University of California

Displaying 361-400 of 665 results

  • White Papers // May 2010

    An Evaluation of Distributed Datastores Using the AppScale Cloud Platform

    The authors present new cloud support that employs a single API the Datastore API from Google App Engine (GAE) to interface to different open source distributed database technologies. They employ this support to "Plug in" these technologies to the API so that they can be used by web applications and...

    Provided By University of California

  • White Papers // May 2010

    Beyond Multi-Hop: Optimal Cooperation in Large Wireless Networks

    Multi-hop is the communication architecture of current wireless networks such as mesh or ad hoc networks. Packets are sent from each source to its destination via multiple point-to-point transmissions between relaying nodes. The origins of this approach are rooted in the practice of traditional wire-line networks. Today, the increasing need...

    Provided By University of California

  • White Papers // May 2010

    Is the Internet for Porn? an Insight Into the Online Adult Industry

    The online adult industry is among the most profitable business branches on the Internet, and its web sites attract large amounts of visitors and traffic. Nevertheless, no study has yet characterized the industry's economical and security-related structure. As cyber-criminals are motivated by financial incentives, a deeper understanding and identification of...

    Provided By University of California

  • White Papers // May 2010

    Secure Cooperative Sharing of JavaScript, Browser, and Physical Resources

    For better application-level controls on mashups, they advocate extending the Single Origin Policy and associated primitives to support a cooperative model that allows applications to express explicit sharing policies over browser, Javascript, and physical resources. First, the authors introduce an isolation model for content loading that is more complete than...

    Provided By University of California

  • White Papers // May 2010

    Designing Modular Hardware Accelerators in C With ROCCC 2.0

    While FPGA-based hardware accelerators have repeatedly been demonstrated as a viable option, their programmability remains a major barrier to their wider acceptance by application code developers. These platforms are typically programmed in a low level hardware description language, a skill not common among application developers and a process that is...

    Provided By University of California

  • White Papers // Apr 2010

    Are BGP Routers Open to Attack? An Experiment

    The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been some catastrophic incidents in the past, due to relatively simple router mis-configurations. In addition, unused network addresses are being silently...

    Provided By University of California

  • White Papers // Apr 2010

    DP-FAIR: A Simple Model for Understanding Optimal Multiprocessor Scheduling

    The authors consider the problem of optimal real-time scheduling of periodic and sporadic tasks for identical multiprocessors. A number of recent papers have used the notions of fluid scheduling and deadline partitioning to guarantee optimality and improve performance. In this paper, they develop a unifying theory with the DP-FAIR scheduling...

    Provided By University of California

  • White Papers // Apr 2010

    Effective Anomaly Detection With Scarce Training Data

    Learning-based anomaly detection has proven to be an effective black-box technique for detecting unknown attacks. However, the effectiveness of this technique crucially depends upon both the quality and the completeness of the training data. Unfortunately, in most cases, the traffic to the system (e.g., a web application or daemon process)...

    Provided By University of California

  • White Papers // Apr 2010

    Inspector Gadget: Automated Extraction of Proprietary Gadgets From Malware Binaries

    Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the analysis of malware samples: Only if an analyst understands the behavior of a given sample, she can design appropriate countermeasures. Manual approaches are frequently...

    Provided By University of California

  • White Papers // Apr 2010

    Separating Functional and Parallel Correctness Using Nondeterministic Sequential Specifications

    Writing correct explicitly-parallel programs can be very challenging. While the functional correctness of a program can often be understood largely sequentially, a software engineer must simultaneously reason about the non-deterministic parallel interleavings of the program's threads of execution. This complication is similarly a challenge to automated verification efforts. Thus, the...

    Provided By University of California

  • White Papers // Apr 2010

    Location Estimation for Wireless Sensor Retrieval

    Wireless sensor retrieval is importance for cost saving, data analysis and security purposes in WSNs. Finding sensors is especially challenging because both the number and locations of these sensors could be unknown. In this paper, the authors propose an online probabilistic localization algorithms that iteratively calculate the locations of multiple...

