University of California

Displaying 41-80 of 588 results

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Jan 2012

    Distributed Measurement-Aware Routing: Striking a Balance Between Measurement and Traffic Engineering

    Network-wide traffic measurement is important for various network management tasks, ranging from traffic accounting, traffic engineering, and network troubleshooting to security. Existing techniques for traffic measurement tend to be sub-optimal due to poor choice of monitor deployment location or due to constantly evolving monitoring objectives and traffic characteristics. It is...

    Provided By University of California

  • White Papers // Jan 2012

    Efficient Synthesis of Networks on Chip

    The authors propose an efficient heuristic for the Constraint-Driven Communication Synthesis (CDCS) of on-chip communication networks. The complexity of the synthesis problems comes from the number of constraints that have to be considered. In this paper, they propose to cluster constraints to reduce the number that needs to be considered...

    Provided By University of California

  • White Papers // Jan 2012

    Learning and Sharing in a Changing World: Non-Bayesian Restless Bandit With Multiple Players

    The authors consider decentralized restless multi-armed bandit problems with unknown dynamics and multiple players. The reward state of each arm transits according to an unknown Markovian rule when it is played and evolves according to an arbitrary unknown random process when it is passive. Players activating the same arm at...

    Provided By University of California

  • White Papers // Jan 2012

    Pricing and Revenue Sharing Strategies for Internet Service Providers

    One of the challenges facing the networking industry today is to increase the profitability of Internet services. This calls for economic mechanisms that can enable providers to charge more for better services and collect a fair share of the increased revenues. In this paper, the authors present a generic model...

    Provided By University of California

  • White Papers // Jan 2012

    Proactive Resource Provisioning

    Allocating resources in communication networks to QoS flows can require an undesirable delay or cost. As demand churns readjusting wavelength allocation in optical networks, Label Switched Path (LSP) reservations in MPLS networks, QoS connections in two-tier ad hoc networks, and Service Level Agreements (SLAs) between peering autonomous systems are just...

    Provided By University of California

  • White Papers // Jan 2012

    BugFix: A Learning-Based Tool to Assist Developers in Fixing Bugs

    The authors present a tool called BugFix that can assist developers in fixing program bugs. Their tool automatically analyzes the debugging situation at a statement and reports a prioritized list of relevant bug-fix suggestions that are likely to guide the developer to an appropriate fix at that statement. BugFix incorporates...

    Provided By University of California

  • White Papers // Jan 2012

    Identifying the Root Causes of Memory Bugs Using Corrupted Memory Location Suppression

    The authors present a general approach for automatically isolating the root causes of memory-related bugs in software. Their approach is based on the observation that most memory bugs involve uses of corrupted memory locations. By iteratively suppressing (nullifying) the effects of these corrupted memory locations during program execution, their approach...

    Provided By University of California

  • White Papers // Jan 2012

    Power Adaptive Broadcasting With Local Information in Ad Hoc Networks

    Network wide broadcasting is an energy intensive function. In this paper, the authors propose a new method that performs transmission power adaptations based on information available locally, to reduce the overall energy consumed per broadcast. In most of the prior work on energy efficient broadcasting it is assumed that the...

    Provided By University of California

  • White Papers // Jan 2012

    A Methodology for Clustering XML Documents by Structure

    The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations involve, among others, the grouping of structurally similar XML documents. Such grouping results from the application of clustering methods with distances that estimate...

    Provided By University of California

  • White Papers // Jan 2012

    In-Network PCA and Anomaly Detection

    The authors consider the problem of network anomaly detection in large distributed systems. In this setting, Principal Component Analysis (PCA) has been proposed as a method for discovering anomalies by continuously tracking the projection of the data onto a residual subspace. This method was shown to work well empirically in...

    Provided By University of California

  • White Papers // Jan 2012

    Probabilistic Data Management for Pervasive Computing: The Data Furnace Project

    The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key enablers for next-generation pervasive computing applications, including large-scale environmental monitoring and control, context-aware computing, and "Smart digital homes". Sensory readings are inherently unreliable and typically exhibit strong temporal and spatial correlations (within and...

    Provided By University of California

  • White Papers // Jan 2012

    The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols

    The on-demand routing schemes in mobile ad hoc networks are appealing because of the lower routing overhead, compared with traditional proactive schemes. The on-demand routing protocols introduce routing overhead only in the presence of data packets that need routes. However, the control overhead of on-demand routing schemes increases with node...

