University of California

Displaying 241-280 of 743 results

  • White Papers // Jan 2011

    An Ad Hoc Network With Mobile Backbones

    A Mobile Ad Hoc NETwork (MANET) is usually assumed to be homogeneous, where each mobile node shares the same radio capacity. However, a homogeneous ad hoc network suffers from poor scalability. Recent research has demonstrated its performance bottleneck both theoretically and through simulation experiments and testbed measurement. Building a physically...

    Provided By University of California

  • White Papers // Jan 2011

    Mobility Prediction and Routing in Ad Hoc Wireless Networks

    Wireless networks allow a more flexible model of communication than traditional networks since the user is not limited to a fixed physical location. Unlike cellular wireless networks, an ad hoc wireless network does not have any fixed communication infrastructure. For an active connection, the end host as well as the...

    Provided By University of California

  • White Papers // Jan 2011

    ChunkCast: An Anycast Service for Large Content Distribution

    Fast and efficient large content distribution is a challenge in the Internet due to its high traffic volume. In this paper, the authors propose ChunkCast, an anycast service that optimizes large content distribution. The authors present a distributed localityaware directory that supports an efficient query for large content. The system...

    Provided By University of California

  • White Papers // Dec 2010

    Variable-Length Coding With Noiseless Feedback and Finite Messages

    This paper considers the problem of zero-rate (fixed number of messages) variable-length coding over a memoryless noisy channel with noiseless feedback. This problem is considered from a control theoretic point of view and is modeled as a special case of active sequential hypothesis testing. Techniques from dynamic programming are applied...

    Provided By University of California

  • White Papers // Dec 2010

    Solution Processed Silver Sulfide Thin Films for Filament Memory Applications

    Filament Memories based on resistive switching have been attracting attention in recent years as a potential replacement for flash memory in CMOS technology and as a potential candidate memory for low-cost, large-area electronics. These memories operate at low voltages with fast switching speeds. These devices are based on ionic conduction...

    Provided By University of California

  • White Papers // Dec 2010

    Optimizing Irregular Data Accesses for Cluster and Multi-Core Architectures

    Applications with irregular accesses to shared state are one of the most challenging computational patterns in parallel computing. Accesses can involve both read or write operations, with writes having the additional complexity of requiring some form of synchronization. Irregular accesses perform poorly in local cached-based memory systems and across networks...

    Provided By University of California

  • White Papers // Dec 2010

    Robust Communication in Vehicular Ad Hoc Networks

    The development of intelligent transportation systems is one of the most important strategies for making roads safer and more efficient. The key technology underpinning all such systems, from cooperative safety systems to electronic tolling, is wireless communications. Vehicles must be able to communicate with each other, and with fixed infrastructure,...

    Provided By University of California

  • White Papers // Dec 2010

    The SCADS Director: Scaling a Distributed Storage System Under Stringent Performance Requirements

    Elasticity of cloud computing environments provides an economic incentive for automatic resource allocation of stateful systems running in the cloud. However, these systems have to meet strict performance Service-Level Objectives (SLOs) expressed using upper percentiles of request latency, such as the 99th. Such latency measurements are very noisy, which complicates...

    Provided By University of California

  • White Papers // Dec 2010

    A Meta-Notation for Data Visualization

    The authors describe a meta-notation devised to express the major structural characteristics in widely-used data visualizations. The meta-notation consists of unary and binary operators that can be combined to represent a visualization. Capturing structural features of a visualization, the meta-notation can be applied to match or compare two visualizations at...

    Provided By University of California

  • White Papers // Dec 2010

    Nonadaptive Mastermind Algorithms for String and Vector Databases, With Case Studies

    In this paper, the authors study sparsity-exploiting Mastermind algorithms for attacking the privacy of an entire database of character strings or vectors, such as DNA strings, movie ratings, or social network friendship data. Based on reductions to non-adaptive group testing, the methods are able to take advantage of minimal amounts...

