University of California

Displaying 121-160 of 846 results

  • White Papers // May 2011

    The Underground Economy of Fake Antivirus Software

    Fake Anti-Virus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, the authors...

    Provided By University of California

  • White Papers // May 2011

    Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud

    Data analytics are key applications running in the cloud computing environment. To improve performance and cost-effectiveness of a data analytics cluster in the cloud, the data analytics system should account for heterogeneity of the environment and workloads. In addition, it also needs to provide fairness among jobs when multiple jobs...

    Provided By University of California

  • White Papers // May 2011

    Data Management and Layout for Shingled Magnetic Recording

    Ultimately the performance and success of a shingled write disk will be determined by more than the physical hardware realized, but will depend on the data layouts employed, the workloads experienced, and the architecture of the overall system, including the level of interfaces provided by the devices to higher levels...

    Provided By University of California

  • White Papers // May 2011

    Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    Developing reliable security measures against outbreaks of malware will facilitate the proliferation of wireless sensing technologies. The first step toward this goal is to investigate potential attack strategies and the extent of damage they can incur. The malware at each infective node may seek to contact more susceptible nodes by...

    Provided By University of California

  • White Papers // May 2011

    Phishing on Mobile Devices

    The authors assess the risk of phishing on mobile platforms. Mobile operating systems and browsers lack secure application iden-tity indicators, so the user cannot always identify whether a link has taken her to the expected application. They conduct a systematic analysis of ways in which mobile applications and web sites...

    Provided By University of California

  • White Papers // May 2011

    Analyzing the Crossdomain Policies of Flash Applications

    Adobe Flash is a rich Internet application platform. Flash applications are often deployed to the Web; The Flash Player plugin is installed on a large fraction of all Web connected PCs. Flash provides a mechanism by which sites can opt in to more expressive information sharing regimes than the same-origin...

    Provided By University of California

  • White Papers // May 2011

    Fingerprinting Information in JavaScript Implementations

    To date, many attempts have been made to fingerprint users on the web. These fingerprints allow browsing sessions to be linked together and possibly even tied to a user's identity. They can be used constructively by sites to supplement traditional means of user authentication such as passwords; and they can...

    Provided By University of California

  • White Papers // May 2011

    FingerGlass: Efficient Multiscale Interaction on Multitouch Screens

    Many tasks in graphical user interfaces require users to interact with elements at various levels of precision. The authors present FingerGlass, a bimanual technique designed to improve the precision of graphical tasks on multitouch screens. It enables users to quickly navigate to different locations and across multiple scales of a...

    Provided By University of California

  • White Papers // May 2011

    Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks

    Trust plays an important role in protecting the security of mobile ad hoc networks. The node mobility brings challenge to trust propagation, where traditional graph-based propagation methods are difficult to apply. In this paper, the authors propose a trust establishment and propagation scheme by exploiting natural mobility of mobile ad...

    Provided By University of California

  • White Papers // May 2011

    Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks

    Traditionally, the performance of Wireless Mesh Networks (WMNs) is measured by long-term averaged metrics, such as long-term averaged packet delivery ratio or throughput. However, due to the dynamic nature of the wireless networks, long-term averaged metrics cannot reflect the short-term behaviors of the network. In the meanwhile, the users may...

    Provided By University of California

  • White Papers // May 2011

    Dynamic Egocentric Models for Citation Networks

    The analysis of the formation and evolution of networks over time is of fundamental importance to social science, biology, and many other fields. While longitudinal network data sets are increasingly being recorded at the granularity of individual time-stamped events, most studies only focus on collapsed cross-sectional snapshots of the network....

    Provided By University of California

  • White Papers // May 2011

    A Hybrid Cross-Layer Routing Protocol for MANETs

    Wireless link effects impose unique challenges to routing protocols in Mobile Ad Hoc NETworks (MANETs). In this paper, the authors propose Hybrid Cross-Layer Routing (HCLR) protocol designed and implemented based on the premise of being able to leverage a pair of proactive and reactive routing schemes. While the former is...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship BetweenWeb Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship Between Web Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // May 2011

    Formal Modeling Execution Semantic of Control and Data Flow for the Composition Web Services

    Web Services Composition (WSC)-based applications are widely used in the heterogeneous environment, which has inevitably led to the need for reliable mechanisms for the WSC paradigm that can provide sustainable execution semantic. This paper focuses on constructing data flow and control flow for the composition Web services execution. A flexible...

