University of California

Displaying 1-40 of 724 results

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Jan 2012

    Distributed Measurement-Aware Routing: Striking a Balance Between Measurement and Traffic Engineering

    Network-wide traffic measurement is important for various network management tasks, ranging from traffic accounting, traffic engineering, and network troubleshooting to security. Existing techniques for traffic measurement tend to be sub-optimal due to poor choice of monitor deployment location or due to constantly evolving monitoring objectives and traffic characteristics. It is...

    Provided By University of California

  • White Papers // Jan 2012

    A Methodology for Clustering XML Documents by Structure

    The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations involve, among others, the grouping of structurally similar XML documents. Such grouping results from the application of clustering methods with distances that estimate...

    Provided By University of California

  • White Papers // Jan 2012

    Probabilistic Data Management for Pervasive Computing: The Data Furnace Project

    The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key enablers for next-generation pervasive computing applications, including large-scale environmental monitoring and control, context-aware computing, and "Smart digital homes". Sensory readings are inherently unreliable and typically exhibit strong temporal and spatial correlations (within and...

    Provided By University of California

  • White Papers // Jan 2012

    In-Network PCA and Anomaly Detection

    The authors consider the problem of network anomaly detection in large distributed systems. In this setting, Principal Component Analysis (PCA) has been proposed as a method for discovering anomalies by continuously tracking the projection of the data onto a residual subspace. This method was shown to work well empirically in...

    Provided By University of California

  • White Papers // Dec 2011

    Security Primitives and Protocols for Ultra Low Power Sensor Systems

    Security requirements in sensor systems include resiliency against physical and side-channel attacks, low energy for communication, storage, and computation, and the ability to realize a variety of public-key protocols. Furthermore, primitives and protocols that enable trusted remote operation in terms of data, time, and location are essential to guarantee secure...

    Provided By University of California

  • White Papers // May 2011

    Energy Efficient E-Textile Based Portable Keyboard

    The authors have created sensor architecture, data collection and processing techniques for an E-Textile wireless keyboard. They leverage the inherent properties of E-Textiles to produce optimized architecture for energy efficient sensing. Novel techniques such as one where each sensor senses several events (activations of different keys) and each event is...

    Provided By University of California

  • White Papers // Dec 2011

    Detecting Local Events Using Global Sensing

    In order to create low power, low latency and reliable sensing systems, the authors propose a sensing strategy that identifies local events by the means of global measurements. They claim that capturing events globally, although seems against intuition, can save energy by enabling the organization of effective searching queries. To...

    Provided By University of California

  • White Papers // Sep 2011

    Robust Passive Hardware Metering

    Current hardware metering techniques, which use manifestational properties of gates for ID extraction, are weakened by the non-uniform effects of aging in conjunction with variations in temperature and supply voltage. As an Integrated Circuit (IC) ages, the manifestational properties of the gates change, and thus the ID used for hardware...

    Provided By University of California

  • White Papers // Dec 2011

    Medical Diagnostic-Based Sensor Selection

    Wearable sensing systems have facilitated a variety of applications in Wireless Health. Due to the considerable number of sensors and their constant monitoring these systems are often expensive and power hungry. Traditional approaches to sensor selection in large multi-sensory arrays attempt to alleviate these issues by removing redundant sensors while...

    Provided By University of California

  • White Papers // Dec 2011

    Nanotechnology-Based Trusted Remote Sensing

    The authors present a new nanotechnology PPUF-based architecture for trusted remote sensing. Current public physical unclonable function designs encompass complex circuits requiring high measurement accuracy and whose size slows down the authentication process. Their novel nanotechnology-based architecture ensures fast authentication through partial simulation while maintaining robust security. They authenticate over...