    Provided By University of California

  • White Papers // Dec 2010

    SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

    Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secrets or keys authenticated with the aid of out-of-band channels. While manually installing secret keys affects the practicability of the key...

    Provided By University of California

  • White Papers // Dec 2010

    Variability-Aware Duty Cycle Scheduling in Long Running Embedded Sensing Systems

    Instance and temperature-dependent leakage power variability is already a significant issue in contemporary embedded processors, and one which is expected to increase in importance with scaling of semiconductor technology. The authors measure and characterize this leakage power variability in current microprocessors, and show that variability aware duty cycle scheduling produces...

    Provided By University of California

  • White Papers // Dec 2010

    Diesel: Applying Privilege Separation to Database Access

    Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege separation, the authors argue that database data should be subject to limitations such...

    Provided By University of California

  • White Papers // Dec 2010

    GeoServ: A Distributed Urban Sensing Platform

    Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a new network paradigm of sensor information sharing in urban environments. The key enablers are the smartphones (e.g., iPhones and Android phones) equipped with onboard sensors (e.g.,...

    Provided By University of California

  • White Papers // Dec 2010

    Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. The authors propose Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California

  • White Papers // Dec 2010

    Path-Based Inductive Synthesis for Program Inversion

    In this paper, the authors investigate the problem of semi-automated inversion of imperative programs, which has the potential to make it much easier and less error prone to write programs that naturally pair as inverses, such as insert/delete operations, compressors/ decompressors, and so on. Viewing inversion as a sub-problem of...

    Provided By University of California

  • White Papers // Dec 2010

    Accelerating Dynamic Time Warping Subsequence Search With GPUs and FPGAs

    Many time series data mining problems require subsequence similarity search as a subroutine. Dozens of similarity/distance measures have been proposed in the last decade and there is increasing evidence that Dynamic Time Warping (DTW) is the best measure across a wide range of domains. Given DTW's usefulness and ubiquity, there...

    Provided By University of California

  • White Papers // Dec 2010

    Trade Booms, Trade Busts And Trade Costs

    What has driven trade booms and trade busts in the past and present? The authors derive a micro-founded measure of trade frictions from leading trade theories and use it to gauge the importance of bilateral trade costs in determining international trade flows. The authors construct a new balanced sample of...

    Provided By University of California

  • White Papers // Nov 2010

    Should Users Be Entitled to Run the Applications of Their Choice on Wireless Networks?

    The authors examine whether wireless ISPs should be able to legally limit the applications used on wireless devices. The analysis is based on wireless network architecture and communications law. They review how wired and wireless networks differ in traffic management, and conclude that wireless networks require stronger traffic management than...

    Provided By University of California

  • White Papers // Nov 2010

    Toward Automated Detection of Logic Vulnerabilities in Web Applications

    Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, there has also been an increase in the number and complexity of vulnerabilities. Current techniques to identify security problems in web applications...

    Provided By University of California

  • White Papers // Nov 2010

    Distributed High Accuracy Peer-to-Peer Localization in Mobile Multipath Environments

    In this paper the authors consider the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer to peer framework where the vehicles/nodes can get pairwise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor...

    Provided By University of California

  • White Papers // Nov 2010

    Correlated Resource Models of Internet End Hosts

    Understanding and modelling resources of Internet end hosts is essential for the design of desktop software and Internet-distributed applications. In this paper the authors develop a correlated resource model of Internet end hosts based on real trace data taken from the SETI@home project. This data covers a 5-year period with...

    Provided By University of California

  • White Papers // Nov 2010

    Online Ciphers From Tweakable Blockciphers

    Informally, a cryptographic transform is said to be online if it can be computed by an algorithm that reads in the (unknown number of) input bits - in order, one at a time - as it writes out the corresponding output bits - again in order, one at a time...

