University of California

Displaying 1-40 of 623 results

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Jan 2012

    Distributed Measurement-Aware Routing: Striking a Balance Between Measurement and Traffic Engineering

    Network-wide traffic measurement is important for various network management tasks, ranging from traffic accounting, traffic engineering, and network troubleshooting to security. Existing techniques for traffic measurement tend to be sub-optimal due to poor choice of monitor deployment location or due to constantly evolving monitoring objectives and traffic characteristics. It is...

    Provided By University of California

  • White Papers // Jan 2012

    On Wormhole Attacks in Under-Water Sensor Networks: A Two-Tier Localization Approach

    Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper, the authors show that underwater denial-of-service...

    Provided By University of California

  • White Papers // Jul 2003

    Products and Prejudice: Measuring Country-of-Origin Bias in U.S. Wine Imports

    Should exporters worry about country-of-origin bias? Although the pervasiveness of country-level product advertising suggests that they do, lack of data has limited the empirical study of subjective bias toward products from a specific country. Using data from the U.S. wine industry, including numerical blind tasting evaluations, this paper directly computes...

    Provided By University of California

  • White Papers // Jun 2006

    "Make-Or-Buy" In Movies: Integration And Ex-Post Renegotiation.

    This paper investigates the determinants of the boundaries of the firm in the movie industry using a new data set from the Spanish movie industry. These data document movie contractual renegotiation and allow me to construct a direct measure of contractual complexity for each movie. Linking this measure to the...

    Provided By University of California

  • White Papers // Nov 2004

    An Introduction to Financial Derivatives

    Futures trading, a derivative instrument, began in U.S. and was used to trade cotton, corn, and wheat at the Chicago Board of Trade. This presentation traces the origin of derivatives and introduces financial derivatives. It describes the different types of derivative instruments and explains the difference between each of them....

    Provided By University of California

  • White Papers // May 2009

    Is It Too Late for PAKE?

    The most common web authentication technique in use today is password authentication via an HTML form, where a user types her password directly into a web page from the site to which she wishes to authenticate herself. The problem with this approach is that it relies on the user to...

    Provided By University of California

  • White Papers // Nov 2009

    Libertarian Paternalism And Information Sharing

    The authors develop a theoretical model to study the effects of libertarian paternalism on knowledge acquisition and social learning. Individuals in the model are permitted to appreciate and use the information content in the default options set by the government. They show that in some settings libertarian paternalism may decrease...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship Between Web Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // Jan 2010

    Preventing Capability Leaks in Secure JavaScript Subsets

    Publishers wish to sandbox third-party advertisements to protect themselves from malicious advertisements. One promising approach used by ADsafe, Dojo Secure, and Jacaranda, sandboxes advertisements by statically verifying that their JavaScript conforms to a safe subset of the language. These systems blacklist known dangerous properties that would let advertisements escape the...

    Provided By University of California

  • White Papers // Dec 2009

    Collaboration Practices and Affordances in Free/Open Source Software Development

    This paper examines collaborative work practices, development processes, project and community dynamics, and other socio-technical relationships in Free and Open Source Software Development (FOSSD). It also describes what kinds of collaboration affordances facilitate collaborative work in FOSSD projects. It reviews a set of empirical studies of FOSSD that articulate different...

    Provided By University of California

  • White Papers // Apr 2010

    The Challenge of Heterogeneously Licensed Systems in Open Architecture Software Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. But this...

    Provided By University of California

  • White Papers // Jul 2009

    The Role of Software Licenses in Open Architecture Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously-licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. The software licenses...

    Provided By University of California

  • White Papers // Dec 2009

    Harvesting SSL Certificate Data to Identify Web-Fraud

    Web-fraud is one of the most unpleasant features of today's Internet. Two eminent examples of web-fraudulent activities are phishing and typosquatting. Their effects range from relatively benign (such as unwanted or unexpected ads) to downright sinister (especially, when typosquatting is combined with phishing). This paper presents a novel technique to...

    Provided By University of California

  • White Papers // Feb 2010

    Practical Rate and Route Adaptation With Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks

    Accurate and fast Packet Delivery Ratio (PDR) estimation, used in evaluating wireless link quality, is a prerequisite to increase the performance of multi-hop and multi-rate IEEE 802.11 wireless networks. Unfortunately, contemporary PDR estimation methods, i.e. beacon-based packet counting in Estimated Transmission Time and Expected Transmission Count metrics, have unsatisfactory performance....