    Provided By University of California

  • White Papers // Feb 2011

    Securing Netlist-Level FPGA Design Through Exploiting Process Variation and Degradation

    The continuously widening gap between the Non-Recurring Engineering (NRE) and Recurring Engineering (RE) costs of producing Integrated Circuit (IC) products in the past few decades gives high incentives to unauthorized cloning and reverse-engineering of ICs. Existing IC Digital Rights Management (DRM) schemes often demands high overhead in area, power, and...

    Provided By University of California

  • White Papers // Jun 2011

    Matched Public PUF: Ultra Low Energy Security Platform

    Hardware-based Physically Unclonable Functions (PUFs) leverage intrinsic process variation of modern integrated circuits to provide interesting security solutions but either induce high storage requirements or require significant resources of at least one involved party. The authors use device aging to realize two identical unclonable modules that cannot be matched with...

    Provided By University of California

  • White Papers // May 2011

    Analyzing the Crossdomain Policies of Flash Applications

    Adobe Flash is a rich Internet application platform. Flash applications are often deployed to the Web; The Flash Player plugin is installed on a large fraction of all Web connected PCs. Flash provides a mechanism by which sites can opt in to more expressive information sharing regimes than the same-origin...

    Provided By University of California

  • White Papers // May 2011

    Fingerprinting Information in JavaScript Implementations

    To date, many attempts have been made to fingerprint users on the web. These fingerprints allow browsing sessions to be linked together and possibly even tied to a user's identity. They can be used constructively by sites to supplement traditional means of user authentication such as passwords; and they can...

    Provided By University of California

  • White Papers // May 2011

    The Underground Economy of Fake Antivirus Software

    Fake Anti-Virus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, the authors...

    Provided By University of California

  • White Papers // Sep 2010

    Toward Automated Detection of Logic Vulnerabilities InWeb Applications

    Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, there has also been an increase in the number and complexity of vulnerabilities. Current techniques to identify security problems in web applications...

    Provided By University of California

  • White Papers // Aug 2010

    Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners

    Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "Point-and-click pentesting" tools that automatically evaluate the security of web applications with little or no human support. These tools access a web application in...

    Provided By University of California

  • White Papers // Apr 2010

    Are BGP Routers Open to Attack? An Experiment

    The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been some catastrophic incidents in the past, due to relatively simple router mis-configurations. In addition, unused network addresses are being silently...

    Provided By University of California

  • White Papers // May 2011

    Compressing Provenance Graphs

    The provenance community has built a number of systems to collect provenance, most of which assume that provenance will be retained indefinitely. However, it is not cost-effective to retain provenance information inefficiently. Since provenance can be viewed as a graph, the authors note the similarities to web graphs and draw...

    Provided By University of California

  • White Papers // Jun 2011

    Show Me the Money: Characterizing Spam-Advertised Revenue

    Modern spam is ultimately driven by product sales: goods purchased by customers online. However, while this model is easy to state in the abstract, the authors' understanding of the concrete business environment - how many orders, of what kind, from which customers, for how much - is poor at best....

    Provided By University of California

  • White Papers // Mar 2011

    Implications of Netalyzr's DNS Measurements

    Netalyzr is a widely used network measurement and diagnosis tool. To date, it has collected 198,000 measurement sessions from 146,000 distinct IP addresses. One of the primary focus areas of Netalyzr is DNS behavior, including DNS resolver properties, common name lookups, NXDOMAIN wildcarding, lookup performance, and on-the-wire manipulations. Additional tests...

    Provided By University of California

  • White Papers // Jan 2012

    A Methodology for Clustering XML Documents by Structure

    The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations involve, among others, the grouping of structurally similar XML documents. Such grouping results from the application of clustering methods with distances that estimate...

    Provided By University of California

  • White Papers // Jan 2012

    Probabilistic Data Management for Pervasive Computing: The Data Furnace Project

    The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key enablers for next-generation pervasive computing applications, including large-scale environmental monitoring and control, context-aware computing, and "Smart digital homes". Sensory readings are inherently unreliable and typically exhibit strong temporal and spatial correlations (within and...