    Provided By University of California

  • White Papers // Nov 2010

    Regular Prices And sales

    The authors study the properties of a profit-maximizing monopolist's optimal price distribution when selling to a loss-averse consumer; where (following K?szegi and Rabin (2006)) they assume that the consumer's reference point is her recent rational expectations about the purchase. If it is close to costless for the consumer to observe...

    Provided By University of California

  • White Papers // Nov 2010

    On the Capacity of Non-Coherent Network Coding

    The authors consider the problem of multicasting information from a source to a set of receivers over a network where intermediate network nodes perform randomized network coding operations on the source packets. They propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang, that captures the...

    Provided By University of California

  • White Papers // Nov 2010

    Semantic Data Placement for Power Management in Archival Storage

    Power is the greatest lifetime cost in an archival system, and, as decreasing costs make disks more attractive than tapes, spinning disks account for the majority of power drawn. To reduce this cost, the authors propose reducing the number of times disks have to spin up by grouping together files...

    Provided By University of California

  • White Papers // Nov 2010

    The Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited

    The authors consider the cryptographic problem of constructing an invertible random permutation from a public random function (i.e., which can be accessed by the adversary). This goal is formalized by the notion of indifferentiability of Maurer et al. (TCC 2004). This is the natural extension to the public setting of...

    Provided By University of California

  • White Papers // Nov 2010

    Password-Protected Secret Sharing

    A user of computing technology, let's call her Alice, needs to store her valuable and private data, including texts, images, passwords, or cryptographic keys, on her personal device. Alice's device, however, can fall prey to viruses, spyware, Trojan horses, and other type of malware, exposing Alice's data and breaching her...

    Provided By University of California

  • White Papers // Nov 2010

    Global Seismic Monitoring as Probabilistic Inference

    The International Monitoring System (IMS) is a global network of sensors whose purpose is to identify potential violations of the Comprehensive Nuclear-Test-Ban Treaty (CTBT), primarily through detection and localization of seismic events. The authors report on the first stage of a project to improve on the current automated software system...

    Provided By University of California

  • White Papers // Oct 2010

    Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks

    In this paper the authors present a new routing paradigm that generalizes opportunistic routing for wireless multihop networks. In multirate any path routing, each node uses both a set of next hops and a selected transmission rate to reach a destination. Using this rate, a packet is broadcast to the...

    Provided By University of California

  • White Papers // Oct 2010

    User Evaluation of Correctness Conditions: A Case Study of Cooperability

    In order to find and fix concurrency bugs, programmers must reason about different possible thread inter-leavings - context switches may occur at any program point, all with the potential for thread interference. To reduce the number of thread interference points to consider, the correctness criterion of co-operability ensures that code...

    Provided By University of California

  • White Papers // Oct 2010

    A Tool-Based Approach to Teaching Parallel and Concurrent Programming

    Today, multicore computers are commonplace and university curricula are lagging behind. The authors need to work concurrency and parallelism into introductory courses, while also maintaining upper-level specialized courses on the topic. Since teachers may themselves require education on the topic, they feel that it is important to make course materials...

    Provided By University of California

  • White Papers // Oct 2010

    Fractional Repetition Codes for Repair in Distributed Storage Systems

    The authors introduce a new class of exact Minimum-Bandwidth Regenerating (MBR) codes for distributed storage systems, characterized by a low-complexity uncoded repair process that can tolerate multiple node failures. These codes consist of the concatenation of two components: An outer MDS code followed by an inner repetition code. They refer...

    Provided By University of California

  • White Papers // Oct 2010

    Communication-Avoiding QR Decomposition for GPU's

    The authors describe an implementation of the Communication-Avoiding QR (CAQR) factorization that runs entirely on a single graphics processor (GPU). They show that the reduction in memory traffic provided by CAQR allows one to outperform existing parallel GPU implementations of QR for a large class of tall-skinny matrices. Other GPU...