    Provided By University of California

  • White Papers // May 2011

    The Effects Of Monetary Policy "News" And "Surprises"

    There is substantial agreement in the monetary policy literature over the effects of exogenous monetary policy shocks. The shocks that are investigated, however, almost exclusively represent unanticipated changes in policy, which surprise the private sector and which are typically found to have a delayed and sluggish effect on output. In...

    Provided By University of California

  • White Papers // Apr 2011

    In-Situ MapReduce for Log Processing

    Log analytics are a bedrock component of running many of today's Internet sites. Application and click logs form the basis for tracking and analyzing customer behaviors and preferences, and they form the basic inputs to ad-targeting algorithms. Logs are also critical for performance and security monitoring, debugging, and optimizing the...

    Provided By University of California

  • White Papers // Apr 2011

    OppSense: Information Sharing for Mobile Phones in Sensing Field With Data Repositories

    With the popularity and advancements of smart phones, mobile users can interact with the sensing facilities and exchange information with other wireless devices in the environment by short range communications. Opportunistic exchange has recently been suggested in similar contexts; yet the authors show strong evidence that, in their application, opportunistic...

    Provided By University of California

  • White Papers // Apr 2011

    RADBench: A Concurrency Bug Benchmark Suite

    Testing and debugging tools for concurrent programs are often validated on known bugs. To aid the development of these tools, the authors present the Race, Atomicity, and Deadlock Benchmark (RADBench) suite. The RADBench suite contains the full source of 10 real concurrency bugs found in large open-source software projects including...

    Provided By University of California

  • White Papers // Apr 2011

    Malware Analysis With Tree Automata Inference

    The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors seem to share some source code and malware samples often feature similar behaviors, but such commonalities are difficult to detect with signature-based methods because of an increasing use...

    Provided By University of California

  • White Papers // Apr 2011

    A Context-Aware Approach to Wireless Transmission Adaptation

    Recent advancements in wireless transmission have enabled networks with a high level of physical layer flexibility. Unfortunately, these new opportunities are not harnessed by modern wireless systems. Due to inefficient resource allocation, systems typically encounter problems such as spectrum scarcity, energy depletion or low quality of service. In this paper,...

    Provided By University of California

  • White Papers // Apr 2011

    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share...

    Provided By University of California

  • White Papers // Apr 2011

    Datacenter-Scale Network Research on FPGAs

    The authors describe an FPGA-based datacenter network simulator to allow researchers to rapidly experiment with O(10, 000) node datacenter network architectures. They configure the FPGA hardware to implement abstract models of key datacenter building blocks including servers and all levels of switches. They discuss design and implementation issues of their...

    Provided By University of California

  • White Papers // Apr 2011

    Financial Crises, Credit Booms, And External Imbalances: 140 Years Of Lessons

    Do external imbalances increase the risk of financial crises? In this paper, the authors study the experience of 14 developed countries over 140 years (1870{2008). They exploit their long-run dataset in a number of different ways. First, they apply new statistical tools to describe the temporal and spatial patterns of...

    Provided By University of California

  • White Papers // Apr 2011

    Throughput and Collision Analysis of Multi-Channel Multi-Stage Spectrum Sensing Algorithms

    Multi-stage sensing is a novel concept that refers to a general class of spectrum sensing algorithms that divide the sensing process into a number of sequential stages. The number of sensing stages and the sensing technique per stage can be used to optimize performance with respect to secondary user throughput...

    Provided By University of California

  • White Papers // Apr 2011

    Illiquid Financial Markets And Monetary Policy

    This paper analyzes the role of money in markets where financial investment takes place in a decentralized fashion. A key methodological contribution is the development of a dynamic framework that brings together a model for illiquid assets a la Duffie et al. and a monetary framework a la Lagos and...

