University of California

Displaying 281-320 of 721 results

  • White Papers // Sep 2010

    Decentralized Multi-Armed Bandit With Imperfect Observations

    The authors consider decentralized multi-armed bandit problems with multiple distributed players. At each time, each player chooses one of the N independent arms with unknown reward statistics to play. Players do not exchange information regarding their observations or actions. A collision occurs when multiple players choose the same arm. In...

    Provided By University of California

  • White Papers // Sep 2010

    FATE and DESTINI: A Framework for Cloud Recovery Testing

    As the cloud era begins and failures become commonplace, the fate and destiny of availability, reliability and performance are in the hands of failure recovery. Unfortunately, recovery problems still take place, causing downtimes, data loss, and many other problems. The authors propose a new testing framework for cloud recovery: FATE...

    Provided By University of California

  • White Papers // Sep 2010

    Active Cloud DB: A RESTful Software-as-a-Service for Language Agnostic Access to Distributed Datastores

    In this paper, the authors present Active Cloud DB, an open source Software-as-a-Service (SaaS) application that allows for RESTful access to cloud-based distributed datastore technologies that implement the Google Datastore API. They implement Active Cloud DB as a Google App Engine application that they employ to expose the Google App...

    Provided By University of California

  • White Papers // Sep 2010

    Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks

    Researches about multi-radio mesh networks have mostly focused on channel allocation under internal interference. However, the deployment of WMNs in unlicensed bands of dense urban areas imposes many challenges regarding co-existence with residential access points. In this paper, the authors propose Urban-X, which is a first attempt towards a new...

    Provided By University of California

  • White Papers // Sep 2010

    Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper

    Relying on physical layer security is an attractive alternative of utilizing cryptographic algorithms at upper layers of protocol stack for secure communications. In this paper, the authors consider a two-hop wireless relay network in the presence of an eavesdropper. Their scenario of interest spans over a four-node network model including...

    Provided By University of California

  • White Papers // Sep 2010

    Identifying BGP Routing Table Transfers

    BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to the understanding of the global routing system. However the collected BGP data contains both the updates generated by actual route changes, and the updates of BGP routing table transfers resulted from BGP...

    Provided By University of California

  • White Papers // Sep 2010

    Copperhead: Compiling an Embedded Data Parallel Language

    Modern parallel microprocessors deliver high performance on applications that expose substantial fine-grained data parallelism. Although data parallelism is widely available in many computations, implementing data parallel algorithms in low-level languages is often an unnecessarily difficult task. The characteristics of parallel microprocessors and the limitations of current programming methodologies motivate the...

    Provided By University of California

  • White Papers // Sep 2010

    Impulsive Systems Triggered by Superposed Renewal Processes

    The authors consider impulsive systems with several reset maps triggered by independent renewal processes, i.e., the intervals between jumps associated with a given reset map are identically distributed and independent of the other jump intervals. Considering linear dynamic and reset maps, they establish that mean exponential stability is equivalent to...

    Provided By University of California

  • White Papers // Sep 2010

    Streaming Satellite Data to Cloud Workflows for On-Demand Computing of Environmental Products

    Environmental data arriving constantly from satellites and weather stations are used to compute weather coefficients that are essential for agriculture and viticulture. For example, the reference evapotranspiration (ET0) coefficient, overlaid on regional maps, is provided each day by the California Department of Water Resources to local farmers and turf managers...

    Provided By University of California

  • White Papers // Sep 2010

    L2-Induced Gains of Switched Systems and Classes of Switching Signals

    This paper addresses the L2-induced gain analysis for switched linear systems. The authors exploit non-conservative necessary and sufficient conditions for the induced gain to lie below a prescribed positive constant and discuss on the induced gains of switched systems obtained for different classes of switching signals, which distinct regularity assumptions...

    Provided By University of California

  • White Papers // Sep 2010

    Toward an Error Handling Mechanism for Timing Errors With Java Pathfinder and Ptolemy II

    Designing effective error handling systems in an embedded software system is essential for acceptable and reliable functionality in cases of errors and for the recovery from faults. Errors in the error handling system can cause catastrophic failures of the software, lead to mission failures and can endanger human life. The...

