University of California

Displaying 1-40 of 575 results

  • White Papers // Feb 2015

    Task Scheduling Strategies to Mitigate Hardware Variability in Embedded Shared Memory Clusters

    Manufacturing and environmental variations cause timing errors that are typically avoided by conservative design guardbands or corrected by circuit level error detection and correction. These measures incur energy and performance penalties. This paper considers methods to reduce this cost by expanding the scope of variability mitigation through the software stack....

    Provided By University of California

  • White Papers // Jan 2015

    Algebra-Based Identification of Tree Patterns in XQuery

    Query processing performance in XML databases can be greatly enhanced by the usage of materialized views whose content has been stored in the database. This requires a method for identifying query subexpressions matching the views, a process known as view-based query rewriting. This process is quite complex for relational databases,...

    Provided By University of California

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Nov 2014

    Approximate Associative Memristive Memory for Energy-Efficient GPUs

    Multimedia applications running on thousands of deep and wide pipelines working concurrently in GPUs have been an important target for power minimization both at the architectural and algorithmic levels. At the hardware level, energy-efficiency techniques that employ voltage overscaling face a barrier so-called "Path walls": reducing operating voltage beyond a...

    Provided By University of California

  • White Papers // Feb 2014

    Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to Task-level Approach

    Variation in performance and power across manufactured parts and their operating conditions is an accepted reality in aggressive CMOS (Complementary Metal-Oxide-Semiconductor) processes. This paper considers challenges and opportunities in identifying this variation and methods to combat or even use these variations for improved computing systems. The authors introduce the notion...

    Provided By University of California

  • White Papers // Dec 2013

    Temporal Memoization for Energy-Efficient Timing Error Recovery in GPGPUs

    Manufacturing and environmental variability lead to timing errors in computing systems that are typically corrected by error detection and correction mechanisms at the circuit level. The cost and speed of recovery can be improved by memoization-based optimization methods that exploit spatial or temporal parallelisms in suitable computing fabrics such as...

    Provided By University of California

  • White Papers // Dec 2013

    Declarative Ajax Web Applications through SQL++ on a Unified Application State

    Implementing even a conceptually simple web application requires an inordinate amount of time. Forward addresses three problems that reduce developer productivity: impedance mismatch across the multiple languages used at different tiers of the application architecture. Distributed data access across the multiple data sources of the application (user input of the...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // Dec 2012

    Variation-tolerant OpenMP Tasking on Tightly-coupled Processor Clusters

    In this paper, the authors present a variation-tolerant tasking technique for tightly-coupled shared memory processor clusters that relies upon modeling advance across the hardware/software interface. This is implemented as an extension to the OpenMP 3.0 tasking programming model. Using the notion of Task-Level Vulnerability (TLV) proposed here, they capture dynamic...

    Provided By University of California

  • White Papers // Dec 2012

    Hierarchically Focused Guardbanding: An Adaptive Approach to Mitigate PVT Variations and Aging

    In this paper, the authors proposes a new model of functional units for variation-induced timing errors due to PVT variations and device Aging (PVTA). The model takes into account PVTA parameter variations, clock frequency and the physical details of Placed-and-Routed (P&R) functional units in 45nm TSMC analysis flow. Using this...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Nov 2004

    An Introduction to Financial Derivatives

    Futures trading, a derivative instrument, began in U.S. and was used to trade cotton, corn, and wheat at the Chicago Board of Trade. This presentation traces the origin of derivatives and introduces financial derivatives. It describes the different types of derivative instruments and explains the difference between each of them....

    Provided By University of California

  • White Papers // Jul 2003

    Products and Prejudice: Measuring Country-of-Origin Bias in U.S. Wine Imports

    Should exporters worry about country-of-origin bias? Although the pervasiveness of country-level product advertising suggests that they do, lack of data has limited the empirical study of subjective bias toward products from a specific country. Using data from the U.S. wine industry, including numerical blind tasting evaluations, this paper directly computes...

    Provided By University of California

  • White Papers // Jun 2006

    "Make-Or-Buy" In Movies: Integration And Ex-Post Renegotiation.

    This paper investigates the determinants of the boundaries of the firm in the movie industry using a new data set from the Spanish movie industry. These data document movie contractual renegotiation and allow me to construct a direct measure of contractual complexity for each movie. Linking this measure to the...