    Provided By University of California

  • White Papers // Jan 2012

    Effective and Efficient Localization of Multiple Faults Using Value Replacement

    The authors previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement. The technique searches for program statements involving values that can be altered during runtime to cause the incorrect output of a failing run to become...

    Provided By University of California

  • White Papers // Jan 2012

    The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks

    The authors study the effects of physical layer parameters on the connectivity of fading wireless ad-hoc networks. Relying on a symbol error rate connectivity metric for wireless ad-hoc networks, they assume a pair of nodes are connected if their bidirectional measure of connectivity satisfies a given threshold. They investigate the...

    Provided By University of California

  • White Papers // Jan 2012

    A Constrained Resource Allocation Study for LOS MIMO Fading Ad-Hoc Networks

    The authors study constrained resource allocation problems for MIMO wireless ad-hoc networks under LOS fading. By considering the tradeoff between the aggregate consumed power and throughput of such networks, they investigate the performance characteristics of a number of MIMO coding techniques, namely MRC, STBCs, and orthogonal STTCs. Their study shows...

    Provided By University of California

  • White Papers // Jan 2012

    Routing Mechanisms for Mobile Ad Hoc Networks Based on the Energy Drain Rate

    Untethered nodes in mobile ad-hoc networks strongly depend on the efficient use of their batteries. In this paper, the authors propose a new metric, the drain rate, to forecast the lifetime of nodes according to current traffic conditions. This metric is combined with the value of the remaining battery capacity...

    Provided By University of California

  • White Papers // Jan 2012

    AODV Routing Protocol Implementation Design

    Simulation is an important tool in the development of mobile ad hoc networks; it provides an excellent environment to experiment and verify routing protocol correctness. However, simulation does not guarantee that the protocol works in practice, because simulators contain assumptions and simplified models that may not actually reflect real network...

    Provided By University of California

  • White Papers // Jan 2012

    Transparent Influence of Path Selection in Heterogeneous Ad Hoc Networks

    In wireless ad hoc networks, heterogeneity is inherent; each node has different characteristics, resources and policies. Most current ad hoc routing protocols do not consider node heterogeneity when making routing decisions. Although existing ad hoc routing protocols can be extended to consider heterogeneity, these methods require changes to the routing...

    Provided By University of California

  • White Papers // Jan 2012

    AODV Implementation Design and Performance Evaluation

    To date, the majority of ad hoc routing protocol research has been done using simulation only. One of the most motivating reasons to use simulation is the difficulty of creating a real implementation. In a simulator, the code is contained within a single logical object, which is clearly defined and...

    Provided By University of California

  • White Papers // Jan 2012

    Characterizing Quality of Time and Topology in a Time Synchronization Network

    As Internet computing gains speed, complexity, and becomes ubiquitous, the need for precise and accurate time synchronization increases. In this paper, the authors present a characterization of a clock synchronization network managed by Network Time Protocol (NTP), composed by thousands of nodes, including hundreds of Stratum 1 servers, based on...

    Provided By University of California

  • White Papers // Jan 2012

    A Revenue Enhancing Stackelberg Game for Owners in Opportunistic Spectrum Access

    A Stackelberg game between three players; spectrum owner, primary users and secondary users is presented under the Opportunistic Spectrum Access (OSA) model, where the secondary users share the channel with primary users in time and secondary user access is performed through a non-perfect listen-before-send scheme. It is shown through simulations...

    Provided By University of California

  • White Papers // Jan 2012

    Diffusion Filters as a Flexible Architecture for Event Notification in Wireless Sensor Networks

    Wireless sensor networks represent an increasingly important example of distributed event systems. Unlike Internet-based distributed event systems, sensor networks are very bandwidth constrained and use sensor nodes that are often dedicated to the network and controlled by a single organization. Bandwidth constraints require, and administrative homogeneity allows, sensor networks to...

    Provided By University of California

  • White Papers // Jan 2012

    On Wormhole Attacks in Under-Water Sensor Networks: A Two-Tier Localization Approach

    Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper, the authors show that underwater denial-of-service...

    Provided By University of California

  • White Papers // Jan 2012

    Formal Notions of Anonymity for Peer-to-Peer Networks

    Providing anonymity support for Peer-To-Peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address trace-back) may deter a storage source from providing the needed data. In this paper, the authors use this practical application scenario to verify their observation that network-based anonymity can be modeled as a...