    Provided By University of California

  • White Papers // Mar 2011

    Implications of Netalyzr's DNS Measurements

    Netalyzr is a widely used network measurement and diagnosis tool. To date, it has collected 198,000 measurement sessions from 146,000 distinct IP addresses. One of the primary focus areas of Netalyzr is DNS behavior, including DNS resolver properties, common name lookups, NXDOMAIN wildcarding, lookup performance, and on-the-wire manipulations. Additional tests...

    Provided By University of California

  • White Papers // Mar 2011

    To Preempt or Not: Tackling Bid and Time-Based Cheating in Online Spectrum Auctions

    Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder manipulation. Aside from rigging their bids, selfish bidders can falsely report their arrival time to game the system and obtain unfair advantage over others. Such time-based cheating...

    Provided By University of California

  • White Papers // Mar 2011

    Scaling Laws for Cooperative Node Localization in Non-Line-of-Sight Wireless Networks

    The authors study the problem of cooperative node localization in Non-Line-Of-Sight (NLOS) wireless networks and address design questions such as, "How many anchors and what fraction of Line-Of-Sight (LOS) measurements are needed achieve a specified target accuracy?". They analytically characterize the performance improvement in localization accuracy as a function of...

    Provided By University of California

  • White Papers // Mar 2011

    A Game Theoretical Approach to Communication Security

    The increased reliance on the Internet has made information and communication systems more vulnerable to security attacks. Many recent incidents demonstrate this vulnerability, such as the rapid propagation of sophisticated malwares, the fast growth of botnets, Denial-of-Service (DoS) attacks against business and government websites, and attacks against the power grid...

    Provided By University of California

  • White Papers // Mar 2011

    A General Class of Throughput Optimal Routing Policies in Multi-Hop Wireless Networks

    This paper considers the problem of throughput optimal routing/scheduling in a multi-hop constrained queueing network with random connectivity whose special case includes opportunistic multi-hop wireless networks and input-queued switch fabrics. The main challenge in the design of throughput optimal routing policies is closely related to identifying appropriate and universal Lyapunov...

    Provided By University of California

  • White Papers // Mar 2011

    Differential Slicing: Identifying Causal Execution Differences for Security Applications

    A security analyst often needs to understand two runs of the same program that exhibit a difference in program state or output. This is important, for example, for vulnerability analysis, as well as for analyzing a malware program that features different behaviors when run in different environments. In this paper,...

    Provided By University of California

  • White Papers // Mar 2011

    Defeating UCI: Building Stealthy and Malicious Hardware

    In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-time testing and flags them as potentially malicious. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2011

    Technology Choices and Pricing Policies in Wireless Networks

    This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses the following questions: Under what circumstances is it feasible for a provider, either benevolent or selfish, to...

    Provided By University of California

  • White Papers // Mar 2011

    Modeling and Analysis of Stochastic Hybrid Systems

    The author describes a model for Stochastic Hybrid Systems (SHSs) where transitions between discrete modes are triggered by stochastic events. The rate at which these transitions occur is allowed to depend both on the continuous and the discrete states of the SHS. Several examples of SHSs arising from a varied...

    Provided By University of California

  • White Papers // Mar 2011

    Addressing Modeling Challenges in Cyber-Physical Systems

    This paper focuses on the challenges of modeling cyber-physical systems that arise from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It uses a portion of an aircraft Vehicle Management Systems (VMS), specifically the fuel management subsystem, to illustrate the challenges, and then discusses technologies that at...

    Provided By University of California

  • White Papers // Mar 2011

    Synthesizing Switching Logic to Minimize Long-Run Cost

    Given a multi-modal dynamical system, optimal switching logic synthesis involves generating the conditions for switching between the system modes such that the resulting hybrid system satisfies a quantitative specification. The authors formalize and solve the problem of optimal switching logic synthesis for quantitative specifications over long run behavior. Each trajectory...