    Provided By University of California

  • White Papers // Apr 2010

    Lazy Annotation for Program Testing and Verification

    The authors describe an interpolant-based approach to test generation and model checking for sequential programs. The method generates Floyd/Hoare style annotations of the program on demand, as a result of failure to achieve goals, in a manner analogous to conflict clause learning in a DPLL style SAT solver. The DPLL...

    Provided By University of California

  • White Papers // Apr 2010

    Covariance Based Signaling and Feedback Data Parameterization for the TimeVarying MIMO Broadcast Channel

    Linear precoding (beamforming) techniques that maximize the sum rate in the multi-antenna broadcast channel often suffer severe performance degradation when the channel state information at the transmitter is erroneous or outdated. This paper presents a linear precoding algorithm that uses the channel statistics rather than channel state to provide more...

    Provided By University of California

  • White Papers // Apr 2010

    Network Coding-Aware Queue Management for Unicast Flows Over Coded Wireless Networks

    The authors are interested in unicast flows over wireless networks with intersession network coding (such as COPE). TCP flows over coded wireless networks do not fully exploit network coding opportunities due to their bursty behavior and to the fact that TCP is agnostic to the underlying network coding. In this...

    Provided By University of California

  • White Papers // Apr 2010

    The Challenge of Heterogeneously Licensed Systems in Open Architecture Software Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. But this...

    Provided By University of California

  • White Papers // Apr 2010

    Using "Recycled Predictions" for Computing Marginal Effects

    A conventional way to estimate the marginal effect of a risk factor is to omit the risk factor (e.g., gender, treatment) from the multivariate model and then use the omitted risk factor as class/group variable to compare observed and predicted outcomes. This can have an undesirable impact on the model...

    Provided By University of California

  • White Papers // Apr 2010

    The Rise And Fall Of The Nonconventional Mortgage Industry

    The 2007-2009 financial crises were centered on the nonconventional mortgage industry. Scholars have just begun to carefully consider what really caused the crisis. This paper pushes the debate forward in several ways. First, the authors elucidate four different theoretical approaches, "Financialization", "Actor-Network/Performativity", "Perverse Incentives", and "Markets As Politics" to understanding...

    Provided By University of California

  • White Papers // Apr 2010

    A Cryptographic Treatment of the Wiretap Channel

    The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "Noisier" than the channel from sender to receiver. It has been the subject of decades of work in the Information and...

    Provided By University of California

  • White Papers // Apr 2010

    Spatial Multiplexing in Random Wireless Networks

    The authors consider a network of transmitters, each with a receiver at a fixed distance, and locations drawn independently according to a homogeneous Poisson Point Process (PPP). The transmitters and the receivers are equipped with multiple antennas. Under a channel model that includes Rayleigh fading and path-loss, and an outage...

    Provided By University of California

  • White Papers // Apr 2010

    Is Our Monetary Structure A Systemic Cause For Financial Instability? Evidence And Remedies From Nature

    Fundamental laws govern all complex flow systems, including natural ecosystems, economic and financial systems. Natural ecosystems are practical exemplars of sustainability: enduring, vital, adaptive. The sustainability of any complex flow system can be measured with a single metric as an emergent property of its structural diversity and interconnectivity; it requires...

    Provided By University of California

  • White Papers // Mar 2010

    A Path Loss Model for Non-Line-of-Sight Ultraviolet Multiple Scattering Channels

    An UltraViolet (UV) signal transmission undergoes rich scattering and strong absorption by atmospheric particulates. The authors develop a path loss model for a Non-Line-Of-Sight (NLOS) link. The model is built upon probability theory governing random migration of photons in free space, undergoing scattering, in terms of angular direction and distance....

    Provided By University of California

  • White Papers // Mar 2010

    Validity of Network Analyses in Open Source Projects

    Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in the information flow between contributors or contributions in these projects. Social network metrics have also been used to predict defect occurrence. However, such studies often ignore...

    Provided By University of California

  • White Papers // Mar 2010

    Clones: What is that Smell?

    Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance difficulties. Clones inherently cause code bloat, thus increasing project size and maintenance costs. In this work, the authors try to validate the conventional wisdom empirically...

    Provided By University of California

  • White Papers // Mar 2010

    A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications

    The authors consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received...

    Provided By University of California

  • White Papers // Mar 2010

    A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks

    The authors present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Their parameter-free algorithm finds the optimal node to host the operator with minimum communication cost overhead. Three techniques, proposed here, make this feature possible:...

    Provided By University of California

  • White Papers // Mar 2010

    When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

    Random Number Generators (RNGs) are consistently a weak link in the secure use of cryptography. Routine cryptographic operations such as encryption and signing can fail spectacularly given predictable or repeated randomness, even when using good long-lived key material. This has proved problematic in prior settings when RNG implementation bugs, poor...

    Provided By University of California

  • White Papers // Mar 2010

    Route Management in Semi-Infrastructured Wireless Networks

    Wireless network topologies have developed in a considerably different manner than the original vision of the ad-hoc network. Rather than a number of nodes with similar capabilities moving about in randomly in an open field, today's wireless topologies are both hierarchical and heterogeneous. They consist of nodes with very different...

    Provided By University of California

  • White Papers // Mar 2010

    Financial Analysis Using SAS PROCS

    Financial services industry is interested in analyzing vast financial data including price trends from stock exchanges around the world. SAS analytical and graphical tools are extremely useful to enable statistical analysis of various financial data including stock price information. Time Series statistical method is a valuable approach for analysis of...

    Provided By University of California

  • White Papers // Mar 2010

    Data Management Challenges in Cloud Computing Infrastructures

    The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access...

    Provided By University of California

  • White Papers // Mar 2010

    The ProximalWorkspace Architecture: A Latency-Focused Approach to Supporting Context-Aware Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, and applications that represent a new generation of computation-and-data-intensive programs. They are developing a new system architecture based on supporting workspaces which provide nearby computing power to...

    Provided By University of California

  • White Papers // Mar 2010

    Towards a Proximal Resource-Based Architecture to Support Augmented Reality Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, e.g., video glasses, earphones, wrist displays, body sensors, etc., and applications that represent a new generation of computation and-data-intensive programs in areas such as augmented reality. While...

    Provided By University of California

  • White Papers // Mar 2010

    Strong Robustness of Randomized Rumor Spreading Protocols

    Randomized rumor spreading is a classical protocol to disseminate information across a network. At SODA 2008, a quasirandom version of this protocol was proposed and competitive bounds for its run-time were proven. This prompts the question: to what extent does the quasirandom protocol inherit the second principal advantage of randomized...

    Provided By University of California

  • White Papers // Mar 2010

    Link-Layer Encryption Effect on Achievable Capacity in Wireless Network Coding

    In recent years, network coding has been enthusiastically promoted for certain wireless settings as a means of improving throughput and achieving higher capacity. Naturally, such proposals focused on communication issues, while paying less attention to security implications. This paper considers the effect of Link-Layer Encryption (LLE) on network coding in...

    Provided By University of California

  • White Papers // Mar 2010

    The Impact of Frequency-Agility on Dynamic Spectrum Sharing

    Designed to adapt spectrum usage on-the-fly, frequency-agile radios can drastically improve performance of wireless networks. Such flexibility, however, comes with a cost of increased hardware complexity. This motivates one to understand when and why having higher degree of frequency-agility helps and how much improvement it can lead to. In this...

    Provided By University of California

  • White Papers // Mar 2010

    Optimus: SINR-Driven Spectrum Distribution Via Constraint Transformation

    The fast, organic growth of wireless networks has created a challenging problem: "How to distribute radio spectrum among network nodes on-demand while avoiding harmful interference?" This spectrum distribution problem differs from conventional channel allocation problems because the amount of spectrum assigned to each network node is often unknown and must...