    Provided By University of California

  • White Papers // Sep 2009

    Scheduling Heterogeneous Wireless Systems for Efficient Spectrum Access

    The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (Radio Frequency) bands in the current state of wireless spectrum allocations. Different from cognitive radio approaches which are opportunistic and non-collaborative in general, spectrum access scheduling proactively structures and interleaves the channel access pattern of heterogeneous...

    Provided By University of California

  • White Papers // Dec 2009

    Protecting Browsers From Extension Vulnerabilities

    Browser extensions are remarkably popular, with one in three Firefox users running at least one extension. Although well-intentioned, extension developers are often not security experts and write buggy code that can be exploited by malicious web site operators. In the Firefox extension system, these exploits are dangerous because extensions run...

    Provided By University of California

  • White Papers // Aug 2009

    Implementation and Evaluation of a Mobile Wireless PlanetLab Node

    With the introduction of cellular phones, mobile wireless communication has become an integral part of day-to-day life in this century. A testbed is crucial in continuing cutting-edge wireless technology research and development since physical and MAC layers in mobile wireless communication have many parameters pertinent to performance that are often...

    Provided By University of California

  • White Papers // Aug 2009

    Automated Spyware Collection and Analysis

    Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. How-ever, the term spyware is ambiguous and can refer to anything from plug-ins that display advertisements to software that records and leaks user input. To shed light on the true nature of...

    Provided By University of California

  • White Papers // Jan 2010

    A Multi-Radio 802.11 Mesh Network Architecture

    Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the benefits of multiple radios does not exist. The focus of the work is to offer such an architecture. The architecture provides solutions to challenges in three...

    Provided By University of California

  • White Papers // Oct 2009

    Extending Networking Into the Virtualization Layer

    The move to virtualization has created a new network access layer residing on hosts that connects the various VMs. Virtualized deployment environments impose requirements on networking for which traditional models are not well suited. They also provide advantages to the networking layer (such as software flexibility and well-defined end host...

    Provided By University of California

  • White Papers // Jan 2010

    Network Sensitivity to Intradomain Routing Changes

    The Internet's routing architecture was designed to have a clean separation between the intradomain and interdomain routing protocols. However, the appropriate division of labor between these two tiers becomes unclear when an Autonomous System (AS) has interdomain routes to a destination through multiple border routers a situation that is extremely...

    Provided By University of California

  • White Papers // Jan 2010

    Towards a More Functional and Secure Network Infrastructure

    This paper proposes an overlay network infrastructure that provides better protection against DoS attacks as well as more functionality than today's Internet. The solution is based on three simple principles:enabling end-hosts to communicate without revealing their IP address, giving end-hosts control to defend against Denial-of-Service (DoS) attacks at the overlay...

    Provided By University of California

  • White Papers // Jan 2010

    Query-Driven Visualization of Large Data Sets

    This paper presents a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is constrained to the subset of data deemed interesting by the user. In many scientific data analysis applications, interesting data can be defined by compound Boolean range...

    Provided By University of California

  • White Papers // Sep 2009

    Affirmative Action Programs And Business Ownership Among Minorities And Women

    Affirmative action programs are commonly used as a means to level the playing field for minority- and women-owned firms in public procurement markets, and therefore may be a positive factor in business entry and survival. To the extent that affirmative action programs also apply to traditional labor markets, however, they...

    Provided By University of California

  • White Papers // Jul 2009

    Challenges for Securing Cyber Physical Systems

    Cyber-Physical Systems (CPS) has been at the core of critical infrastructures and industrial control systems for many decades, and yet, there have been few confirmed cases of computer-based attacks. The authors discuss three key challenges for securing cyberphysical systems: understanding the threats, and possible consequences of attacks, identifying the unique...

    Provided By University of California

  • White Papers // Jan 2010

    Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks

    Communication reliability is a desired property in computer networks. One key technology to increase the reliability of a communication path is to provision a disjoint backup path. One of the main challenges in implementing this technique is that two paths that are disjoint at the IP or overlay layer may...

    Provided By University of California

  • White Papers // Jul 2010

    Code Generation for Embedded Java With Ptolemy

    Code generation from models is the ultimate goal of model-based design. For real-time systems the generated code must be analyzable for the worst-case execution time (WCET). This paper evaluates Java code generation from Ptolemy II for embedded real-time Java. The target system is the time-predictable Java processor JOP. The quality...