    Provided By University of California

  • White Papers // Jan 2011

    Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols

    The current process of designing a security protocol is usually ad-hoc and involves little formalism and mechanical assistance. Such a design process is not only slow but also error-prone. Evidence shows that even when security protocols are designed with care and examined intensely,they can still be fundamentally flawed. A classic...

    Provided By University of California

  • White Papers // Jan 2011

    External Double Hashing With Choice

    A novel extension to external double hashing providing significant reduction to both successful and unsuccessful search lengths is presented. The experimental and analytical results demonstrate the reductions possible. This method does not restrict the hashing table configuration parameters and utilizes very little additional storage space per bucket. The runtime performance...

    Provided By University of California

  • White Papers // Nov 2009

    Feeds as Query Result Serializations

    Many Web-based data sources and services are available as feeds, a model that provides consumers with a loosely coupled way of interacting with providers. The current feed model is limited in its capabilities, however. Though it is simple to implement and scales well, it cannot be transferred to a wider...

    Provided By University of California

  • White Papers // Jan 2011

    Cryptographic Voting Protocols: A Systems Perspective

    Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and they must analyze their security by considering...

    Provided By University of California

  • White Papers // Jan 2011

    Distillation Codes and Applications to DoS Resistant Multicast Authentication

    The authors introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast to erasure codes, distillation codes are robust against pollution attacks, a powerful class of Denial of Service (DoS) attacks...

    Provided By University of California

  • White Papers // Jan 2011

    Hidden Markov Model Cryptanalysis

    The authors present HMM attacks, a new type of cryptanalysis based on modeling randomized side channel countermeasures as Hidden Markov Models (HMM's). They also introduce Input Driven Hidden Markov Models (IDHMM's), a generalization of HMM's that provides a powerful and unified cryptanalytic framework for analyzing countermeasures whose operational behavior can...

    Provided By University of California

  • White Papers // May 2009

    The VIKING Project: An Initiative on Resilient Control of Power Networks

    This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system manaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. The authors will present the consortium, the motivation behind this research, the main objective...

    Provided By University of California

  • White Papers // Sep 2009

    Essays On The Financial Crisis And Globalization

    The authors have certainly been living in interesting times. While avoiding the worst connotations of that concept (no global war or other catastrophe), they have seen the fall of communism, the rise of information technology, and the beginnings of a shift in the global economic balance, back toward the days...

    Provided By University of California

  • White Papers // Sep 2009

    On Degrees of Freedom Region of MIMO Networks Without CSIT

    In this paper, the authors study the effect of the absence of channel knowledge for Multiple-Input-Multiple-Output (MIMO) networks. Specifically, they assume perfect channel state information at the receivers, no channel state information at the transmitter(s), and independent identically distributed (i.i.d.) Rayleigh fading across antennas, users and time slots. They provide...

    Provided By University of California

  • White Papers // Jan 2011

    Energy Conservation in Datacenters Through Cluster Memory Management and Barely-Alive Memory Servers

    As a result of current resource provisioning schemes in Internet services, servers end up less than 50% utilized almost all the time. At this level of utilization, the servers' energy efficiency is less than half their efficiency at peak utilization. A solution to this problem could be consolidating workloads into...

    Provided By University of California

  • White Papers // Jan 2011

    Timing Analysis of Keystrokes and Timing Attacks on SSH

    SSH is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has two weakness: First, the transmitted packets are padded only to an eight-byte boundary (if a block cipher is in use), which reveals the approximate size of the original data....

    Provided By University of California

  • White Papers // May 2009

    Achieving Linear Scaling With Interference Alignment

    Recent results have shown that interference alignment can achieve K/2 degrees of freedom in a K-user interference channel with time or frequency varying channel coefficients. For fixed number of users K, the number of degrees of freedom characterizes the asymptotic behavior of the performance in the high SNR limit but...

    Provided By University of California

  • White Papers // Feb 2010

    Estimating Time Preferences From Convex Budgets

    Experimentally elicited discount rates are frequently higher than what one would infer from market interest rates and seem unreasonable for economic decision-making. Such high rates have often been attributed to dynamic inconsistency, as in present bias and hyperbolic discounting. A commonly recognized bias of standard elicitation techniques is the use...

    Provided By University of California

  • White Papers // Jan 2010

    Risk Preferences Are Not Time Preferences

    Risk and time are intertwined. The present is known while the future is inherently risky. Discounted expected utility provides a simple, coherent structure for analyzing decisions in intertemporal, uncertain environments. Critical to such analysis is the notion that certain and uncertain utility are functionally interchangeable. The authors document an important...

