switching from discrete to continuous time dynamics. In continuous time, an operator-algebra semantics is available in which processes proceeding in parallel (and possibly interacting) have summed time-evolution operators. From this foundation, algorithms for simulation, inference and model reduction...

    Provided By University of California, Davis

  • White Papers // Nov 2012

    Variability-Aware Memory Management for Nanoscale Computing

    As the semiconductor industry continues to push the limits of sub-micron technology, the ITRS expects hardware variations to continue increasing over the next few decades. As a result, it is imperative for designers to build variation-aware software stacks that may adapt and opportunistically exploit said variations to increase system performance/responsiveness...

    Provided By University of California, Davis

  • White Papers // May 2012

    Multi-Layer Configuration Exploration of MPSoCs for Streaming Applications

    While integration of configurable components, such as soft processors, in MPSoC design enables further system adaptation to application needs, supporting system level tools need to provide an environment for systematic and efficient configuration exploration. This paper presents a multi-layer configuration exploration framework for streaming applications on MPSoCs. The authors introduce...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    An Embedded Hybrid-Memory-Aware Virtualization Layer for Chip-Multiprocessors

    Hybrid on-chip memories that combine Non-Volatile Memories (NVMs) with SRAMs promise to mitigate the increasing leakage power of traditional on-chip SRAMs. The authors present HaVOC: a run-time memory manager that virtualizes the hybrid on-chip memory space and supports efficient sharing of distributed Scratch-Pad Memories (SPMs) and NVMs. HaVOC allows programmers...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    Virtual Platform Generation Using TECS Software Component and SCE

    In this paper, the authors present a system-level design framework integrating TECS, which is one of the software component technologies for embedded systems, and SCE, which is a System-on-Chip (SoC) environment based on SpecC language, for realizing a higher abstraction level design than prior work. Since TECS implementation is based...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    Recoding Embedded Applications into Flexible System-Level Models

    Given the constantly growing complexity of the digital systems around them, virtual platforms are essential in the design and development of today's embedded systems. Without virtual platforms, efficient design space exploration, effective functional validation, and cost-effective system implementation would not be possible. In this paper, the authors outlined a method...

    Provided By University of California, Davis

  • White Papers // Mar 2011

    Using a Flexible Fault-Tolerant Cache (FFT-Cache) to Improve Reliability in Ultra Low Voltage Operation

    Caches are known to consume a large part of total microprocessor power. Traditionally, voltage scaling has been used to reduce both dynamic and leakage power in caches. However, aggressive voltage reduction causes process-variation-induced failures in cache SRAM arrays, which compromise cache reliability. In this paper, the authors propose Flexible Fault-Tolerant...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Hearing Is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    In cognitive radio networks, an adversary transmits signals whose characteristics emulate those of primary users, in order to prevent secondary users from transmitting. Such an attack is called Primary User Emulation (PUE) attack. There are two main types of primary users in white space: TV towers and wireless microphones. Existing...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Sensor Networks

    This paper investigates the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate Constant Bit Rate (CBR) data and send them to a single sink via multihop transmissions. This type of sensor networks has many potential applications...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    APHD: End-to-End Delay Assurance in 802.11e Based MANETs

    This paper presents an Adaptive Per Hop Differentiation (APHD) scheme towards achieving end-to-end delay assurance in multihop wireless networks. The APHD scheme extends the capability of IEEE 802.11e EDCA technique into multihop environments by taking end-to-end delay requirement into consideration. At an intermediate node, based on data packet's end-to-end requirement,...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Characterizing Packet Audio Streams From Internet Multimedia Applications

    The authors analyzed 70 voice traces collected from IP-telephony applications, multicast lectures, and multimedia conferencing sessions which involve multiple speakers and different dynamics of interaction beyond two-way conversations. Results show that application differences have significant impact on the traffic characteristics. The conventional exponential model, established for telephone conversations, fails to...

    Provided By University of California, Davis

  • White Papers // Nov 2010

    Implicit Authentication Through Learning User Behavior

    Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. The authors present implicit authentication - authenticating users based on...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. This paper proposes Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Retransmission-Aware Queuing and Routing for Video Streaming in Wireless Mesh Networks

    The dynamic and shared nature of wireless medium imposes an adverse barrier to supporting QoS for video streaming applications in wireless networks. This paper investigates a case study of video streaming in a wireless mesh network to obtain important observations on the factors which impact video quality in multihop wireless...