    Provided By University of California

  • White Papers // Mar 2011

    Analysis of Workload Behavior in Scientific and Historical Long-Term Data Repositories

    The scope of archival systems is expanding beyond cheap tertiary storage: scientific and medical data is increasingly digital, and the public has a growing desire to digitally record their personal histories. Driven by the increased cost efficiency of hard drives compared to tape, and the rise of the Internet, content...

    Provided By University of California

  • White Papers // Feb 2011

    Securing Netlist-Level FPGA Design Through Exploiting Process Variation and Degradation

    The continuously widening gap between the Non-Recurring Engineering (NRE) and Recurring Engineering (RE) costs of producing Integrated Circuit (IC) products in the past few decades gives high incentives to unauthorized cloning and reverse-engineering of ICs. Existing IC Digital Rights Management (DRM) schemes often demands high overhead in area, power, and...

    Provided By University of California

  • White Papers // Feb 2011

    Logarithmic Weak Regret of Non-Bayesian Restless Multi-Armed Bandit

    The Restless Multi-Armed Bandit (RMAB) problem is a generalization of the classic Multi-Armed Bandit (MAB) problem. In the classic MAB, there are N independent arms and a single player. At each time, the player chooses one arm to play and receives certain amount of reward. The reward (i.e., the state)...

    Provided By University of California

  • White Papers // Jan 2010

    Poster Abstract: Packet Delivery Performance for On-Body Mica2dot Wireless Sensor Networks

    Wearable computing continues to attract researchers' interests. In particular, the combination of biomedical applications and sensor networks has been in major focus, especially in the field of real-time health care monitoring. Various connection mediums have been proposed for such platforms. This includes wired and wireless communication schemes. The inconvenience of...

    Provided By University of California

  • White Papers // Jan 2010

    The Current State Of The Housing, Mortgage, And Commercial Real Estate Markets: Some Policy Proposals To Deal With The Current Crisis And Reform Proposals To The Real Estate Finance System

    Although there are signs of stability in new housing starts, existing home sales, and house prices, it will be a long, slow recovery of 3-4 years before we return to equilibrium conditions. The embryonic recovery in housing has been highly dependent on massive federal government intervention rather than an organic...

    Provided By University of California

  • White Papers // Jan 2010

    Information Collection Services for QoS-aware Mobile Applications

    Efficient resource provisioning that allows for cost-effective enforcement of application QoS relies on accurate system state information. However, maintaining accurate information about available system resources is complex and expensive especially in mobile environments where system conditions are highly dynamic. Resource provisioning mechanisms for such dynamic environments must therefore be able...

    Provided By University of California

  • White Papers // Sep 2008

    A Systematic Approach to Improve Communication for Emergency Response

    The importance of communication, information sharing and interoperability in an emergency response scenario has risen recently based on the frequency of disasters throughout the world and the wide range of severities and degrees of impacts. This work contributes to the area of emergency response communication qualitatively by presenting a systematic...

    Provided By University of California

  • White Papers // Mar 2009

    An Experimental Study on Wi-Fi Ad-Hoc Mode for Mobile Device-to-Device Video Delivery

    The demand for video content is continuously increasing as video sharing on the Internet is becoming enormously popular recently. This demand, with its high bandwidth requirements, has a considerable impact on the load of the network infrastructure. As more users access videos from their mobile devices, the load on the...

    Provided By University of California

  • White Papers // Jan 2009

    RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks

    This paper deals with the problem of reliable and fast broadcast of mission-critical data with rich content over ad hoc networks. Existing approaches to dissemination reliability often assume network size knowledge, or that receivers know about the dissemination in advance. Without making similar assumptions, the authors propose a distinct approach...

    Provided By University of California

  • White Papers // Oct 2008

    Information Quality Aware Sensor Network Services

    Sensor networks with a number of wirelessly interconnected devices have proven useful for many applications in diverse domains. The challenges of scale and resource constraints posed by this system have led to development of novel network protocols and services, but their focus has been on traditional metrics of quality of...