    Provided By University of California

  • White Papers // Oct 2010

    Deterministic and Energy-Optimal Wireless Synchronization

    The authors consider the problem of clock synchronization in a wireless setting where processors must power-down their radios in order to save energy. In this setting, each processor has a radio device that is either on or off. When the radio device of a processor is on, it is able...

    Provided By University of California

  • White Papers // Oct 2010

    The Earlier the Better: A Theory of Timed Actor Interfaces

    Programming embedded and cyber-physical systems requires attention not only to functional behavior and correctness, but also to non-functional aspects and specifically timing and performance constraints. A structured, compositional, model-based approach based on stepwise refinement and abstraction techniques can support the development process, increase its quality and reduce development time through...

    Provided By University of California

  • White Papers // Sep 2010

    Line and Lattice Networks Under Deterministic Interference Models

    Capacity bounds are compared for four different deterministic models of wireless networks, representing four different ways of handling broadcast and superposition in the physical layer. In particular, the transport capacity under a multiple unicast traffic pattern is studied for a one-dimensional network of regularly spaced nodes on a line and...

    Provided By University of California

  • White Papers // Sep 2010

    The Case for Using Traffic Forecasting in Schedule-Based Channel Access

    In this paper, the authors explore the idea of using traffic forecasting to improve the delay performance of a schedule-based medium access control protocol. Schedule-based channel access has been shown to utilize network and energy resources efficiently but is often hindered by the extra delay that scheduling introduces. They explore...

    Provided By University of California

  • White Papers // Sep 2010

    Static Analysis for Detecting Taint-Style Vulnerabilities in Web Applications

    The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error-prone and costly, the need for automated solutions has become evident....

    Provided By University of California

  • White Papers // Sep 2010

    A System for Managing Physical Data in Buildings

    In order to reduce building energy consumption, the authors need a global, accurate view of the building. Many modern buildings have a sensing infrastructure that can be used to do fine-grained accounting and understand the complex interactions between systems and spaces. However, through the experience with an active, campus-wide Building...

    Provided By University of California

  • White Papers // Apr 2011

    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share...

    Provided By University of California

  • White Papers // Nov 2010

    Password-Protected Secret Sharing

    A user of computing technology, let's call her Alice, needs to store her valuable and private data, including texts, images, passwords, or cryptographic keys, on her personal device. Alice's device, however, can fall prey to viruses, spyware, Trojan horses, and other type of malware, exposing Alice's data and breaching her...

    Provided By University of California

  • White Papers // May 2009

    Structural Solutions for Cross-Layer Optimization of Wireless Multimedia Transmission

    In this paper, the authors propose a systematic solution to the problem of cross-layer optimization for delay-sensitive media transmission over time-varying wireless channels as well as investigate the structures and properties of this solution, such that it can be easily implemented in various multimedia systems and applications. Specifically, they formulate...

    Provided By University of California

  • White Papers // Sep 2009

    Algorithm Differentiation in Lisp: ADIL

    Algorithm differentiation is a technique used to take a program F computing a numerical function of one argument F(x) and transform it into another program G that returns a pair, hF0(x), F(x)i where by F0(x) the authors mean the derivative of F with respect to its argument, evaluated at x....

    Provided By University of California

  • White Papers // May 2010

    Designing Modular Hardware Accelerators in C With ROCCC 2.0

    While FPGA-based hardware accelerators have repeatedly been demonstrated as a viable option, their programmability remains a major barrier to their wider acceptance by application code developers. These platforms are typically programmed in a low level hardware description language, a skill not common among application developers and a process that is...

    Provided By University of California

  • White Papers // Dec 2010

    Accelerating Dynamic Time Warping Subsequence Search With GPUs and FPGAs

    Many time series data mining problems require subsequence similarity search as a subroutine. Dozens of similarity/distance measures have been proposed in the last decade and there is increasing evidence that Dynamic Time Warping (DTW) is the best measure across a wide range of domains. Given DTW's usefulness and ubiquity, there...