    Provided By University of California, Davis

  • White Papers // Sep 2010

    Deterministic Structured Network Coding For WWAN Video Broadcast With Cooperative Peer-to-Peer Repair

    Recent research has exploited the multi-homing property (one terminal with multiple network interfaces) of modern devices to improve communication performance in wireless networks. Cooperative Peer-to-peer Repair (CPR) is one example where given simultaneous connections to both a Wireless Wide Area Network (WWAN) and an ad-hoc Wireless Local Area Network (WLAN),...

    Provided By University of California, Davis

  • White Papers // Aug 2010

    Trustworthy Wireless Networks: Issues and Applications

    Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Adaptive Wireless Channel Probing for Shared Key Generation

    Generating a shared secret key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel probing. Previous works used a constant channel probing rate to generate a key, but they neither consider the tradeoff between the Key Generation...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Identity-Based Attack Detection in Mobile Wireless Networks

    Identity-Based Attacks (IBAs) are one of the most serious threats to wireless networks. Recently, Received Signal Strength (RSS) based detection mechanisms were proposed to detect IBAs in static networks. Although mobility is an inherent property of wireless networks, limited work has addressed IBA detection in mobile scenarios. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Improving Energy Efficiency of Wi-Fi Sensing on Smartphones

    Mobile data usage over cellular networks has been dramatically increasing over the past years. Wi-Fi based wireless networks offer a high-bandwidth alternative for offloading data traffic. However, intermittent connectivity, and battery power drain in handheld devices, inhibits always-on connectivity even in areas with good Wi-Fi coverage. This paper presents WiFisense,...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center

    In a multi-tenant data center environment, the current paradigm for route control customization involves a labor intensive ticketing process, in which tenants submit route control requests to the landlord. This results in a tight-coupling between tenants and landlord, extensive human resource deployment, and long ticket resolution time. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Distributed Scheduling and Routing in Underwater Wireless Networks

    Several underwater network characteristics, including long propagation delays and a bandwidth dependent on distance, provide unique challenges to protocol designers. This paper presents STUMP-WR, a distributed routing and channel scheduling protocol, designed for heavily loaded underwater networks. STUMP-WR selects and schedules links using a distributed algorithm to overlap communications by...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    RRR: Rapid Ring Recovery - Sub-Millisecond Decentralized Recovery for Ethernet Ring

    Ethernet is the indisputable de-facto technology for local area networks due to its simplicity, low cost, and wide scale adoption. In recent times, Ethernet has entered new networking areas such as Metro Area Network (MAN) and Industrial Area Network (IAN) where specialized protocols dominate the market. In addition to the...

    Provided By University of California, Davis

  • White Papers // Jun 2010

    FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns

    The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. The core challenge is in addressing high amounts of traffic diversity found in today's networks. The problem becomes more challenging if a quick detection...

    Provided By University of California, Davis

  • White Papers // May 2010

    Non-Cryptographic Authentication and Identification in Wireless Networks

    Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This paper provides an overview about various non-cryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. The authors discuss merits and demerits of these authentication/identification schemes...

    Provided By University of California, Davis

  • White Papers // May 2010

    Impact of Security Properties on the Quality of Information in Tactical Military Networks

    The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required...

    Provided By University of California, Davis

  • White Papers // Apr 2010

    Scheduling Prioritized Services in Multihop OFDMA Networks

    Growing popularity of high speed wireless broadband access for real-time applications makes it increasingly relevant to study the admission control and scheduling of flows in a service differentiated manner. Next-generation wireless broadband networks employ Orthogonal Frequency Division Multiple Access (OFDMA) technology that enables multiple users to communicate at the same...

    Provided By University of California, Davis

  • White Papers // Mar 2010

    THEX: Mining Metapatterns From Java

    Design patterns are codified solutions to common Object-Oriented Design (OOD) problems in software development. One of the proclaimed benefits of the use of design patterns is that they decouple functionality and enable different parts of a system to change frequently without undue disruption throughout the system. These OOD patterns have...