    Provided By University of California

  • White Papers // Mar 2010

    Identifying Dormant Functionality in Malware Programs

    To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malware analysis typically follow a dynamic approach, executing an unknown program in a controlled environment (sandbox) and recording its runtime behavior. Since dynamic analysis platforms...

    Provided By University of California

  • White Papers // Mar 2010

    Quadratic Optimization for Controller Initialization in MIMO Switching Systems

    This paper deals with switching between several linear time-invariant controllers to be used in feedback with a MIMO linear time-invariant (not necessarily stable) plant to be controlled. The authors explore the fact that, aside from selecting the controllers' transfer functions and deciding which controller to use in the feedback loop...

    Provided By University of California

  • White Papers // Mar 2010

    Hedera: Dynamic Flow Scheduling for Data Center Networks

    Today's data centers offer tremendous aggregate bandwidth to clusters of tens of thousands of machines. However, because of limited port densities in even the highest-end switches, data center topologies typically consist of multi-rooted trees with many equal-cost paths between any given pair of hosts. Existing IP multipathing protocols usually rely...

    Provided By University of California

  • White Papers // Feb 2010

    An FPGA-Based Simulator for Datacenter Networks

    The authors describe an FPGA-based datacenter network simulator for researchers to rapidly experiment with O(10,000) node datacenter network architectures. Their simulation approach configures the FPGA hardware to implement abstract models of key datacenter building blocks, including all levels of switches and servers. They model servers using a complete SPARC v8...

    Provided By University of California

  • White Papers // Feb 2010

    Security Aware Partitioning for Efficient File System Search

    Index partitioning techniques - where indexes are broken into multiple distinct sub-indexes - are a proven way to improve metadata search speeds and scalability for large file systems, permitting early triage of the file system. A partitioned metadata index can rule out irrelevant files and quickly focus on files that...

    Provided By University of California

  • White Papers // May 2009

    Towards Low Latency State Machine Replication for Uncivil Wide-area Networks

    This paper is intended to study the design principle of a low-latency Byzantine state machine protocol, called RAM, for this system model. The aim of this report is to reflect on the difficulty of building state machines in a multi-site setting, which lacks trusts between two sites, but not within...

    Provided By University of California

  • White Papers // Jul 2009

    Data Center Switch Architecture in the Age of Merchant Silicon

    For massively parallel workloads, the principal bottleneck is often not the performance of individual nodes but the rate at which these nodes can exchange data over the network. Many Data Center Network (DCN) applications demonstrate little communication locality, meaning that the communication substrate must support high aggregate bisection bandwidth for...

    Provided By University of California

  • White Papers // Oct 2009

    AppScale: Scalable and Open AppEngine Application Development and Deployment

    Cloud Computing refers to the service-oriented cluster computing based on Service-Level Agreements (SLAs). Through cloud computing, the use of large-scale distributed systems is made simple through transparent and adaptive resource management. It also makes configuration and deployment of an entire software stack both simple and automatic. This technology also makes...

    Provided By University of California

  • White Papers // Mar 2009

    Parallelizing the Web Browser

    Authors of this paper argue that the transition from laptops to handheld computers will happen only if they rethink the design of web browsers. Web browsers are an indispensable part of the end-user software stack but they are too inefficient for handhelds. While the laptop reused the software stack of...

    Provided By University of California

  • White Papers // Jan 2010

    Towards a More Functional and Secure Network Infrastructure

    This paper proposes an overlay network infrastructure that provides better protection against DoS attacks as well as more functionality than today's Internet. The solution is based on three simple principles:enabling end-hosts to communicate without revealing their IP address, giving end-hosts control to defend against Denial-of-Service (DoS) attacks at the overlay...

    Provided By University of California

  • White Papers // Jan 2010

    Query-Driven Visualization of Large Data Sets

    This paper presents a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is constrained to the subset of data deemed interesting by the user. In many scientific data analysis applications, interesting data can be defined by compound Boolean range...