    Provided By University of California

  • White Papers // Jul 2009

    Did Bankruptcy Reform Contribute To The Mortgage Crisis?

    Before 2005 bankruptcy reform, homeowners in financial distress could use bankruptcy to help save their homes. Homeowners could have their unsecured debts discharged in Chapter 7, thus freeing up funds to make their mortgage payments. Homeowners who were in default on their mortgages could stop foreclosure by filing under Chapter...

    Provided By University of California

  • White Papers // Jun 2009

    Underwriting, Mortgage Lending, And House Prices:

    Lowering of underwriting standards may have contributed much to the unprecedented recent rise and subsequent fall of mortgage volumes and house prices. Conventional data don't satisfactorily measure aggregate underwriting standards over the past decade: The easing and then tightening of underwriting, inside and especially outside of banks, was likely much...

    Provided By University of California

  • White Papers // Jan 2010

    Fisheye State Routing in Mobile Ad Hoc Networks

    In this paper, the authors present a novel routing protocol for wireless ad hoc networks - Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on...

    Provided By University of California

  • White Papers // Jan 2010

    What's New About Cloud Computing Security?

    While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. This paper strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. The paper examines contemporary and historical perspectives from industry, academia, government, and "Black...

    Provided By University of California

  • White Papers // Feb 2010

    Rain: A Workload Generation Toolkit for Cloud Computing Applications

    Existing workload generation tools are not flexible enough to generate workloads that vary in three key dimensions relevant for making resource allocation decisions for Cloud Computing applications - variations in the amount of load, variations in the mix of operations performed by clients (e.g. changes in reads vs. writes or...

    Provided By University of California

  • White Papers // Mar 2010

    Financial Analysis Using SAS PROCS

    Financial services industry is interested in analyzing vast financial data including price trends from stock exchanges around the world. SAS analytical and graphical tools are extremely useful to enable statistical analysis of various financial data including stock price information. Time Series statistical method is a valuable approach for analysis of...

    Provided By University of California

  • White Papers // Apr 2010

    Using "Recycled Predictions" for Computing Marginal Effects

    A conventional way to estimate the marginal effect of a risk factor is to omit the risk factor (e.g., gender, treatment) from the multivariate model and then use the omitted risk factor as class/group variable to compare observed and predicted outcomes. This can have an undesirable impact on the model...

    Provided By University of California

  • Case Studies // Jan 2010

    Code-Red: A Case Study on the Spread and Victims of an Internet Worm

    On July 18, 2001, Code-Red (CRv2) worm took less than 14 hours to infect more than 359,000 internet connected computers, resulting in damage worth more than $2.6 billion. The case study tries to study the causes, impact and the safeguards against such attacks. Under this paper, a step by step...

    Provided By University of California

  • White Papers // Oct 2009

    Applying NOX to the Datacenter

    It is evident today that internet datacenters have brought about a revolution in computing power and have attained supremacy in handling data-intensive computational tasks. Being the challenging field that it is, a number of studies and new network designs are being explored and deployed by researchers to find out if...

    Provided By University of California

  • White Papers // May 2009

    Towards Low Latency State Machine Replication for Uncivil Wide-area Networks

    This paper is intended to study the design principle of a low-latency Byzantine state machine protocol, called RAM, for this system model. The aim of this report is to reflect on the difficulty of building state machines in a multi-site setting, which lacks trusts between two sites, but not within...

    Provided By University of California

  • White Papers // Jan 2009

    FiConn: Using Backup Port for Server Interconnection in Data Centers

    Though it is known that the aim of data centres is to connect multitude servers at low cost, high network capacity having numerous online applications; the present tree-base solution is unable to meet the requirements. This paper studies the problem of building a scalable, low-cost network infrastructure for data centers,...

    Provided By University of California

  • White Papers // Jul 2009

    Data Center Switch Architecture in the Age of Merchant Silicon

    For massively parallel workloads, the principal bottleneck is often not the performance of individual nodes but the rate at which these nodes can exchange data over the network. Many Data Center Network (DCN) applications demonstrate little communication locality, meaning that the communication substrate must support high aggregate bisection bandwidth for...