    Provided By University of California, Davis

  • White Papers // Dec 2008

    Advantages of Self-Migration for Distributed Computing

    The authors compare four paradigms that have recently been the subject of recent research: mobile agents, Distributed Shared Memory (DSM), coordination paradigms and self-migrating computations. They place these paradigms in a common framework and demonstrate that self-migrating computations subsume the other three paradigms in terms of their capabilities to organize...

    Provided By University of California, Davis

  • White Papers // Mar 2013

    Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications

    In this paper, the authors analytically study the regime in which practical full-duplex systems can achieve larger rates than equivalent half-duplex systems. The key challenge in practical full-duplex systems is un-cancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, they first present a signal...

    Provided By University of California, Davis

  • White Papers // May 2013

    Multicast Packing for Coding Across Multiple Unicasts

    The authors consider the problem of inter-session network coding for multiple unicast flows over directed acyclic graphs. Their approach consists of the following steps: the unicast flows are partitioned into multiple disjoint subsets of unicast flows and each subset of unicast flows is mapped to a multicast flow, and linear...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    Instantly Decodable Network Codes for Real-Time Applications

    The authors consider the scenario of broadcasting for real-time applications and loss recovery via instantly decodable network coding. Past work focused on minimizing the completion delay, which is not the right objective for real-time applications that have strict deadlines. In this paper, they are interested in finding a code that...

    Provided By University of California, Davis

  • White Papers // Jan 2013

    2.5K-Graphs: From Sampling to Generation

    Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, the authors propose a complete, practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology they target to match are...

    Provided By University of California, Davis

  • White Papers // Apr 2010

    Scheduling Prioritized Services in Multihop OFDMA Networks

    Growing popularity of high speed wireless broadband access for real-time applications makes it increasingly relevant to study the admission control and scheduling of flows in a service differentiated manner. Next-generation wireless broadband networks employ Orthogonal Frequency Division Multiple Access (OFDMA) technology that enables multiple users to communicate at the same...

    Provided By University of California, Davis

  • White Papers // Aug 2010

    Trustworthy Wireless Networks: Issues and Applications

    Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one...

    Provided By University of California, Davis

  • White Papers // Dec 2009

    From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network

    Multi-radio nodes in wireless mesh networks introduce extra complexity in utilizing channel resources. Depending on the configuration of the radios, bad mappings between radios to wireless frequencies may result in sub-optimal network topologies. Static channel assignments in wireless mesh networks have been studied in theory and through simulation but very...

    Provided By University of California, Davis

  • White Papers // Jan 2010

    Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

    Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key...

    Provided By University of California, Davis

  • White Papers // Dec 2009

    Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks

    Peak Signal-to-Noise Ratio (PSNR) is the simplest and the most widely used video quality evaluation methodology. However, traditional PSNR calculations do not take the packet loss into account. This shortcoming, which is amplified in wireless networks, contributes to the inaccuracy in evaluating video streaming quality in wireless communications. Such inaccuracy...

    Provided By University of California, Davis

  • White Papers // May 2010

    Impact of Security Properties on the Quality of Information in Tactical Military Networks

    The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required...

    Provided By University of California, Davis

  • White Papers // Aug 2009

    Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks

    This paper proposes an adaptive scheduling algorithm for IEEE 802.16j based wireless broadband networks. Computation of an optimal schedule for prioritized traffic in OFDMA based IEEE 802.16 wireless network is an NP-Hard problem. Hence, the authors propose a scheduling heuristic for an OFDMA based WiMAX relay network. The ORS (OFDMA...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Sensor Networks

    This paper investigates the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate Constant Bit Rate (CBR) data and send them to a single sink via multihop transmissions. This type of sensor networks has many potential applications...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    APHD: End-to-End Delay Assurance in 802.11e Based MANETs

    This paper presents an Adaptive Per Hop Differentiation (APHD) scheme towards achieving end-to-end delay assurance in multihop wireless networks. The APHD scheme extends the capability of IEEE 802.11e EDCA technique into multihop environments by taking end-to-end delay requirement into consideration. At an intermediate node, based on data packet's end-to-end requirement,...