    Provided By University of California

  • White Papers // Jan 2010

    Network Sensitivity to Intradomain Routing Changes

    The Internet's routing architecture was designed to have a clean separation between the intradomain and interdomain routing protocols. However, the appropriate division of labor between these two tiers becomes unclear when an Autonomous System (AS) has interdomain routes to a destination through multiple border routers a situation that is extremely...

    Provided By University of California

  • White Papers // Jul 2010

    Code Generation for Embedded Java With Ptolemy

    Code generation from models is the ultimate goal of model-based design. For real-time systems the generated code must be analyzable for the worst-case execution time (WCET). This paper evaluates Java code generation from Ptolemy II for embedded real-time Java. The target system is the time-predictable Java processor JOP. The quality...

    Provided By University of California

  • White Papers // Jun 2010

    A Novel SLA Framework for Time-Differentiated Resilience in Optical Mesh Networks

    Telecom customers may have specific time periods during which they require extra resilience. However, these time-differentiated resilience requirements are not effectively addressed by current SLA frameworks. To satisfy these high priority periods, a generic SLA framework typically provides upgraded protection over the entire service duration, which is unnecessary and expensive....

    Provided By University of California

  • White Papers // Jul 2009

    Challenges for Securing Cyber Physical Systems

    Cyber-Physical Systems (CPS) has been at the core of critical infrastructures and industrial control systems for many decades, and yet, there have been few confirmed cases of computer-based attacks. The authors discuss three key challenges for securing cyberphysical systems: understanding the threats, and possible consequences of attacks, identifying the unique...

    Provided By University of California

  • White Papers // Aug 2009

    Joint Multicast Routing and Network Design Optimization for Networks-on-Chip

    This paper considers the problem of synthesizing custom Networks-on-Chip (NoC) architectures that are optimized for a given application. Both unicast and multicast traffic flows are considered in the input specification. This paper formulate the joint multicast routing and network design problem using a rip-up and reroute procedure, where each multicast...

    Provided By University of California

  • White Papers // May 2009

    Energy-Aware Routing in Wireless Sensor Networks With Adaptive Energy-Slope Control

    Wireless Sensor Networks (WSNs) have proven and increased their popularity in many different applications where sensitive information is collected at sensor nodes and forwarded to a Central Analysis (CA) center. However, the constraints of limited resources and requirements for environment-dependent connectivity and life cycle have urged designers to seek more...

    Provided By University of California

  • White Papers // Aug 2009

    An Adaptive Opportunistic Routing Scheme for Wireless Ad-Hoc Networks

    In this paper, a distributed adaptive opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with...

    Provided By University of California

  • White Papers // Aug 2009

    Routing to Manage Resolution and Waiting Time in Call Centers With Heterogeneous Servers

    In many call centers, agents are trained to handle all arriving calls but exhibit very different performance for the same call type, where performance is defined by the Average call Handling Time (AHT) and the call Resolution Probability (RP). this paper explore strategies for determining which calls should be handled...

    Provided By University of California

  • White Papers // Jan 2010

    End-Host Controlled Multicast Routing

    The last decade has seen a deluge of proposals for supporting multicast in the Internet. These proposals can be categorized as either infrastructure-based, with the multicast functionality provided by specialized network nodes, or host-based, with the multicast functionality provided by the members of the multicast group itself. In this paper,...

    Provided By University of California

  • White Papers // Jan 2010

    Internet QoS Routing With IP Telephony and TCP Traffic

    In this paper, authors propose the use of QoS routing to enhance the support of IP Telephony. The proposed scheme is based on QoS intradomain OSPF routing, an extension of the conventional OSPF routing protocol. A DiffServ model is used (no per flow signalling, nor per flow accounting at intermediate...

    Provided By University of California

  • White Papers // Nov 2008

    Bluetooth, ZigBee, and Wibree: A Comparison of WPAN Technologies

    Wireless Personal Area Network (WPAN) designs have been flourishing in recent years. The pervasive success of Bluetooth has been a boon to all devices in the IEEE 802.15 working group. As competing and complementary standards are formed within this working group, a successful embedded system designer must understand the differences...