    Provided By University of California

  • White Papers // Sep 2010

    Toward Automated Detection of Logic Vulnerabilities InWeb Applications

    Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, there has also been an increase in the number and complexity of vulnerabilities. Current techniques to identify security problems in web applications...

    Provided By University of California

  • White Papers // Sep 2010

    Extended H-Index Parameterized Data Structures for Computing Dynamic Subgraph Statistics

    The authors present techniques for maintaining subgraph frequencies in a dynamic graph, using data structures that are parameterized in terms of h, the h-index of the graph. The methods extend previous results of Eppstein and Spiro for maintaining statistics for undirected subgraphs of size three to directed subgraphs and to...

    Provided By University of California

  • White Papers // Sep 2010

    Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

    Private Set Intersection (PSI) protocols allow one party ("Client") to compute an intersection of its input set with that of another party ("Server"), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI...

    Provided By University of California

  • White Papers // Sep 2010

    A Case for Opportunistic Embedded Sensing in Presence of Hardware Power Variability

    The system lifetime gains provided by the various power management techniques in embedded sensing systems are a strong function of the active and sleep mode power consumption of the underlying hardware platform. However, power consumption characteristics of hardware platforms exhibit high variability across different instances of the platform, diverse ambient...

    Provided By University of California

  • White Papers // Sep 2010

    Tweakable Block Ciphers

    A common trend in applications of block ciphers over the past decades has been to employ block ciphers as one piece of a "Mode of operation" - possibly, a way to make a secure symmetric-key cryptosystem, but more generally, any cryptographic application. Most of the time, these modes of operation...

    Provided By University of California

  • White Papers // Sep 2010

    Quality Tradeoffs in Object Tracking With Duty-Cycled Sensor Networks

    Extending the lifetime of wireless sensor networks requires energy-conserving operations such as duty-cycling. However, such operations may impact the effectiveness of high-fidelity real-time sensing tasks, such as object tracking, which require high accuracy and short response times. In this paper, the authors quantify the influence of different duty-cycle schemes on...

    Provided By University of California

  • White Papers // Aug 2010

    The Design of a Reliable Reputation System

    Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero accountability via anonymous online identities and divergent interests result in selfish behavior that can disrupt or manipulate networks for personal gain. While "Reputation systems" are...

    Provided By University of California

  • White Papers // Aug 2010

    Inter-Socket Victim Cacheing for Platform Power Reduction

    On a multi-socket architecture with load below peak, as is often the case in a server installation, it is common to consolidate load onto fewer sockets to save processor power. However, this can increase main memory power consumption due to the decreased total cache space. This paper describes inter-socket victim...

    Provided By University of California

  • White Papers // Aug 2010

    Provenance in ORCHESTRA

    Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for settings in which structured data is collaboratively authored by a large community, such as in the sciences, there is seldom consensus about how...

    Provided By University of California

  • White Papers // Aug 2010

    Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners

    Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "Point-and-click pentesting" tools that automatically evaluate the security of web applications with little or no human support. These tools access a web application in...

    Provided By University of California

  • White Papers // Aug 2010

    VAPR: Void Aware Pressure Routing Protocol

    UnderWater Acoustic Sensor Networks (UW-ASNs) have lately been suggested as a potent means of supporting aquatic applications ranging from environmental monitoring to intrusion detection. A bevy of mobile sensor nodes each equipped with a variety of sensors and a low bandwidth acoustic modem (e.g. Drogues) can be deployed the region...

    Provided By University of California

  • White Papers // Aug 2010

    CEO: A Cloud Epistasis computing Model in GWAS

    The 1000 Genome project has made available a large number of Single Nucleotide Polymorphisms (SNPs) for Genome-Wide Association Studies (GWAS). However, the large number of SNPs has also rendered the discovery of epistatic interactions of SNPs computationally expensive. Parallelizing the computation offers a promising solution. This paper proposes a Cloud-based...