    Provided By University of California, Davis

  • White Papers // Sep 2009

    Poster: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

    Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key...

    Provided By University of California, Davis

  • White Papers // May 2009

    Self-Learning Peer-to-Peer Traffic Classifier

    The popularity of a new generation of smart peer-to-peer applications has resulted in several new challenges for accurately classifying network traffic. In this paper, the authors propose a novel 2- stage p2p traffic classifier, called Self Learning Traffic Classifier (SLTC), that can accurately identify p2p traffic in high speed networks....

    Provided By University of California, Davis

  • White Papers // May 2009

    Uncovering Global Icebergs in Distributed Monitors

    Security is becoming an increasingly important QoS parameter for which network providers should provision. The authors focus on monitoring and detecting one type of network event, which is important for a number of security applications such as DDoS attack mitigation and worm detection, called distributed global icebergs. While previous work...

    Provided By University of California, Davis

  • White Papers // Jun 2010

    FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns

    The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. The core challenge is in addressing high amounts of traffic diversity found in today's networks. The problem becomes more challenging if a quick detection...

    Provided By University of California, Davis

  • White Papers // Jan 2010

    Diagnosing Failures in Wireless Networks Using Fault Signatures

    Detection and diagnosis of failures in wireless networks is of crucial importance. It is also a very challenging task, given the myriad of problems that plague present day wireless networks. A host of issues such as software bugs, hardware failures, and environmental factors, can cause performance degradations in wireless networks....

    Provided By University of California, Davis

  • White Papers // Sep 2010

    Deterministic Structured Network Coding For WWAN Video Broadcast With Cooperative Peer-to-Peer Repair

    Recent research has exploited the multi-homing property (one terminal with multiple network interfaces) of modern devices to improve communication performance in wireless networks. Cooperative Peer-to-peer Repair (CPR) is one example where given simultaneous connections to both a Wireless Wide Area Network (WWAN) and an ad-hoc Wireless Local Area Network (WLAN),...

    Provided By University of California, Davis

  • White Papers // Nov 2010

    Implicit Authentication Through Learning User Behavior

    Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. The authors present implicit authentication - authenticating users based on...

    Provided By University of California, Davis

  • White Papers // Nov 2008

    X-CSR: Dataflow Optimization for Distributed XML Process Pipelines

    XML process networks are a simple, yet powerful programming paradigm for loosely coupled, coarse-grained dataflow applications such as data-centric scientific workflows. This paper describes a framework called ? -XML that is well-suited for applications in which pipelines of data processors modify parts ("Deltas") of XML data collections while keeping the...

    Provided By University of California, Davis

  • White Papers // Jul 2009

    Scientific Process Automation and Workflow Management

    This paper introduces and describes scientific workflows, i.e., executable descriptions of automatable scientific processes such as computational science simulations and data analyses. Scientific workflows are often expressed in terms of tasks and their (Dataflow) dependencies. This paper first provides an overview of the characteristic features of scientific workflows and outlines...

    Provided By University of California, Davis

  • White Papers // Dec 2012

    Compositional Stochastic Modeling and Probabilistic Programming

    Probabilistic programming is related to a compositional approach to stochastic modeling by switching from discrete to continuous time dynamics. In continuous time, an operator-algebra semantics is available in which processes proceeding in parallel (and possibly interacting) have summed time-evolution operators. From this foundation, algorithms for simulation, inference and model reduction...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Characterizing Packet Audio Streams From Internet Multimedia Applications

    The authors analyzed 70 voice traces collected from IP-telephony applications, multicast lectures, and multimedia conferencing sessions which involve multiple speakers and different dynamics of interaction beyond two-way conversations. Results show that application differences have significant impact on the traffic characteristics. The conventional exponential model, established for telephone conversations, fails to...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Improving Energy Efficiency of Wi-Fi Sensing on Smartphones

    Mobile data usage over cellular networks has been dramatically increasing over the past years. Wi-Fi based wireless networks offer a high-bandwidth alternative for offloading data traffic. However, intermittent connectivity, and battery power drain in handheld devices, inhibits always-on connectivity even in areas with good Wi-Fi coverage. This paper presents WiFisense,...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    RRR: Rapid Ring Recovery - Sub-Millisecond Decentralized Recovery for Ethernet Ring