    Provided By University of California

  • White Papers // Jun 2010

    Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices

    Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to implement multiple technologies into a single radio. This system-on-a-chip architecture leads to competition among networks when devices toggle across different technologies to communicate with multiple networks. In this paper, authors...

    Provided By University of California

  • White Papers // Aug 2009

    Lightweight Jammer Localization in Wireless Networks: System Design and Implementation

    Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal network operations. After detecting the malicious node authors want to find its position,...

    Provided By University of California

  • White Papers // Jan 2010

    XBiT: An XML-Based Bitemporal Data Model

    Past research work on modeling and managing temporal in-formation has, so far, failed to elicit support in commercial database systems. The increasing popularity of XML offers a unique opportunity to change this situation, inasmuch as XML and XQuery support temporal information much better than relational tables and SQL. This is...

    Provided By University of California

  • White Papers // Jan 2010

    NeT & CoT: Inferring XML Schemas From Relational World

    With XML emerging as the data format of the Internet era, there is a substantial increase in the amount of data encoded in XML. However, the majority of everyday data is still stored and maintained in relational databases. Therefore, the authors expect the needs to convert such relational data into...

    Provided By University of California

  • White Papers // Jan 2010

    Overlay Multicast in Mobile Ad-Hoc Networks Using Araneola

    Araneola, a system for scalable reliable multicast in dynamic wired network environments, exploits the good properties of random regular graphs (high connectivity and diameter that grows logarithmically with network size), to provide reliable, scalable and efficient message dissemination. The authors investigate the suitability of Araneola's probabilistic overlay creation and deterministic...

    Provided By University of California

  • White Papers // Jan 2010

    Poster Abstract: Packet Delivery Performance for On-Body Mica2dot Wireless Sensor Networks

    Wearable computing continues to attract researchers' interests. In particular, the combination of biomedical applications and sensor networks has been in major focus, especially in the field of real-time health care monitoring. Various connection mediums have been proposed for such platforms. This includes wired and wireless communication schemes. The inconvenience of...

    Provided By University of California

  • White Papers // Jan 2010

    The Current State Of The Housing, Mortgage, And Commercial Real Estate Markets: Some Policy Proposals To Deal With The Current Crisis And Reform Proposals To The Real Estate Finance System

    Although there are signs of stability in new housing starts, existing home sales, and house prices, it will be a long, slow recovery of 3-4 years before we return to equilibrium conditions. The embryonic recovery in housing has been highly dependent on massive federal government intervention rather than an organic...

    Provided By University of California

  • White Papers // Jan 2010

    Information Collection Services for QoS-aware Mobile Applications

    Efficient resource provisioning that allows for cost-effective enforcement of application QoS relies on accurate system state information. However, maintaining accurate information about available system resources is complex and expensive especially in mobile environments where system conditions are highly dynamic. Resource provisioning mechanisms for such dynamic environments must therefore be able...

    Provided By University of California

  • White Papers // Mar 2009

    An Experimental Study on Wi-Fi Ad-Hoc Mode for Mobile Device-to-Device Video Delivery

    The demand for video content is continuously increasing as video sharing on the Internet is becoming enormously popular recently. This demand, with its high bandwidth requirements, has a considerable impact on the load of the network infrastructure. As more users access videos from their mobile devices, the load on the...

    Provided By University of California

  • White Papers // Jul 2009

    Did Bankruptcy Reform Contribute To The Mortgage Crisis?

    Before 2005 bankruptcy reform, homeowners in financial distress could use bankruptcy to help save their homes. Homeowners could have their unsecured debts discharged in Chapter 7, thus freeing up funds to make their mortgage payments. Homeowners who were in default on their mortgages could stop foreclosure by filing under Chapter...

    Provided By University of California

  • White Papers // Jun 2009

    Underwriting, Mortgage Lending, And House Prices:

    Lowering of underwriting standards may have contributed much to the unprecedented recent rise and subsequent fall of mortgage volumes and house prices. Conventional data don't satisfactorily measure aggregate underwriting standards over the past decade: The easing and then tightening of underwriting, inside and especially outside of banks, was likely much...