    Provided By University of California

  • White Papers // Dec 2011

    Template-Based Program Veri Cation and Program Synthesis

    Program verification is the task of automatically generating proofs for a program's compliance with a given specification. Program synthesis is the task of automatically generating a program that meets a given specification. Both program verification and program synthesis can be viewed as search problems, for proofs and programs, respectively. For...

    Provided By University of California

  • White Papers // Dec 2011

    Alleviate Cellular Congestion Through Opportunistic Through Filling

    The demand for cellular data service has been skyrocketing since the debut of data-intensive smart phones and touch-pads. However, not all data are created equal. Many popular applications on mobile devices, such as email synchronization and social network updates, are delay tolerant. In addition, cellular load varies significantly in both...

    Provided By University of California

  • White Papers // Dec 2011

    Security Primitives and Protocols for Ultra Low Power Sensor Systems

    Security requirements in sensor systems include resiliency against physical and side-channel attacks, low energy for communication, storage, and computation, and the ability to realize a variety of public-key protocols. Furthermore, primitives and protocols that enable trusted remote operation in terms of data, time, and location are essential to guarantee secure...

    Provided By University of California

  • White Papers // Dec 2011

    Detecting Local Events Using Global Sensing

    In order to create low power, low latency and reliable sensing systems, the authors propose a sensing strategy that identifies local events by the means of global measurements. They claim that capturing events globally, although seems against intuition, can save energy by enabling the organization of effective searching queries. To...

    Provided By University of California

  • White Papers // Dec 2011

    Medical Diagnostic-Based Sensor Selection

    Wearable sensing systems have facilitated a variety of applications in Wireless Health. Due to the considerable number of sensors and their constant monitoring these systems are often expensive and power hungry. Traditional approaches to sensor selection in large multi-sensory arrays attempt to alleviate these issues by removing redundant sensors while...

    Provided By University of California

  • White Papers // Dec 2011

    Nanotechnology-Based Trusted Remote Sensing

    The authors present a new nanotechnology PPUF-based architecture for trusted remote sensing. Current public physical unclonable function designs encompass complex circuits requiring high measurement accuracy and whose size slows down the authentication process. Their novel nanotechnology-based architecture ensures fast authentication through partial simulation while maintaining robust security. They authenticate over...

    Provided By University of California

  • White Papers // Dec 2011

    Analysis of Instruction-level Vulnerability to Dynamic Voltage and Temperature Variations

    Variation in performance and power across manufactured parts and their operating conditions is an accepted reality in aggressive CMOS processes. This paper considers challenges and opportunities in identifying this variation and methods to combat it for improved computing systems. The authors introduce the notion of Instruction-Level Vulnerability (ILV) to expose...

    Provided By University of California

  • White Papers // Dec 2011

    Limitations of Scanned Human Copresence Encounters for Modelling Proximity-Borne Malware

    Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. The authors investigate errors introduced by using scanners that detect the presence of devices on the assumption that device co-presence at a scanner corresponds to...

    Provided By University of California

  • White Papers // Dec 2011

    Dynamic Intrusion Detection in Resource-Constrained Cyber Networks

    The objective of Intrusion Detection Systems (IDS) is to locate malicious activities (e.g., denial of service attack, port scans, hackers) in the quickest way such that the infected parts can be timely fixed to minimize the overall damage to the network. With the increasing size, diversity, and interconnectivity of the...

    Provided By University of California

  • White Papers // Nov 2011

    Power Supply Synchronization Without Communication

    The authors consider the synchronization of power supplies in an isolated grid with multiple small-to-medium power sources. They show how to achieve a coordinated or synchronized behavior by imposing suitable dynamical behaviors to the controlled converters that interface each power source with the local power bus, without any explicit exchange...

    Provided By University of California

  • White Papers // Jan 2010

    Poster Abstract: Packet Delivery Performance for On-Body Mica2dot Wireless Sensor Networks

    Wearable computing continues to attract researchers' interests. In particular, the combination of biomedical applications and sensor networks has been in major focus, especially in the field of real-time health care monitoring. Various connection mediums have been proposed for such platforms. This includes wired and wireless communication schemes. The inconvenience of...

    Provided By University of California

  • White Papers // Jan 2010

    Overlay Multicast in Mobile Ad-Hoc Networks Using Araneola

    Araneola, a system for scalable reliable multicast in dynamic wired network environments, exploits the good properties of random regular graphs (high connectivity and diameter that grows logarithmically with network size), to provide reliable, scalable and efficient message dissemination. The authors investigate the suitability of Araneola's probabilistic overlay creation and deterministic...