    Provided By University of California

  • White Papers // Oct 2009

    AppScale: Scalable and Open AppEngine Application Development and Deployment

    Cloud Computing refers to the service-oriented cluster computing based on Service-Level Agreements (SLAs). Through cloud computing, the use of large-scale distributed systems is made simple through transparent and adaptive resource management. It also makes configuration and deployment of an entire software stack both simple and automatic. This technology also makes...

    Provided By University of California

  • White Papers // Oct 2008

    Difference Engine: Harnessing Memory Redundancy in Virtual Machines

    Virtual Machine monitors (VMMs) are a popular platform for Internet hosting centers and cloud-based compute services. By multiplexing hardware resources among virtual machines (VMs) running commodity operating systems, VMMs decrease both the capital outlay and management overhead of hosting centers. Appropriate placement and migration policies can take advantage of statistical...

    Provided By University of California

  • White Papers // May 2009

    Maximizing Efficiency by Trading Storage for Computation

    Traditionally, computing has meant calculating results and then storing those results for later use. Unfortunately, committing large volumes of rarely used data to storage wastes space and energy, making it a very expensive strategy. Cloud computing, with its readily available and flexibly allocatable computing resources, suggests an alternative: storing the...

    Provided By University of California

  • White Papers // Jul 2008

    Interactive Volume Rendering Systems for Large Scale Multiple Volumes With Multiple Channels

    Volume rendering is a very important visualization tool in many scientific disciplines. Scientists at the National Center for Microscopy and Imaging Research (NCMIR) use high resolution electron and confocal light microscopes to scan biological samples at greatly varying levels of scale (Centimeters to micrometers), producing large three-dimensional data sets with...

    Provided By University of California

  • White Papers // Jan 2009

    A New Network Architecture for Future Optical Networks: Coarse Optical Circuit Switching by Default, Rerouting Over Circuits for Adaptation

    As Internet traffic continues to grow unabated at an exponential rate, it is unclear whether or not the existing packet routing network architecture based on electronic routers will continue to scale at the necessary pace. On the other hand, optical fiber and switching elements have demonstrated an abundance of capacity...

    Provided By University of California

  • White Papers // Feb 2009

    Hiding Communication Latency With Non-SPMD, Graph-Based Execution

    Reformulating an algorithm to mask communication delays is crucial in maintaining scalability, but traditional solutions embed the overlap strategy into the application. The authors present an alternative approach based on data flow, which factors the overlap strategy out of the application. Using this approach they are able to reduce communication...

    Provided By University of California

  • White Papers // Aug 2009

    Implementation and Evaluation of a Mobile PlanetLab Node

    With the introduction of cellular phones, mobile wireless communication has become an integral part of day-to-day life in this century. A testbed is crucial in continuing cutting-edge wireless technology research and development since physical and MAC layers in mobile wireless communication have many parameters pertinent to performance that are often...

    Provided By University of California

  • White Papers // Aug 2010

    Inter-Socket Victim Cacheing for Platform Power Reduction

    On a multi-socket architecture with load below peak, as is often the case in a server installation, it is common to consolidate load onto fewer sockets to save processor power. However, this can increase main memory power consumption due to the decreased total cache space. This paper describes inter-socket victim...

    Provided By University of California

  • White Papers // May 2008

    Chameleon: A Framework for Observing, Understanding, and Imitating the Memory Behavior of Applications

    In this work, the authors present an integrated solution to three classic problems in the field of performance analysis: memory modeling, synthetic address trace generation, and the creation of synthetic benchmark proxies for applications. First, they describe an intuitive characterization of memory access locality that can accurately predict an application's...

    Provided By University of California

  • White Papers // Jun 2010

    Accelerating Viola-Jones Face Detection to FPGA-Level Using GPUs

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. The authors present a multi-GPU implementation of the Viola-Jones face detection algorithm that meets the performance of the fastest known FPGA implementation. The GPU design offers far lower development costs, but the FPGA implementation consumes less...