    Ethernet is the indisputable de-facto technology for local area networks due to its simplicity, low cost, and wide scale adoption. In recent times, Ethernet has entered new networking areas such as Metro Area Network (MAN) and Industrial Area Network (IAN) where specialized protocols dominate the market. In addition to the...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Adaptive Wireless Channel Probing for Shared Key Generation

    Generating a shared secret key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel probing. Previous works used a constant channel probing rate to generate a key, but they neither consider the tradeoff between the Key Generation...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Hearing Is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    In cognitive radio networks, an adversary transmits signals whose characteristics emulate those of primary users, in order to prevent secondary users from transmitting. Such an attack is called Primary User Emulation (PUE) attack. There are two main types of primary users in white space: TV towers and wireless microphones. Existing...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center

    In a multi-tenant data center environment, the current paradigm for route control customization involves a labor intensive ticketing process, in which tenants submit route control requests to the landlord. This results in a tight-coupling between tenants and landlord, extensive human resource deployment, and long ticket resolution time. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Identity-Based Attack Detection in Mobile Wireless Networks

    Identity-Based Attacks (IBAs) are one of the most serious threats to wireless networks. Recently, Received Signal Strength (RSS) based detection mechanisms were proposed to detect IBAs in static networks. Although mobility is an inherent property of wireless networks, limited work has addressed IBA detection in mobile scenarios. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Retransmission-Aware Queuing and Routing for Video Streaming in Wireless Mesh Networks

    The dynamic and shared nature of wireless medium imposes an adverse barrier to supporting QoS for video streaming applications in wireless networks. This paper investigates a case study of video streaming in a wireless mesh network to obtain important observations on the factors which impact video quality in multihop wireless...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. This paper proposes Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Distributed Scheduling and Routing in Underwater Wireless Networks

    Several underwater network characteristics, including long propagation delays and a bandwidth dependent on distance, provide unique challenges to protocol designers. This paper presents STUMP-WR, a distributed routing and channel scheduling protocol, designed for heavily loaded underwater networks. STUMP-WR selects and schedules links using a distributed algorithm to overlap communications by...

    Provided By University of California, Davis

  • White Papers // May 2010

    Non-Cryptographic Authentication and Identification in Wireless Networks

    Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This paper provides an overview about various non-cryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. The authors discuss merits and demerits of these authentication/identification schemes...

    Provided By University of California, Davis

  • White Papers // May 2004

    Supermarket Challenges and Opportunities for Fresh Fruit and Vegetable Producers and Shippers: Lessons From the US Experience

    Structural change continues to transform the global fresh fruit and vegetable (fresh produce) marketing system. There was great fragmentation on both the selling and buying sides with large numbers of local and regional retail grocery chains rather than national chains with large store numbers and buying volumes per chain. Given...

    Provided By University of California, Davis

  • White Papers // Dec 2001

    An Economic Survey of the Wine and Winegrape Industry in the United States and Canada

    The wine industry in the United States and Canada is new by Old World standards but old by New World standards. This document provides a very brief outline of the history of wine production and consumption in the United States up through roughly 1990. It then focuses on the demand...

    Provided By University of California, Davis

  • White Papers // Jan 2010

    QoS-Aware Multicasting in DiffServ Domains

    Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within differentiated services (DiffServ) domains. This paper proposes a new QoS-aware multicast routing protocol called QMD, which is designed for DiffServ environments. QMD can provide...

    Provided By University of California, Davis

  • White Papers // Jun 2009

    On Distributing XML Repositories

    XML is increasingly used not only for data exchange but also to represent arbitrary data sources as virtual XML repositories. In many application scenarios, fragments of such a repository are distributed over the Web. However, design and query models for distributed XML data have not yet been studied in detail....

    Provided By University of California, Davis

  • White Papers // Mar 2010

    THEX: Mining Metapatterns From Java

    Design patterns are codified solutions to common Object-Oriented Design (OOD) problems in software development. One of the proclaimed benefits of the use of design patterns is that they decouple functionality and enable different parts of a system to change frequently without undue disruption throughout the system. These OOD patterns have...

    Provided By University of California, Davis