    Provided By University of California

  • White Papers // Jun 2010

    Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices

    Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to implement multiple technologies into a single radio. This system-on-a-chip architecture leads to competition among networks when devices toggle across different technologies to communicate with multiple networks. In this paper, authors...

    Provided By University of California

  • White Papers // Aug 2009

    Lightweight Jammer Localization in Wireless Networks: System Design and Implementation

    Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal network operations. After detecting the malicious node authors want to find its position,...

    Provided By University of California

  • White Papers // Jan 2010

    Energy-Efficient Adaptive Routing for Ad Hoc Networks With Time-Varying Heterogeneous Traffic

    Authors propose a hybrid networking strategy for large-scale energy constrained ad hoc networks. Referred to as Energy-Aware GEolocation aided Routing (EAGER), this protocol optimally blends proactive and reactive routing strategies for energy efficiency. Specifically, EAGER partitions the network into cells and performs intracell proactive routing and inter-cell reactive routing. The...

    Provided By University of California

  • White Papers // Jun 2010

    A Novel SLA Framework for Time-Differentiated Resilience in Optical Mesh Networks

    Telecom customers may have specific time periods during which they require extra resilience. However, these time-differentiated resilience requirements are not effectively addressed by current SLA frameworks. To satisfy these high priority periods, a generic SLA framework typically provides upgraded protection over the entire service duration, which is unnecessary and expensive....

    Provided By University of California

  • White Papers // Aug 2009

    Routing to Manage Resolution and Waiting Time in Call Centers With Heterogeneous Servers

    In many call centers, agents are trained to handle all arriving calls but exhibit very different performance for the same call type, where performance is defined by the Average call Handling Time (AHT) and the call Resolution Probability (RP). this paper explore strategies for determining which calls should be handled...

    Provided By University of California

  • White Papers // Jan 2010

    End-Host Controlled Multicast Routing

    The last decade has seen a deluge of proposals for supporting multicast in the Internet. These proposals can be categorized as either infrastructure-based, with the multicast functionality provided by specialized network nodes, or host-based, with the multicast functionality provided by the members of the multicast group itself. In this paper,...

    Provided By University of California

  • White Papers // Aug 2009

    Joint Multicast Routing and Network Design Optimization for Networks-on-Chip

    This paper considers the problem of synthesizing custom Networks-on-Chip (NoC) architectures that are optimized for a given application. Both unicast and multicast traffic flows are considered in the input specification. This paper formulate the joint multicast routing and network design problem using a rip-up and reroute procedure, where each multicast...

    Provided By University of California

  • White Papers // Jan 2010

    Saving Portable Computer Battery Power Through Remote Process Execution

    This paper describes a new approach to power saving and battery life extension on an untethered laptop through wireless remote processing of power-costly tasks. The authors ran a series of experiments comparing the power consumption of processes run locally with that of the same processes run remotely. This paper examined...

    Provided By University of California

  • White Papers // Aug 2009

    Automatic Scene Relighting for Video Conferencing

    This paper describes a new method to automatically improve scene lighting for video conferencing by learning the photometric mapping between a lower exposure and desired exposure created using High Dynamic Range (HDR) imaging techniques. Once the mapping is learned in a calibration step, it can be used to transform all...

    Provided By University of California

  • White Papers // Jul 2010

    New Advances in Self-Policing Cloud Computing

    Cloud computing is a style of computing in which dynamically scalable and often virtualized resources e.g., CPU, memory, storage, and network bandwidth are provided as a service over the Internet. This model is considered affordable for cloud users as they avoid the significant financial overheads associated with deploying, maintaining, and...

    Provided By University of California

  • White Papers // Aug 2010

    CEO: A Cloud Epistasis computing Model in GWAS

    The 1000 Genome project has made available a large number of Single Nucleotide Polymorphisms (SNPs) for Genome-Wide Association Studies (GWAS). However, the large number of SNPs has also rendered the discovery of epistatic interactions of SNPs computationally expensive. Parallelizing the computation offers a promising solution. This paper proposes a Cloud-based...

    Provided By University of California

  • White Papers // Mar 2010

    Hedera: Dynamic Flow Scheduling for Data Center Networks

    Today's data centers offer tremendous aggregate bandwidth to clusters of tens of thousands of machines. However, because of limited port densities in even the highest-end switches, data center topologies typically consist of multi-rooted trees with many equal-cost paths between any given pair of hosts. Existing IP multipathing protocols usually rely...