    Provided By University of California

  • White Papers // Aug 2010

    Two-Handed Marking Menus for Multi-Touch Devices

    The authors investigate multi-stroke marking menus for multi-touch devices and they show that using two hands can improve performance. They present two new two-handed multi-stroke marking menu variants in which users either draw strokes with both hands simultaneously or alternate strokes between hands. In a pair of studies they find...

    Provided By University of California

  • White Papers // Aug 2010

    A Model-Based Process for Evaluating Cluster Building Blocks

    Traditional servers account for more than 1.5% of the US electricity use though spend their lives largely underutilized or idle. Because a large portion of power in a data center is due directly or indirectly to servers, power savings in a data center environment can be achieved simply by using...

    Provided By University of California

  • White Papers // Aug 2010

    Multi-Modal Modeling of Urban Mobility

    Design and efficacy of a routing protocol for mobile ad-hoc networks strongly depends on the underlying mobility pattern of the mobile nodes. Counter to the perception of mobility being random in time and space, the authors show that spatial modality is a key trait of human mobility. Most of the...

    Provided By University of California

  • White Papers // Aug 2010

    Automating Data Center Operations Using Machine Learning

    Today's Internet data-centers run many complex and large-scale Web applications that are very difficult to manage. The main challenges are understanding user workloads and application performance, and quickly identifying and resolving performance problems. Statistical Machine Learning (SML) provides a methodology for quickly processing the large quantities of monitoring data generated...

    Provided By University of California

  • White Papers // Aug 2010

    Results and Techniques in Multiuser Information Theory

    In this dissertation the authors develop new techniques and apply them to prove new results in multiuser information theory. In the first part of the dissertation, they introduce the "Potential function method," and apply it to prove converses for a series of multi-terminal network capacity problems. In the second part...

    Provided By University of California

  • White Papers // Aug 2010

    Interactive Visual Analysis of Hierarchical Enterprise Data

    In this paper, the authors present an interactive visual technique for analyzing and understanding hierarchical data, which they have applied to analyzing a corpus of technical reports produced by a corporate research laboratory. The analysis begins by selecting a known entity, such as a topic, a report, or a person,...

    Provided By University of California

  • White Papers // Aug 2010

    Quantitative Evaluation of Secure Network Coding

    Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent this attack, the authors have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While the method...

    Provided By University of California

  • White Papers // Aug 2010

    Bayesian Inference for Queueing Networks and Modeling of Internet Services

    Modern Internet services, such as those at Google, Yahoo!, and Amazon, handle billions of requests per day on clusters of thousands of computers. Because these services operate under strict performance requirements, a statistical understanding of their performance is of great practical interest. Such services are modeled by networks of queues,...

    Provided By University of California

  • White Papers // Aug 2010

    Towards Cooperative Grids: Sensor/Actuator Networks for Renewables Integration

    Faced with an uncertain path forward to Renewables Portfolio Standard (RPS) goals and the high cost of energy storage, the authors believe that deep demand side management must be a central strategy to achieve widespread penetration of renewable energy sources. They examine the variability of wind as a source of...

    Provided By University of California

  • White Papers // Aug 2010

    System Problem Detection by Mining Console Logs

    The console logs generated by an application contain information that the developers believed would be useful in debugging or monitoring the application. Despite the ubiquity and large size of these logs, they are rarely exploited because they are not readily machine-parsable. The authors propose a fully automatic methodology for mining...

    Provided By University of California

  • White Papers // Jul 2010

    Code Generation for Embedded Java With Ptolemy

    Code generation from models is the ultimate goal of model-based design. For real-time systems the generated code must be analyzable for the worst-case execution time (WCET). This paper evaluates Java code generation from Ptolemy II for embedded real-time Java. The target system is the time-predictable Java processor JOP. The quality...

    Provided By University of California

  • White Papers // Jul 2010

    On Developing Smart Applications for VANETs: Where Are We Now? Some Insights on Technical Issues and Open Problems

    The advances in research on ad hoc networks, the availability of cheap radio interfaces (e.g. Wi-Fi) and the increasing amount of electronic devices installed in vehicles have set the path for vehicular ad hoc networks. In the past few years, Vehicular Ad hoc NETwork (VANET) research has addressed all layers,...

