University of California

Displaying 1-40 of 662 results

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Apr 2014

    A World on NDN: Affordances

    "In this paper

    Provided By University of California

  • White Papers // Mar 2014

    Using PeeringDB to Understand the Peering Ecosystem

    "In this paper

    Provided By University of California

  • White Papers // Aug 2013

    Duality Between Equilibrium and Growing Networks

    "In statistical physics any given system can be either at equilibrium or away from it. Networks are not an exception. Most network models can be classified as either equilibrium or growing. Here the authors show that under certain conditions there exists an equilibrium formulation for any growing network model

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Dec 2009

    Harvesting SSL Certificate Data to Identify Web-Fraud

    Web-fraud is one of the most unpleasant features of today's Internet. Two eminent examples of web-fraudulent activities are phishing and typosquatting. Their effects range from relatively benign (such as unwanted or unexpected ads) to downright sinister (especially, when typosquatting is combined with phishing). This paper presents a novel technique to...

    Provided By University of California

  • White Papers // Sep 2009

    On Degrees of Freedom Region of MIMO Networks Without CSIT

    In this paper, the authors study the effect of the absence of channel knowledge for Multiple-Input-Multiple-Output (MIMO) networks. Specifically, they assume perfect channel state information at the receivers, no channel state information at the transmitter(s), and independent identically distributed (i.i.d.) Rayleigh fading across antennas, users and time slots. They provide...

    Provided By University of California

  • White Papers // Jan 2011

    Energy Conservation in Datacenters Through Cluster Memory Management and Barely-Alive Memory Servers

    As a result of current resource provisioning schemes in Internet services, servers end up less than 50% utilized almost all the time. At this level of utilization, the servers' energy efficiency is less than half their efficiency at peak utilization. A solution to this problem could be consolidating workloads into...

    Provided By University of California

  • White Papers // Nov 2009

    Libertarian Paternalism And Information Sharing

    The authors develop a theoretical model to study the effects of libertarian paternalism on knowledge acquisition and social learning. Individuals in the model are permitted to appreciate and use the information content in the default options set by the government. They show that in some settings libertarian paternalism may decrease...

    Provided By University of California

  • White Papers // Jan 2011

    External Double Hashing With Choice

    A novel extension to external double hashing providing significant reduction to both successful and unsuccessful search lengths is presented. The experimental and analytical results demonstrate the reductions possible. This method does not restrict the hashing table configuration parameters and utilizes very little additional storage space per bucket. The runtime performance...

    Provided By University of California

  • White Papers // Feb 2010

    Practical Rate and Route Adaptation With Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks

    Accurate and fast Packet Delivery Ratio (PDR) estimation, used in evaluating wireless link quality, is a prerequisite to increase the performance of multi-hop and multi-rate IEEE 802.11 wireless networks. Unfortunately, contemporary PDR estimation methods, i.e. beacon-based packet counting in Estimated Transmission Time and Expected Transmission Count metrics, have unsatisfactory performance....

    Provided By University of California

  • White Papers // Apr 2009

    Measuring Channel Capacity to Distinguish Undue Influence

    The channel capacity of a program is a quantitative measure of the amount of control that the inputs to a program have over its outputs. Because it corresponds to worst-case assumptions about the probability distribution over those inputs, it is particularly appropriate for security applications where the inputs are under...

    Provided By University of California

  • White Papers // Jan 2011

    Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols

    The current process of designing a security protocol is usually ad-hoc and involves little formalism and mechanical assistance. Such a design process is not only slow but also error-prone. Evidence shows that even when security protocols are designed with care and examined intensely,they can still be fundamentally flawed. A classic...

    Provided By University of California

  • White Papers // Jan 2011

    Timing Analysis of Keystrokes and Timing Attacks on SSH

    SSH is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has two weakness: First, the transmitted packets are padded only to an eight-byte boundary (if a block cipher is in use), which reveals the approximate size of the original data....

    Provided By University of California

  • White Papers // Oct 2009

    Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels

    This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and the authors examine both the broadcast...

    Provided By University of California

  • White Papers // Nov 2009

    A Simple Conceptual Generator for the Internet Graph

    The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing...

    Provided By University of California

  • White Papers // Nov 2009

    Feeds as Query Result Serializations

    Many Web-based data sources and services are available as feeds, a model that provides consumers with a loosely coupled way of interacting with providers. The current feed model is limited in its capabilities, however. Though it is simple to implement and scales well, it cannot be transferred to a wider...