    Provided By University of California

  • White Papers // Jan 2009

    Medium Access Control Protocols With Memory

    Many existing Medium Access Control (MAC) protocols utilize past information (e.g., the results of transmission attempts) to adjust the transmission parameters of users. This paper provides a general framework to express and evaluate distributed MAC protocols utilizing a finite length of memory for a given form of feedback information. The...

    Provided By University of California

  • White Papers // Jun 2009

    Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations

    This paper studies pipelined algorithms for protecting distributed grid computations from cheating participants, who wish to be rewarded for tasks they receive but don't perform. The authors present improved cheater detection algorithms that utilize natural delays that exist in long-term grid computations. In particular, they partition the sequence of grid...

    Provided By University of California

  • White Papers // Jun 2009

    A Measurement Driven, 802.11 Anti-Jamming System

    Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, the authors first conduct extensive experiments on an indoor 802.11 network to assess the ability of...

    Provided By University of California

  • White Papers // Sep 2010

    Identifying BGP Routing Table Transfers

    BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to the understanding of the global routing system. However the collected BGP data contains both the updates generated by actual route changes, and the updates of BGP routing table transfers resulted from BGP...

    Provided By University of California

  • White Papers // Jun 2009

    Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations

    Security protocols often use randomization to achieve probabilistic non-determinism. This non-determinism, in turn, is used in obfuscating the dependence of observable values on secret data. Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature. Randomized security protocols have also...

    Provided By University of California

  • White Papers // Sep 2009

    Distributed Random Access Algorithm: Scheduling and Congesion Control

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict...

    Provided By University of California

  • White Papers // Jul 2009

    Incorporating Integrity Constraints in Uncertain Databases

    The authors develop an approach to incorporate additional knowledge, in the form of general-purpose Integrity Constraints (ICs), to reduce uncertainty in probabilistic databases. While incorporating ICs improves data quality (and hence quality of answers to a query), it significantly complicates query processing. To overcome the additional complexity, they develop an...

    Provided By University of California

  • White Papers // Jan 2011

    The Case for Efficient File Access Pattern Modeling

    Most modern I/O systems treat each file access independently. However, events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and are by no means independent. The result is that modern I/O systems ignore useful information. Using traces of file system activity the...

    Provided By University of California

  • White Papers // Apr 2009

    Facilitating Controlled Tests of Website Design Changes: A Systematic Approach

    Controlled online experiments in which envisaged changes to a web site are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort. This paper...

    Provided By University of California

  • White Papers // Apr 2009

    Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences

    To understand how collaborators reconcile the often conflicting needs of awareness and privacy, the authors studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. They present a theoretical framework describing privacy management practices and their determinants that emerged from field...

    Provided By University of California

  • White Papers // May 2009

    Ad as You Go: A Study of Ad Placement on Personal Navigation Devices

    Mobile advertising (M-advertising) is an emergent trend in the marketing world. "M-advertising enables not only the sending of unique, personalized, and customized adverts, but also the ability to engage consumers in interactions with the sender of the message." Cell phones, PDAs, and other mobile devices have been tapped to exercise...

    Provided By University of California

  • White Papers // Apr 2009

    Authentication Without Elision

    Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In addition, real-world schemes often include parameter negotiations, authenticate associated data, and support a multiplicity of options. The cryptographic community has routinely elided such matters from the authors' definitions,...

    Provided By University of California

  • White Papers // Apr 2009

    A Secure Cryptographic Token Interface

    Cryptographic keys must be protected from exposure. In real-world applications, they are often guarded by cryptographic tokens that employ sophisticated hardware-security measures. Several logical attacks on the key management operations of cryptographic tokens have been reported in the past, which allowed exposing keys merely by exploiting the token API in...