    Provided By University of California

  • White Papers // Mar 2010

    Data Management Challenges in Cloud Computing Infrastructures

    The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access...

    Provided By University of California

  • White Papers // Mar 2010

    Financial Analysis Using SAS PROCS

    Financial services industry is interested in analyzing vast financial data including price trends from stock exchanges around the world. SAS analytical and graphical tools are extremely useful to enable statistical analysis of various financial data including stock price information. Time Series statistical method is a valuable approach for analysis of...

    Provided By University of California

  • Case Studies // Jan 2010

    Code-Red: A Case Study on the Spread and Victims of an Internet Worm

    On July 18, 2001, Code-Red (CRv2) worm took less than 14 hours to infect more than 359,000 internet connected computers, resulting in damage worth more than $2.6 billion. The case study tries to study the causes, impact and the safeguards against such attacks. Under this paper, a step by step...

    Provided By University of California

  • White Papers // Oct 2009

    Applying NOX to the Datacenter

    It is evident today that internet datacenters have brought about a revolution in computing power and have attained supremacy in handling data-intensive computational tasks. Being the challenging field that it is, a number of studies and new network designs are being explored and deployed by researchers to find out if...

    Provided By University of California

  • White Papers // Oct 2009

    AppScale: Scalable and Open AppEngine Application Development and Deployment

    Cloud Computing refers to the service-oriented cluster computing based on Service-Level Agreements (SLAs). Through cloud computing, the use of large-scale distributed systems is made simple through transparent and adaptive resource management. It also makes configuration and deployment of an entire software stack both simple and automatic. This technology also makes...

    Provided By University of California

  • White Papers // Jul 2009

    Data Center Switch Architecture in the Age of Merchant Silicon

    For massively parallel workloads, the principal bottleneck is often not the performance of individual nodes but the rate at which these nodes can exchange data over the network. Many Data Center Network (DCN) applications demonstrate little communication locality, meaning that the communication substrate must support high aggregate bisection bandwidth for...

    Provided By University of California

  • White Papers // Sep 2009

    Optical Label Switching Technology and Energy-Efficient Future Networks

    The future Internet is rapidly emerging with a new set of very challenging requirements. It must support exponentially rising traffic volume with scalability, performance, and low power consumption. At the same time, new emerging applications require higher degrees of security, utilization, and quality of service. A unified networking platform in...

    Provided By University of California

  • White Papers // Jan 2010

    Error-Resilient LZW Data Compression

    As many practitioners know, compressed streams are very sensitive the transmission errors. Even a single error can have devastating effects and compromise all the data downstream. In fact, the non-resilience of adaptive data compression has been a practical drawback of its use in many applications. Joint source-channel coding has emerged...

    Provided By University of California

  • White Papers // Feb 2010

    Power Efficiency With Correlated Data Compression in Sensor Networks

    One of the main constraints for wireless sensor networks is its power budget, which creates a tradeoff on the amount of data the sensor network can transmit and the amount of time that it is functional. This project aims to analyze the power savings for data transmission through the use...

    Provided By University of California

  • White Papers // Jan 2010

    Visualizing Industrial CT Volume Data for Nondestructive Testing Applications

    This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for NonDestructive Testing (NDT) applications. Because the data are typically noisy and contain ne features, direct volume rendering methods do not always give one satisfactory results. This paper has coupled...

    Provided By University of California

  • White Papers // Sep 2009

    HiperSense: An Integrated System for Dense Wireless Sensing and Massively Scalable Data Visualization

    HiperSense is a system for sensing and data visualization. Its sensing part is comprised of a heterogeneous Wireless Sensor Network (WSN) as enabled by infrastructure support for handoff and bridging. Hando support enables simple, densely deployed, low-complexity, ultra-compact wireless sensor nodes operating at non-trivial data rates to achieve mobility by...

    Provided By University of California

  • White Papers // Sep 2009

    VrtProf: Vertical Profiling for System Virtualization

    As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under virtualization the virtual machine and OS each try to manage the same resources independently, the underlying hardware is now multiplexed between many streams of execution,...