    Provided By University of California

  • White Papers // May 2010

    Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center

    This paper present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI 1. Sharing improves cluster utilization and avoids per-framework data replication. Mesos shares resources in a fine-grained manner, allowing frameworks to achieve data locality by taking turns reading data stored...

    Provided By University of California

  • White Papers // Jan 2010

    Information Collection Services for QoS-aware Mobile Applications

    Efficient resource provisioning that allows for cost-effective enforcement of application QoS relies on accurate system state information. However, maintaining accurate information about available system resources is complex and expensive especially in mobile environments where system conditions are highly dynamic. Resource provisioning mechanisms for such dynamic environments must therefore be able...

    Provided By University of California

  • White Papers // May 2010

    Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing

    Data center cloud computing distinguishes computational services such as database transactions and data storage from computational resources such as server farms and disk arrays. Cloud computing enables a software-as-a-service business model where clients may only pay for the service they really need and providers may fully utilize the resources they...

    Provided By University of California

  • White Papers // Jan 2011

    Host Multicast: A Framework for Delivering Multicast to End Users

    While the advantages of multicast delivery over multiple unicast deliveries is undeniable, the deployment of the IP multicast protocol has been limited to "Islands" of network domains under single administrative control. Deployment of inter-domain multicast delivery has been slow due to both technical and administrative reasons. In this paper the...

    Provided By University of California

  • White Papers // Jan 2011

    Data Mining by Navigation - An Experience with Systems Biology

    This paper proposes a navigational method for mining by collecting evidences from diverse data sources. Since the representation method and even semantics of data elements differ widely from one data source to the other, consolidation of data under a single platform doesn't become cost effective. Instead, this paper has proposed...

    Provided By University of California

  • White Papers // Jan 2011

    Optimal Communication Complexity of Generic Multicast Key Distribution

    The authors prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager are obtained by arbitrarily nested application of a symmetric encryption scheme, with random or pseudorandom keys. The lower bound shows that for any group of size n,...

    Provided By University of California

  • White Papers // Jan 2011

    Soundness of Formal Encryption in the Presence of Active Adversaries

    Cryptographic protocols are a fundamental tool in the design of secure distributed computing systems, but they are also extremely hard to design and validate. The difficulty of designing valid cryptographic protocols stems mostly from the fact that security properties should remain valid even when the protocol is executed in an...

    Provided By University of California

  • White Papers // Jan 2011

    A Secure, Publisher-Centric Web Caching Infrastructure

    The current web caching infrastructure, though it has a number of performance benefits for clients and network providers, does not meet publishers' requirements. The authors argue that to satisfy these requirements, caches should be enhanced in both the data and control planes. In the data plane, caches will dynamically generate...

    Provided By University of California

  • White Papers // Dec 2009

    Immigration, Offshoring And American Jobs

    Increased immigration and offshoring over the last decades has generated deep concerns about the effect of both phenomena on the jobs of American workers. How many "American" jobs are lost due to immigration and offshoring? Or is it possible, instead, that immigration and offshoring, by promoting cost-savings and enhanced efficiency...

    Provided By University of California

  • White Papers // Jun 2010

    Does Tariff Liberalization Kick The Good Apples Out? Theory And Evidence

    This paper examines the liberalization of a common tariff when imported varieties vary in quality and cost. Varieties of higher quality and/or lower costs are imported at lower absolute demand elasticities and also to earn higher revenues. By virtue of larger demand elasticities, low revenue varieties benefit the most from...

    Provided By University of California

  • White Papers // Dec 2010

    A Meta-Notation for Data Visualization

    The authors describe a meta-notation devised to express the major structural characteristics in widely-used data visualizations. The meta-notation consists of unary and binary operators that can be combined to represent a visualization. Capturing structural features of a visualization, the meta-notation can be applied to match or compare two visualizations at...

    Provided By University of California

  • White Papers // Aug 2009

    Integrating Marine Observatories Into a System-of-Systems: Messaging in the US Ocean Observatories Initiative

    The Ocean Observatories Initiative (OOI) will implement ocean sensor networks covering a diversity of oceanic environments, ranging from the coastal to the deep ocean. Construction will begin in Fall 2009, with deployment phased over five years. The integrating feature of the OOI is a comprehensive Cyberinfrastructure (CI), whose design is...

    Provided By University of California

  • White Papers // Oct 2009

    Australasian Accounting Business And Finance Journal

    During the Great Depression, one third of all banks in the United States failed. Scholars dispute reason for their demise. This essay analyzes new evidence on the sources of bank distress. The data demonstrates that contagion via correspondent networks and bank runs propagated the initial banking panics in the fall...