    Provided By University of California

  • White Papers // Jan 2010

    Fisheye State Routing in Mobile Ad Hoc Networks

    In this paper, the authors present a novel routing protocol for wireless ad hoc networks - Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on...

    Provided By University of California

  • White Papers // Sep 2010

    Streaming Satellite Data to Cloud Workflows for On-Demand Computing of Environmental Products

    Environmental data arriving constantly from satellites and weather stations are used to compute weather coefficients that are essential for agriculture and viticulture. For example, the reference evapotranspiration (ET0) coefficient, overlaid on regional maps, is provided each day by the California Department of Water Resources to local farmers and turf managers...

    Provided By University of California

  • White Papers // Oct 2009

    Australasian Accounting Business And Finance Journal

    During the Great Depression, one third of all banks in the United States failed. Scholars dispute reason for their demise. This essay analyzes new evidence on the sources of bank distress. The data demonstrates that contagion via correspondent networks and bank runs propagated the initial banking panics in the fall...

    Provided By University of California

  • White Papers // Jan 2010

    The Role Of Search Engine Optimization In Search Rankings

    Web sites invest significant resources in trying to influence their visibility among online search results. In addition to paying for sponsored links, they invest in methods known as search engine optimization (SEO). The authors study the economic incentives of Web sites to invest in SEO and its implications on visitor...

    Provided By University of California

  • White Papers // Mar 2010

    The ProximalWorkspace Architecture: A Latency-Focused Approach to Supporting Context-Aware Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, and applications that represent a new generation of computation-and-data-intensive programs. They are developing a new system architecture based on supporting workspaces which provide nearby computing power to...

    Provided By University of California

  • White Papers // Mar 2010

    Towards a Proximal Resource-Based Architecture to Support Augmented Reality Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, e.g., video glasses, earphones, wrist displays, body sensors, etc., and applications that represent a new generation of computation and-data-intensive programs in areas such as augmented reality. While...

    Provided By University of California

  • White Papers // May 2009

    Scalable Virtual Machine Multiplexing

    A Virtual Machine (VM) is a software abstraction of a real, physical machine. Virtualization has been around for almost 50 years, beginning with IBM's pioneering work in the 1960s. However, recent years have seen a significant surge in the interest and use of virtualization, driven by better hardware support, increasing...

    Provided By University of California

  • White Papers // Jan 2010

    Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks

    Communication reliability is a desired property in computer networks. One key technology to increase the reliability of a communication path is to provision a disjoint backup path. One of the main challenges in implementing this technique is that two paths that are disjoint at the IP or overlay layer may...

    Provided By University of California

  • White Papers // Mar 2009

    Do-It-Yourself Database-Driven Web Applications

    UCSD's app2you project and its successor FORWARD project belong to the emerging space of Do-It-Yourself (DIY), custom, hosted, database-driven web application platforms that empower non-programmer business process owners to rapidly and cheaply create and evolve applications customized to their organizations' data and process needs. The hoped-for outcome of DIY platforms...

    Provided By University of California

  • White Papers // Sep 2009

    Affirmative Action Programs And Business Ownership Among Minorities And Women

    Affirmative action programs are commonly used as a means to level the playing field for minority- and women-owned firms in public procurement markets, and therefore may be a positive factor in business entry and survival. To the extent that affirmative action programs also apply to traditional labor markets, however, they...

    Provided By University of California

  • White Papers // Mar 2010

    Data Management Challenges in Cloud Computing Infrastructures

    The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access...

    Provided By University of California

  • White Papers // Mar 2010

    Hedera: Dynamic Flow Scheduling for Data Center Networks

    Today's data centers offer tremendous aggregate bandwidth to clusters of tens of thousands of machines. However, because of limited port densities in even the highest-end switches, data center topologies typically consist of multi-rooted trees with many equal-cost paths between any given pair of hosts. Existing IP multipathing protocols usually rely...

    Provided By University of California