    Provided By University of California

  • White Papers // Jan 2011

    Pseudo-IP: Providing a Thin Network Layer Protocol for Semi-IntelligentWireless Devices

    In the near future users will be able to move freely and still have seamless network and Internet connectivity. The authors envision that the Internet of the future will interconnect mobile or stationary clouds into the existing IP infrastructure. While many of the Internet protocols are immensely successful in traditional...

    Provided By University of California

  • White Papers // Nov 2009

    Putting it All Together: Using Socio-Technical Networks to Predict Failures

    Studies have shown that social factors in development organizations have a dramatic effect on software quality. Separately, program dependency information has also been used successfully to predict which software components are more fault prone. Interestingly, the influence of these two phenomena have only been studied separately. Intuition and practical experience...

    Provided By University of California

  • White Papers // Mar 2010

    Validity of Network Analyses in Open Source Projects

    Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in the information flow between contributors or contributions in these projects. Social network metrics have also been used to predict defect occurrence. However, such studies often ignore...

    Provided By University of California

  • White Papers // Mar 2010

    Clones: What is that Smell?

    Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance difficulties. Clones inherently cause code bloat, thus increasing project size and maintenance costs. In this work, the authors try to validate the conventional wisdom empirically...

    Provided By University of California

  • White Papers // Mar 2009

    Kenyon-Web: Reconfigurable Web-Based Feature Extractor

    Research on Mining Software Repositories (MSR) has yielded fruitful results in many Software Engineering areas including software change comprehension, bug prediction, and developer network recovery. When performing MSR research, the first task is to extract features corresponding to source code details from repositories. Since reusable feature extraction tools are not...

    Provided By University of California

  • White Papers // Jun 2009

    Perspectives on Transactional Memory

    The authors examine the role of transactional memory from two perspectives: That of a programming language with atomic actions and that of implementations of the language. They argue that it is difficult to formulate a clean, separate, and generally useful definition of transactional memory. In both programming-language semantics and implementations,...

    Provided By University of California

  • White Papers // Jul 2009

    A Model of Dynamic Separation for Transactional Memory

    Dynamic separation is a new programming discipline for systems with transactional memory. The authors study it formally in the setting of a small calculus with transactions. They provide a precise formulation of dynamic separation and compare it with other programming disciplines. Furthermore, exploiting dynamic separation, they investigate some possible implementations...

    Provided By University of California

  • White Papers // Mar 2011

    A General Class of Throughput Optimal Routing Policies in Multi-Hop Wireless Networks

    This paper considers the problem of throughput optimal routing/scheduling in a multi-hop constrained queueing network with random connectivity whose special case includes opportunistic multi-hop wireless networks and input-queued switch fabrics. The main challenge in the design of throughput optimal routing policies is closely related to identifying appropriate and universal Lyapunov...

    Provided By University of California

  • White Papers // Aug 2009

    How Small Are Building Blocks of Complex Networks

    Network motifs are small building blocks of complex networks, such as gene regulatory networks. The frequent appearance of a motif may be an indication of some network-specific utility for that motif, such as speeding up the response times of gene circuits. However, the precise nature of the connection between motifs...

    Provided By University of California

  • White Papers // Aug 2009

    Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems

    Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is being controlled by a remote untrusted host. In this paper the authors present efficient techniques for authenticating data structures that represent graphs and collections of geometric objects. They...

    Provided By University of California

  • White Papers // Aug 2009

    The Single Source Two Terminal Network With Network Coding

    The authors consider a communication network with a single source that has a set of messages and two terminals where each terminal is interested in an arbitrary subset of messages at the source. A tight capacity region for this problem is demonstrated. They show by a simple graph-theoretic procedure that...

    Provided By University of California

  • White Papers // May 2011

    Dynamic Egocentric Models for Citation Networks

    The analysis of the formation and evolution of networks over time is of fundamental importance to social science, biology, and many other fields. While longitudinal network data sets are increasingly being recorded at the granularity of individual time-stamped events, most studies only focus on collapsed cross-sectional snapshots of the network....

    Provided By University of California

  • White Papers // Mar 2010

    A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications

    The authors consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received...