    Provided By University of California

  • White Papers // Jan 2012

    In-Network PCA and Anomaly Detection

    The authors consider the problem of network anomaly detection in large distributed systems. In this setting, Principal Component Analysis (PCA) has been proposed as a method for discovering anomalies by continuously tracking the projection of the data onto a residual subspace. This method was shown to work well empirically in...

    Provided By University of California

  • White Papers // Aug 2008

    Flexible and Secure Communications in an Identity-Based Coalition Environment

    In this paper, the authors consider the problem of how entities operating under distinct roots of trust in a coalition environment can flexibly and securely communicate with one another. They consider the identity-based setting, with each entity being pre-configured with a private key from a particular Trusted Authority (TA), but...

    Provided By University of California

  • White Papers // Sep 2010

    Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks

    Researches about multi-radio mesh networks have mostly focused on channel allocation under internal interference. However, the deployment of WMNs in unlicensed bands of dense urban areas imposes many challenges regarding co-existence with residential access points. In this paper, the authors propose Urban-X, which is a first attempt towards a new...

    Provided By University of California

  • White Papers // May 2009

    Temperature Driven Time Synchronization

    Time synchronization in embedded sensor networks is an important service for correlating data between nodes and communication scheduling. While many different approaches to the problem are possible, one major effect of clock frequency difference between nodes, environmental temperature changes, has often been left out of the solution. The common assumption...

    Provided By University of California

  • White Papers // Jul 2010

    Frequency Quorum Rendezvous for Fast and Resilient Key Establishment Under Jamming Attack

    Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. Existing countermeasures often make use of spread-spectrum techniques such as Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum. Communication parties rely on a pre-shared common key (hopping sequence or spread code)...

    Provided By University of California

  • White Papers // Dec 2009

    Protecting Network Coded Packets in Coalition Networks

    Network coding was found to be useful for ad hoc wireless multicast in disruptive channel and connectivity conditions. In heterogeneous networks, comprising teams with different technical preparedness, it is possible that only the radios of the most advanced teams have sufficient resources to network encode/decode. In this case, an interesting...

    Provided By University of California

  • White Papers // Jun 2011

    Tahakum: A Multi-Purpose Audio Control Framework

    The authors present "Tahakum", an open source, extensible collection of software tools designed to enhance workflow on multichannel audio systems within complex multi-functional research and development environments. Tahakum aims to provide critical functionality required across a broad spectrum of audio systems usage scenarios, while at the same time remaining sufficiently...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // May 2010

    Towards an Efficient Distributed Object Recognition System in Wireless Smart Camera Networks

    The authors propose an efficient distributed object recognition system for sensing, compression, and recognition of 3-D objects and landmarks using a network of wireless smart cameras. The foundation is based on a recent work that shows the representation of scale-invariant image features exhibit certain degree of sparsity: if a common...

    Provided By University of California

  • White Papers // Jul 2009

    Multiple-View Object Recognition in Band-Limited Distributed Camera Networks

    In this paper, the authors study the classical problem of object recognition in low-power, low-bandwidth distributed camera networks. The ability to perform robust object recognition is crucial for applications such as visual surveillance to track and identify objects of interest, and compensate visual nuisances such as occlusion and pose variation...

    Provided By University of California

  • White Papers // May 2009

    Distributed Compression and Fusion of Nonnegative Sparse Signals for Multiple-View Object Recognition

    Visual surveillance in complex urban environments requires an intelligent system to automatically track and identify multiple objects of interest in a network of distributed cameras. The ability to perform robust object recognition is critical to compensate adverse conditions and improve performance, such as multi-object association, visual occlusion, and data fusion...