    Provided By University of California

  • White Papers // Feb 2010

    Structural Change And Growth In India

    This paper examines the link between structural change and growth in India. It constructs indices of structural change, and performs a time series analysis of the data. It finds that 1988 marks a break in the time series of growth and structural change. There is one-way causality from structural change...

    Provided By University of California

  • White Papers // Nov 2008

    Understanding West German Economic Growth In The 1950s

    The authors evaluate explanations for why Germany grew so quickly in the 1950s. The recent literature has emphasized convergence, structural change and institutional shake-up while minimizing the importance of the postwar shock. They show that this shock and its consequences were more important than neoclassical convergence and structural change in...

    Provided By University of California

  • White Papers // Jun 2011

    Vintage Capital Growth Theory: Three Breakthroughs

    Vintage capital growth models have been at the heart of growth theory in the 60s. This research line collapsed in the late 60s with the so-called embodiment controversy and the technical sophistication of the vintage models. This paper analyzes the astonishing revival of this literature in the 90s. In particular,...

    Provided By University of California

  • White Papers // Jun 2010

    Multinational Firms And Trade: Gravity Versus Market Power In A Ricardian World

    Are multinational firms good for consumer welfare? The authors build a model of foreign direct investment and trade that exploits both firm heterogeneity and strategic pricing behavior, embodying direct exporting and multinational production for both export and local sale in one framework. They show that improved efficiency in target firms...

    Provided By University of California

  • White Papers // Nov 2009

    Kicking The Bad Apples Out: Tariff Liberalization And Bilateral Trade

    In this paper, the author presents a simple model in which liberalization of a Most-Favored Nation (MFN) tariff need not increase bilateral imports from all MFN sources. While liberalization must increase imports from high price MFN sources, it may decrease imports from low price MFN sources. This has stark implications...

    Provided By University of California

  • White Papers // Jan 2010

    Business Travel As An Input To International Trade

    The importance of business and social networks in generating trade is becoming increasingly recognized in the international economics literature. An important way in which people build and maintain networks is through face-to-face meetings. The author proposes an empirical model in which business travel helps to overcome informational asymmetries in international...

    Provided By University of California

  • White Papers // Jul 2010

    Knowledge Transfers From Multinational To Domestic Firms: Evidence From Worker Mobility

    Labor turnover is a commonly-cited mechanism for the transmission of technology from multinational to domestic firms, but until now there has been little direct evidence for this mechanism. Using a novel matched establishment-worker database from Brazil, the author presents evidence consistent with the existence of positive multinational wage spillovers through...

    Provided By University of California

  • White Papers // Sep 2009

    Foreign Direct Investment In Cross-Border Infrastructure

    In this paper, the authors critically review the relevant information and literature and that can enhance the feasibility and the successful implementation of cross-border infrastructure projects. They provide detailed information concerning FDI into the major emerging regions: East Asia/Pacific, Latin America and Eastern Europe. They also discuss the theoretical and...

    Provided By University of California

  • White Papers // Feb 2009

    From New Deal Institutions To Capital Markets: Commercial Consumer Risk Scores And The Making Of Subprime Mortgage Finance

    At the tail end of 2006, the 'Subprime' hit the news with a bang when default rates shot up in a segment of mortgage finance that had previously received little attention in mainstream reporting. Against rising central bank interest rates, and following the collapse of the housing bubble, borrowers bearing...

    Provided By University of California

  • White Papers // Feb 2009

    Racial Exclusion And The Political Economy Of The Subprime Crisis

    This paper develops a political economic explanation of the 2007-09 US subprime crisis which focuses on one of its central causes: the transformation of racial exclusion in US mortgage markets. Until the early 1990s, racial minorities were systematically excluded from mortgage finance due to bank redlining and discrimination. But then...

    Provided By University of California

  • White Papers // Apr 2011

    Illiquid Financial Markets And Monetary Policy

    This paper analyzes the role of money in markets where financial investment takes place in a decentralized fashion. A key methodological contribution is the development of a dynamic framework that brings together a model for illiquid assets a la Duffie et al. and a monetary framework a la Lagos and...