    Provided By University of California

  • White Papers // Jul 2010

    Fine-Grained Incremental Learning and Multi-Feature Tossing Graphs to Improve Bug Triaging

    Software bugs are inevitable and bug fixing is a difficult, expensive, and lengthy process. One of the primary reasons why bug fixing takes so long is the difficulty of accurately assigning a bug to the most competent developer for that bug kind or bug class. Assigning a bug to a...

    Provided By University of California

  • White Papers // Jul 2010

    An Adaptive Multi-Channel P2P Video-on-Demand System Using Plug-and-Play Helpers

    They authors present a multi-channel P2P Video-on-Demand (VoD) system using "plug-and-play" helpers. Helpers are heterogeneous "micro-servers" with limited storage, bandwidth and number of users they can serve simultaneously. The proposed system has the following salient features: it minimizes the server load; it is distributed, and requires little or no maintenance...

    Provided By University of California

  • White Papers // Jul 2010

    Cross-Language, Type-Safe, and Transparent Object Sharing for Co-Located Managed Runtimes

    As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, Object-Oriented (OO) programming languages and to architect systems that comprise multiple components. Different components are often implemented in different programming languages. In state-of-the-art multi-component, multi-language systems, cross-component communication relies...

    Provided By University of California

  • White Papers // Jul 2010

    Comprehending Environmental And Economic Sustainability: Comparative Analysis Of Stability Principles In The Biosphere And Free Market Economy

    Using the formalism of Lyapunov potential function it is shown that the stability principles for biomass in the ecosystem and for employment in economics are mathematically similar. The ecosystem is found to have a stable and an unstable stationary state with high (forest) and low (grasslands) biomass, respectively. In economics,...

    Provided By University of California

  • White Papers // Jul 2010

    Security Exercises for the Online Classroom With DETER

    Creating high-quality homework with an emphasis on creativity and open-ended learning is challenging. This is especially true for online classes, which must be both accessible via the Internet and comparable in quality and value to projects that could be used in a traditional classroom. UCLA recently began offering an online...

    Provided By University of California

  • White Papers // Aug 2009

    How Small Are Building Blocks of Complex Networks

    Network motifs are small building blocks of complex networks, such as gene regulatory networks. The frequent appearance of a motif may be an indication of some network-specific utility for that motif, such as speeding up the response times of gene circuits. However, the precise nature of the connection between motifs...

    Provided By University of California

  • White Papers // Aug 2009

    Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems

    Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is being controlled by a remote untrusted host. In this paper the authors present efficient techniques for authenticating data structures that represent graphs and collections of geometric objects. They...

    Provided By University of California

  • White Papers // Aug 2009

    The Single Source Two Terminal Network With Network Coding

    The authors consider a communication network with a single source that has a set of messages and two terminals where each terminal is interested in an arbitrary subset of messages at the source. A tight capacity region for this problem is demonstrated. They show by a simple graph-theoretic procedure that...

    Provided By University of California

  • White Papers // May 2011

    Dynamic Egocentric Models for Citation Networks

    The analysis of the formation and evolution of networks over time is of fundamental importance to social science, biology, and many other fields. While longitudinal network data sets are increasingly being recorded at the granularity of individual time-stamped events, most studies only focus on collapsed cross-sectional snapshots of the network....

    Provided By University of California

  • White Papers // Mar 2010

    A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications

    The authors consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received...

    Provided By University of California

  • White Papers // Dec 2009

    Harvesting SSL Certificate Data to Identify Web-Fraud

    Web-fraud is one of the most unpleasant features of today's Internet. Two eminent examples of web-fraudulent activities are phishing and typosquatting. Their effects range from relatively benign (such as unwanted or unexpected ads) to downright sinister (especially, when typosquatting is combined with phishing). This paper presents a novel technique to...