    Provided By University of California

  • White Papers // Mar 2009

    Information Dissemination Control for Cooperative Active Safety Applications in Vehicular Ad-Hoc Networks

    Vehicular Ad-Hoc NETworks (VANETs) play a critical role in enabling important active safety applications such as collision warning and vehicle tracking. The most pressing challenge in enabling such applications is to maximize the amount of disseminated vehicle state information while avoiding network congestion. In this paper, the authors explore the...

    Provided By University of California

  • White Papers // Apr 2009

    Stealthy Poisoning Attacks on PCA-Based Anomaly Detectors

    The authors consider systems that use PCA-based detectors obtained from a comprehensive view of the network's traffic to identify anomalies in backbone networks. To assess these detectors' susceptibility to adversaries wishing to evade detection, they present and evaluate short-term and long-term data poisoning schemes that trade-off between poisoning duration and...

    Provided By University of California

  • White Papers // Feb 2009

    Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems

    Networked end-systems such as desktops and set-top boxes are often left powered-on, but idle, leading to wasted energy consumption. An alternative would be for these idle systems to enter low-power sleep modes. Unfortunately, today, a sleeping system sees degraded functionality: first, a sleeping device loses its network "Presence" which is...

    Provided By University of California

  • White Papers // Jan 2012

    A Revenue Enhancing Stackelberg Game for Owners in Opportunistic Spectrum Access

    A Stackelberg game between three players; spectrum owner, primary users and secondary users is presented under the Opportunistic Spectrum Access (OSA) model, where the secondary users share the channel with primary users in time and secondary user access is performed through a non-perfect listen-before-send scheme. It is shown through simulations...

    Provided By University of California

  • White Papers // Jul 2009

    Percolation on Interacting Networks

    Most networks of interest do not live in isolation. Instead they form components of larger systems in which multiple networks with distinct topologies coexist and where elements distributed amongst different networks may interact directly. The authors derive exact expressions for the percolation threshold describing the onset of large-scale connectivity in...

    Provided By University of California

  • White Papers // Apr 2009

    Modeling and Verifying a Broad Array of Network Properties

    Motivated by widely observed examples in nature, society and software, where groups of related nodes arrive together and attach to existing networks, the authors consider network growth via sequential attachment of linked node groups or graphlets. They introduce a fifteen-dimensional attribute vector derived from seven well-known network properties, which enables...

    Provided By University of California

  • White Papers // Aug 2011

    TraJECT-3D: Generating Realistic Mobility Traces for Tactical Network Simulation

    The authors present TraJECT-3D (Track and Junction based Exploit over Complex Terrain), a realistic generator of node movement trajectories for simulating tactical Mobile Ad-Hoc NETworks (MANETs). TraJECT-3D models the macro- and micro-mobility of different types of tactical nodes (e.g., soldiers, scouts, vehicles, UAVs) with a bidirectional track and junction strategy....

    Provided By University of California

  • White Papers // Sep 2011

    Reliability-Aware Geocast for Mobile Ad Hoc Networks

    The authors present a geocast protocol for mobile ad hoc networks that selects the most statistically reliable path towards the geocast region. The novel aspect of their protocol is the attribution of network layer reliability to space, which enables reliability-aware geocast and provides soft delay guarantees. The proposed approach focuses...

    Provided By University of California

  • White Papers // May 2010

    The Emperor's New APIs: On the (In)Secure Usage of New Client-Side Primitives

    Several new browser primitives have been proposed to meet the demands of application interactivity while enabling security. To investigate whether applications consistently use these primitives safely in practice, the authors study the real-world usage of two client-side primitives, namely postMessage and HTML5's client-side database storage. They examine new purely client-side...

    Provided By University of California

  • White Papers // May 2010

    Secure Cooperative Sharing of JavaScript, Browser, and Physical Resources

    For better application-level controls on mashups, they advocate extending the Single Origin Policy and associated primitives to support a cooperative model that allows applications to express explicit sharing policies over browser, Javascript, and physical resources. First, the authors introduce an isolation model for content loading that is more complete than...

    Provided By University of California