    Provided By University of California

  • White Papers // Dec 2008

    A Dynamic Model Of Entrepreneurship With Borrowing Constraints: Theory And Evidence

    Does wealth beget wealth and entrepreneurship, or is entrepreneurship mainly determined by an individual's ability? A large literature studies the relationship between wealth and entry to entrepreneurship to inform this question. This paper shows that in a dynamic model, the existence of financial constraints to the creation of businesses implies...

    Provided By University of California

  • White Papers // Jun 2009

    Fuzzy Math, Disclosure Regulation And Credit Market Outcomes: Evidence From Truth-In-Lending Reform

    Consumer installment lenders prefer to market "Low monthly payments" and shroud interest rates. Why not voluntarily disclose rates? The authors show that when an interest rate is not disclosed, most consumers substantially underestimate it using information on the monthly payment, loan principal and maturity. This "Fuzzy math" or "Payment/interest bias"...

    Provided By University of California

  • White Papers // Apr 2011

    Financial Crises, Credit Booms, And External Imbalances: 140 Years Of Lessons

    Do external imbalances increase the risk of financial crises? In this paper, the authors study the experience of 14 developed countries over 140 years (1870{2008). They exploit their long-run dataset in a number of different ways. First, they apply new statistical tools to describe the temporal and spatial patterns of...

    Provided By University of California

  • White Papers // Aug 2009

    Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach

    With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet games, has tremendous potential and interest. However, the current client-server architecture for PC-based Internet games, where most of the storage and computational burden of...

    Provided By University of California

  • White Papers // May 2011

    The Effects Of Monetary Policy "News" And "Surprises"

    There is substantial agreement in the monetary policy literature over the effects of exogenous monetary policy shocks. The shocks that are investigated, however, almost exclusively represent unanticipated changes in policy, which surprise the private sector and which are typically found to have a delayed and sluggish effect on output. In...

    Provided By University of California

  • White Papers // May 2011

    Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud

    Data analytics are key applications running in the cloud computing environment. To improve performance and cost-effectiveness of a data analytics cluster in the cloud, the data analytics system should account for heterogeneity of the environment and workloads. In addition, it also needs to provide fairness among jobs when multiple jobs...

    Provided By University of California

  • White Papers // Feb 2009

    Bank Competition And Economic Stability: The Role Of Monetary Policy

    This paper analyzes the dual role of monetary policy for economic efficiency and stability in a model of endogenous bank competition. Multiple equilibria emerge from the complementarity between bank and non-financial firm decisions. Adverse aggregate or idiosyncratic liquidity shocks may cause a breakdown in which the economy collapses into no-production...

    Provided By University of California

  • White Papers // Nov 2008

    Finding and Reproducing Heisenbugs in Concurrent Programs

    Concurrency is pervasive in large systems. Unexpected interference among threads often results in "Heisenbugs" that are extremely difficult to reproduce and eliminate. The authors have implemented a tool called CHESS for finding and reproducing such bugs. When attached to a program, CHESS takes control of thread scheduling and uses efficient...

    Provided By University of California

  • White Papers // Nov 2008

    Progressive Parity-Based Hardening of Data Stores

    The authors propose the use of parity-based redundant data layouts of increasing reliability as a means to progressively harden data archives. They evaluate the reliability of two such layouts and demonstrate how moving to layouts of higher parity degree offers a mechanism to progressively and dramatically increase the reliability of...

    Provided By University of California

  • White Papers // Aug 2009

    Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability

    The authors investigate the impact of irrecoverable read errors - also known as bad blocks - on the MTTDL of mirrored disks, RAID level 5 arrays and RAID level 6 arrays. The study is based on the data collected by Bairavasundaram et al. from a population of 1.53 million disks...

    Provided By University of California