    Provided By University of California

  • White Papers // Jan 2011

    A Bayesian Network Framework for Reject Inference

    Most learning methods assume that the training set is drawn randomly from the population to which the learned model is to be applied. However in many applications this assumption is invalid. For example, lending institutions create models of who is likely to repay a loan from training sets consisting of...

    Provided By University of California

  • White Papers // May 2008

    Enhancing Multi-Hop Wireless Mesh Networks With a Ring Overlay

    Wireless Mesh Network (WMN) has become popular access network architecture. But because of its multi-hop nature, co-channel interference and contention, the attainable capacity of a wireless node in a WMN is significantly less than the radio capacity. The authors propose a overlay architecture for a WMN, where a wireless-ring (WRing)...

    Provided By University of California

  • White Papers // Sep 2008

    EPEW: An Extended Prototyping Environment for Wireless Mesh Networks

    This paper introduces EPEW, an environment for rapid prototyping of communication protocols over IEEE 802.11 mesh networks. EPEW provides a software environment that makes prototyping as quick, easy, and effortless as possible, which allows researchers to conduct both functional assessment and performance evaluation as an integral part of the protocol...

    Provided By University of California

  • White Papers // Sep 2008

    Institute For Research On Labor And Employment: Quality Management And Job Quality: How The ISO 9001 Standard Forquality Management Systems Affects Employees And Employers

    This is the first large-scale paper to examine its effects on employee outcomes such as employment, earnings, and health and safety. The author analyzed a matched sample of nearly 1,000 companies in California. ISO 9001 adopters subsequently had far lower organizational death rates than a matched control group of non-adopters....

    Provided By University of California

  • White Papers // Sep 2010

    Streaming Satellite Data to Cloud Workflows for On-Demand Computing of Environmental Products

    Environmental data arriving constantly from satellites and weather stations are used to compute weather coefficients that are essential for agriculture and viticulture. For example, the reference evapotranspiration (ET0) coefficient, overlaid on regional maps, is provided each day by the California Department of Water Resources to local farmers and turf managers...

    Provided By University of California

  • White Papers // Oct 2009

    Australasian Accounting Business And Finance Journal

    During the Great Depression, one third of all banks in the United States failed. Scholars dispute reason for their demise. This essay analyzes new evidence on the sources of bank distress. The data demonstrates that contagion via correspondent networks and bank runs propagated the initial banking panics in the fall...

    Provided By University of California

  • White Papers // Jan 2010

    The Role Of Search Engine Optimization In Search Rankings

    Web sites invest significant resources in trying to influence their visibility among online search results. In addition to paying for sponsored links, they invest in methods known as search engine optimization (SEO). The authors study the economic incentives of Web sites to invest in SEO and its implications on visitor...

    Provided By University of California

  • White Papers // Mar 2010

    The ProximalWorkspace Architecture: A Latency-Focused Approach to Supporting Context-Aware Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, and applications that represent a new generation of computation-and-data-intensive programs. They are developing a new system architecture based on supporting workspaces which provide nearby computing power to...

    Provided By University of California

  • White Papers // Mar 2010

    Towards a Proximal Resource-Based Architecture to Support Augmented Reality Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, e.g., video glasses, earphones, wrist displays, body sensors, etc., and applications that represent a new generation of computation and-data-intensive programs in areas such as augmented reality. While...

    Provided By University of California

  • White Papers // May 2009

    Scalable Virtual Machine Multiplexing

    A Virtual Machine (VM) is a software abstraction of a real, physical machine. Virtualization has been around for almost 50 years, beginning with IBM's pioneering work in the 1960s. However, recent years have seen a significant surge in the interest and use of virtualization, driven by better hardware support, increasing...

    Provided By University of California

  • White Papers // Mar 2010

    When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

    Random Number Generators (RNGs) are consistently a weak link in the secure use of cryptography. Routine cryptographic operations such as encryption and signing can fail spectacularly given predictable or repeated randomness, even when using good long-lived key material. This has proved problematic in prior settings when RNG implementation bugs, poor...

    Provided By University of California