    Provided By University of California

  • White Papers // Jul 2010

    Knowledge Transfers From Multinational To Domestic Firms: Evidence From Worker Mobility

    Labor turnover is a commonly-cited mechanism for the transmission of technology from multinational to domestic firms, but until now there has been little direct evidence for this mechanism. Using a novel matched establishment-worker database from Brazil, the author presents evidence consistent with the existence of positive multinational wage spillovers through...

    Provided By University of California

  • White Papers // Sep 2009

    Foreign Direct Investment In Cross-Border Infrastructure

    In this paper, the authors critically review the relevant information and literature and that can enhance the feasibility and the successful implementation of cross-border infrastructure projects. They provide detailed information concerning FDI into the major emerging regions: East Asia/Pacific, Latin America and Eastern Europe. They also discuss the theoretical and...

    Provided By University of California

  • White Papers // Apr 2011

    Illiquid Financial Markets And Monetary Policy

    This paper analyzes the role of money in markets where financial investment takes place in a decentralized fashion. A key methodological contribution is the development of a dynamic framework that brings together a model for illiquid assets a la Duffie et al. and a monetary framework a la Lagos and...

    Provided By University of California

  • White Papers // Jun 2009

    Fuzzy Math, Disclosure Regulation And Credit Market Outcomes: Evidence From Truth-In-Lending Reform

    Consumer installment lenders prefer to market "Low monthly payments" and shroud interest rates. Why not voluntarily disclose rates? The authors show that when an interest rate is not disclosed, most consumers substantially underestimate it using information on the monthly payment, loan principal and maturity. This "Fuzzy math" or "Payment/interest bias"...

    Provided By University of California

  • White Papers // Apr 2011

    Financial Crises, Credit Booms, And External Imbalances: 140 Years Of Lessons

    Do external imbalances increase the risk of financial crises? In this paper, the authors study the experience of 14 developed countries over 140 years (1870{2008). They exploit their long-run dataset in a number of different ways. First, they apply new statistical tools to describe the temporal and spatial patterns of...

    Provided By University of California

  • White Papers // Aug 2009

    Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach

    With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet games, has tremendous potential and interest. However, the current client-server architecture for PC-based Internet games, where most of the storage and computational burden of...

    Provided By University of California

  • White Papers // May 2011

    The Effects Of Monetary Policy "News" And "Surprises"

    There is substantial agreement in the monetary policy literature over the effects of exogenous monetary policy shocks. The shocks that are investigated, however, almost exclusively represent unanticipated changes in policy, which surprise the private sector and which are typically found to have a delayed and sluggish effect on output. In...

    Provided By University of California

  • White Papers // May 2011

    Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud

    Data analytics are key applications running in the cloud computing environment. To improve performance and cost-effectiveness of a data analytics cluster in the cloud, the data analytics system should account for heterogeneity of the environment and workloads. In addition, it also needs to provide fairness among jobs when multiple jobs...

    Provided By University of California

  • White Papers // Jul 2009

    SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks

    This paper describes the design, implementation and performance evaluation of SenSearch, an outdoors, GPS assisted personnel tracking system using MICA motes. SenSearch is a mobile wireless ad-hoc network comprised of sensor nodes worn by users. These nodes store and forward information about the location of other nodes in an environment...

    Provided By University of California

  • White Papers // Dec 2010

    Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. The authors propose Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California

  • White Papers // Aug 2009

    Evaluation of Traffic Data Obtained Via GPS-Enabled Mobile Phones: The Mobile Century Field Experiment

    The growing need of the driving public for accurate traffic information has spurred the deployment of large scale dedicated monitoring infrastructure systems, which mainly consist in the use of inductive loop detectors and video cameras. On-board electronic devices have been proposed as an alternative traffic sensing infrastructure, as they usually...

    Provided By University of California

  • White Papers // Jan 2011

    Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks

    Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target object. The network operations have two states: the surveillance state during the absence of any event of interest, and the tracking state which...

    Provided By University of California

  • White Papers // May 2009

    Ad as You Go: A Study of Ad Placement on Personal Navigation Devices

    Mobile advertising (M-advertising) is an emergent trend in the marketing world. "M-advertising enables not only the sending of unique, personalized, and customized adverts, but also the ability to engage consumers in interactions with the sender of the message." Cell phones, PDAs, and other mobile devices have been tapped to exercise...

    Provided By University of California

  • White Papers // Jul 2009

    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods

    Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods...

    Provided By University of California

  • White Papers // Dec 2009

    Privacy in Online Social Networking at Workplace

    Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...

    Provided By University of California