    Provided By University of California

  • White Papers // Jan 2010

    Certain And Uncertain Utility: The Allais Paradox And Five Decision Theory Phenomena

    In the study of decision making under risk, preferences are assumed to be continuous. The authors present a model of discontinuous preferences over certain and uncertain outcomes. Using existing parameter estimates for certain and uncertain utility, five important decision theory phenomena are discussed: the certainty effect, experimentally observed probability weighting,...

    Provided By University of California

  • White Papers // Jan 2011

    The SQL-Based All-Declarative FORWARD Web Application Development Framework

    The vast majority of database-driven web applications perform, at a logical level, fundamentally simple Insert/Update/Delete commands. In response to a user action on the browser, the web application executes a program that transitions the old state to a new state. The state is primarily persistent and often captured in a...

    Provided By University of California

  • White Papers // Oct 2009

    Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels

    This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and the authors examine both the broadcast...

    Provided By University of California

  • White Papers // Nov 2009

    A Simple Conceptual Generator for the Internet Graph

    The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing...

    Provided By University of California

  • White Papers // Jul 2010

    Comprehending Environmental And Economic Sustainability: Comparative Analysis Of Stability Principles In The Biosphere And Free Market Economy

    Using the formalism of Lyapunov potential function it is shown that the stability principles for biomass in the ecosystem and for employment in economics are mathematically similar. The ecosystem is found to have a stable and an unstable stationary state with high (forest) and low (grasslands) biomass, respectively. In economics,...

    Provided By University of California

  • White Papers // Feb 2010

    Structural Change And Growth In India

    This paper examines the link between structural change and growth in India. It constructs indices of structural change, and performs a time series analysis of the data. It finds that 1988 marks a break in the time series of growth and structural change. There is one-way causality from structural change...

    Provided By University of California

  • White Papers // Apr 2011

    Illiquid Financial Markets And Monetary Policy

    This paper analyzes the role of money in markets where financial investment takes place in a decentralized fashion. A key methodological contribution is the development of a dynamic framework that brings together a model for illiquid assets a la Duffie et al. and a monetary framework a la Lagos and...

    Provided By University of California

  • White Papers // Nov 2009

    Kicking The Bad Apples Out: Tariff Liberalization And Bilateral Trade

    In this paper, the author presents a simple model in which liberalization of a Most-Favored Nation (MFN) tariff need not increase bilateral imports from all MFN sources. While liberalization must increase imports from high price MFN sources, it may decrease imports from low price MFN sources. This has stark implications...

    Provided By University of California

  • White Papers // Jun 2011

    Vintage Capital Growth Theory: Three Breakthroughs

    Vintage capital growth models have been at the heart of growth theory in the 60s. This research line collapsed in the late 60s with the so-called embodiment controversy and the technical sophistication of the vintage models. This paper analyzes the astonishing revival of this literature in the 90s. In particular,...

    Provided By University of California

  • White Papers // Apr 2011

    Financial Crises, Credit Booms, And External Imbalances: 140 Years Of Lessons

    Do external imbalances increase the risk of financial crises? In this paper, the authors study the experience of 14 developed countries over 140 years (1870{2008). They exploit their long-run dataset in a number of different ways. First, they apply new statistical tools to describe the temporal and spatial patterns of...

    Provided By University of California

  • White Papers // Apr 2009

    Authentication Without Elision

    Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In addition, real-world schemes often include parameter negotiations, authenticate associated data, and support a multiplicity of options. The cryptographic community has routinely elided such matters from the authors' definitions,...

    Provided By University of California

  • White Papers // Apr 2009

    A Secure Cryptographic Token Interface

    Cryptographic keys must be protected from exposure. In real-world applications, they are often guarded by cryptographic tokens that employ sophisticated hardware-security measures. Several logical attacks on the key management operations of cryptographic tokens have been reported in the past, which allowed exposing keys merely by exploiting the token API in...

    Provided By University of California

  • White Papers // Jun 2010

    Multinational Firms And Trade: Gravity Versus Market Power In A Ricardian World

    Are multinational firms good for consumer welfare? The authors build a model of foreign direct investment and trade that exploits both firm heterogeneity and strategic pricing behavior, embodying direct exporting and multinational production for both export and local sale in one framework. They show that improved efficiency in target firms...

    Provided By University of California

  • White Papers // Jan 2010

    Business Travel As An Input To International Trade

    The importance of business and social networks in generating trade is becoming increasingly recognized in the international economics literature. An important way in which people build and maintain networks is through face-to-face meetings. The author proposes an empirical model in which business travel helps to overcome informational asymmetries in international...

    Provided By University of California