    Provided By University of California

  • White Papers // Jan 2010

    What's New About Cloud Computing Security?

    While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. This paper strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. The paper examines contemporary and historical perspectives from industry, academia, government, and "Black...

    Provided By University of California

  • White Papers // Feb 2010

    Rain: A Workload Generation Toolkit for Cloud Computing Applications

    Existing workload generation tools are not flexible enough to generate workloads that vary in three key dimensions relevant for making resource allocation decisions for Cloud Computing applications - variations in the amount of load, variations in the mix of operations performed by clients (e.g. changes in reads vs. writes or...

    Provided By University of California

  • White Papers // Apr 2010

    Using "Recycled Predictions" for Computing Marginal Effects

    A conventional way to estimate the marginal effect of a risk factor is to omit the risk factor (e.g., gender, treatment) from the multivariate model and then use the omitted risk factor as class/group variable to compare observed and predicted outcomes. This can have an undesirable impact on the model...

    Provided By University of California

  • White Papers // Jan 2010

    Performance Analysis of Server Virtualization Networking Capability

    This paper presents a comparison and analysis of the performance of the various networking capabilities and topologies used to enable a typical server virtualization environment. A fundamental component in the Virtual Machine Monitor (VMM) is a software implementation of a traditional network forwarding device (bridges, routers and NAT gateways). The...

    Provided By University of California

  • White Papers // Jun 2010

    Data Privacy With Multi-Function Printers, Printers and Copiers

    Hard drives have become prevalent temporary or static storage components within many print devices. In fact, most copiers and multi-function printers manufactured since 2005 have hard drives. While the campus Cyber-safety program has, to date, focused on computer and network security, the focus needs to be expanded to include hard...

    Provided By University of California

  • White Papers // Jan 2010

    Internet QoS Routing With IP Telephony and TCP Traffic

    In this paper, authors propose the use of QoS routing to enhance the support of IP Telephony. The proposed scheme is based on QoS intradomain OSPF routing, an extension of the conventional OSPF routing protocol. A DiffServ model is used (no per flow signalling, nor per flow accounting at intermediate...

    Provided By University of California

  • White Papers // Nov 2008

    Bluetooth, ZigBee, and Wibree: A Comparison of WPAN Technologies

    Wireless Personal Area Network (WPAN) designs have been flourishing in recent years. The pervasive success of Bluetooth has been a boon to all devices in the IEEE 802.15 working group. As competing and complementary standards are formed within this working group, a successful embedded system designer must understand the differences...

    Provided By University of California

  • White Papers // Jan 2010

    NeT & CoT: Inferring XML Schemas From Relational World

    With XML emerging as the data format of the Internet era, there is a substantial increase in the amount of data encoded in XML. However, the majority of everyday data is still stored and maintained in relational databases. Therefore, the authors expect the needs to convert such relational data into...

    Provided By University of California

  • White Papers // Jan 2010

    The Current State Of The Housing, Mortgage, And Commercial Real Estate Markets: Some Policy Proposals To Deal With The Current Crisis And Reform Proposals To The Real Estate Finance System

    Although there are signs of stability in new housing starts, existing home sales, and house prices, it will be a long, slow recovery of 3-4 years before we return to equilibrium conditions. The embryonic recovery in housing has been highly dependent on massive federal government intervention rather than an organic...

    Provided By University of California

  • White Papers // Jan 2010

    XBiT: An XML-Based Bitemporal Data Model

    Past research work on modeling and managing temporal in-formation has, so far, failed to elicit support in commercial database systems. The increasing popularity of XML offers a unique opportunity to change this situation, inasmuch as XML and XQuery support temporal information much better than relational tables and SQL. This is...

    Provided By University of California

  • White Papers // Aug 2009

    An Adaptive Opportunistic Routing Scheme for Wireless Ad-Hoc Networks

    In this paper, a distributed adaptive opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with...

    Provided By University of California

  • White Papers // Jan 2010

    Poster Abstract: Packet Delivery Performance for On-Body Mica2dot Wireless Sensor Networks

    Wearable computing continues to attract researchers' interests. In particular, the combination of biomedical applications and sensor networks has been in major focus, especially in the field of real-time health care monitoring. Various connection mediums have been proposed for such platforms. This includes wired and wireless communication schemes. The inconvenience of...

    Provided By University of California