    Provided By University of California

  • White Papers // Mar 2010

    The ProximalWorkspace Architecture: A Latency-Focused Approach to Supporting Context-Aware Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, and applications that represent a new generation of computation-and-data-intensive programs. They are developing a new system architecture based on supporting workspaces which provide nearby computing power to...

    Provided By University of California

  • White Papers // Mar 2010

    Towards a Proximal Resource-Based Architecture to Support Augmented Reality Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, e.g., video glasses, earphones, wrist displays, body sensors, etc., and applications that represent a new generation of computation and-data-intensive programs in areas such as augmented reality. While...

    Provided By University of California

  • White Papers // Mar 2010

    When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

    Random Number Generators (RNGs) are consistently a weak link in the secure use of cryptography. Routine cryptographic operations such as encryption and signing can fail spectacularly given predictable or repeated randomness, even when using good long-lived key material. This has proved problematic in prior settings when RNG implementation bugs, poor...

    Provided By University of California

  • White Papers // Jan 2011

    Secure IP Telephony Using Multi-Layered Protection

    This paper presents the design and analysis of a multilayer protection scheme against Denial-of-Service (DoS) attacks in IP telephony enabled enterprise networks. While there are many types of DoS attacks, the authors focus on flood-based attacks using application layer and transport layer signaling messages in IP telephony. They design sensors...

    Provided By University of California

  • White Papers // Jan 2010

    Fisheye State Routing in Mobile Ad Hoc Networks

    In this paper, the authors present a novel routing protocol for wireless ad hoc networks - Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on...

    Provided By University of California

  • White Papers // Jan 2010

    The Role Of Search Engine Optimization In Search Rankings

    Web sites invest significant resources in trying to influence their visibility among online search results. In addition to paying for sponsored links, they invest in methods known as search engine optimization (SEO). The authors study the economic incentives of Web sites to invest in SEO and its implications on visitor...

    Provided By University of California

  • White Papers // Jan 2011

    The Y-Architecture for On-Chip Interconnect: Analysis and Methodology

    The Y-architecture for on-chip interconnect is based on pervasive use of 0-, 120-, and 240-degree oriented semi-global and global wiring. Its use of three uniform directions exploits on-chip routing resources more efficiently than traditional Manhattan wiring architecture. This paper gives in-depth analysis of deployment issues associated with the Y-architecture. The...

    Provided By University of California

  • White Papers // Oct 2009

    Privacy Concerns in Upcoming Demand-Response Systems

    The collection of power consumption data in current and future demand-response systems creates serious privacy concerns. In a lax regulatory environment, the detailed household consumption data gathered by advanced metering projects is likely to be repurposed by interested parties to reveal personally identifying information, including an individual's activities, preferences, and...

    Provided By University of California

  • White Papers // Jan 2011

    Efficient Replica Maintenance for Distributed Storage Systems

    This paper considers replication strategies for storage systems that aggregate the disks of many nodes spread over the Internet. Maintaining replication in such systems can be prohibitively expensive, since every transient network or host failure could potentially lead to copying a server's worth of data over the Internet to maintain...

    Provided By University of California

  • White Papers // Nov 2009

    Gone Rogue: An Analysis of Rogue Security Software Campaigns

    In the past few years, Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims. A troubling, recent example of this trend is cybercriminals distributing rogue security software, that is malicious programs that, by pretending to be legitimate security tools...

    Provided By University of California

  • White Papers // Nov 2010

    Regular Prices And sales

    The authors study the properties of a profit-maximizing monopolist's optimal price distribution when selling to a loss-averse consumer; where (following K?szegi and Rabin (2006)) they assume that the consumer's reference point is her recent rational expectations about the purchase. If it is close to costless for the consumer to observe...

    Provided By University of California

  • White Papers // Aug 2009

    Global Slack And Domestic Inflation Rates: A Structural Investigation For G-7 Countries

    Recent papers have argued that one implication of globalization is that domestic inflation rates may have now become more a function of "Global", rather than domestic, economic conditions, as postulated by closed-economy Phillips curves. This paper aims to assess the empirical importance of global output in determining domestic inflation rates...

    Provided By University of California

  • White Papers // Sep 2010

    Static Analysis for Detecting Taint-Style Vulnerabilities in Web Applications

    The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error-prone and costly, the need for automated solutions has become evident....

    Provided By University of California