    Provided By University of California

  • White Papers // Sep 2009

    On Degrees of Freedom Region of MIMO Networks Without CSIT

    In this paper, the authors study the effect of the absence of channel knowledge for Multiple-Input-Multiple-Output (MIMO) networks. Specifically, they assume perfect channel state information at the receivers, no channel state information at the transmitter(s), and independent identically distributed (i.i.d.) Rayleigh fading across antennas, users and time slots. They provide...

    Provided By University of California

  • White Papers // Jan 2011

    Energy Conservation in Datacenters Through Cluster Memory Management and Barely-Alive Memory Servers

    As a result of current resource provisioning schemes in Internet services, servers end up less than 50% utilized almost all the time. At this level of utilization, the servers' energy efficiency is less than half their efficiency at peak utilization. A solution to this problem could be consolidating workloads into...

    Provided By University of California

  • White Papers // Nov 2009

    Libertarian Paternalism And Information Sharing

    The authors develop a theoretical model to study the effects of libertarian paternalism on knowledge acquisition and social learning. Individuals in the model are permitted to appreciate and use the information content in the default options set by the government. They show that in some settings libertarian paternalism may decrease...

    Provided By University of California

  • White Papers // Jan 2011

    External Double Hashing With Choice

    A novel extension to external double hashing providing significant reduction to both successful and unsuccessful search lengths is presented. The experimental and analytical results demonstrate the reductions possible. This method does not restrict the hashing table configuration parameters and utilizes very little additional storage space per bucket. The runtime performance...

    Provided By University of California

  • White Papers // Feb 2010

    Practical Rate and Route Adaptation With Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks

    Accurate and fast Packet Delivery Ratio (PDR) estimation, used in evaluating wireless link quality, is a prerequisite to increase the performance of multi-hop and multi-rate IEEE 802.11 wireless networks. Unfortunately, contemporary PDR estimation methods, i.e. beacon-based packet counting in Estimated Transmission Time and Expected Transmission Count metrics, have unsatisfactory performance....

    Provided By University of California

  • White Papers // Mar 2009

    Loop-Extended Symbolic Execution on Binary Programs

    Mixed concrete and symbolic execution is an important technique for finding and understanding software bugs, including security relevant ones. However, existing symbolic execution techniques are limited to examining one execution path at a time, in which symbolic variables reflect only direct data dependencies. The authors introduce loop-extended symbolic execution, a...

    Provided By University of California

  • White Papers // Apr 2009

    Measuring Channel Capacity to Distinguish Undue Influence

    The channel capacity of a program is a quantitative measure of the amount of control that the inputs to a program have over its outputs. Because it corresponds to worst-case assumptions about the probability distribution over those inputs, it is particularly appropriate for security applications where the inputs are under...

    Provided By University of California

  • White Papers // Jan 2011

    Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols

    The current process of designing a security protocol is usually ad-hoc and involves little formalism and mechanical assistance. Such a design process is not only slow but also error-prone. Evidence shows that even when security protocols are designed with care and examined intensely,they can still be fundamentally flawed. A classic...

    Provided By University of California

  • White Papers // Jan 2011

    Timing Analysis of Keystrokes and Timing Attacks on SSH

    SSH is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has two weakness: First, the transmitted packets are padded only to an eight-byte boundary (if a block cipher is in use), which reveals the approximate size of the original data....

    Provided By University of California

  • White Papers // Oct 2009

    Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels

    This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and the authors examine both the broadcast...

    Provided By University of California

  • White Papers // Nov 2009

    A Simple Conceptual Generator for the Internet Graph

    The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing...

    Provided By University of California

  • White Papers // Nov 2009

    Feeds as Query Result Serializations

    Many Web-based data sources and services are available as feeds, a model that provides consumers with a loosely coupled way of interacting with providers. The current feed model is limited in its capabilities, however. Though it is simple to implement and scales well, it cannot be transferred to a wider...

    Provided By University of California

  • White Papers // Jan 2011

    The SQL-Based All-Declarative FORWARD Web Application Development Framework

    The vast majority of database-driven web applications perform, at a logical level, fundamentally simple Insert/Update/Delete commands. In response to a user action on the browser, the web application executes a program that transitions the old state to a new state. The state is primarily persistent and often captured in a...

    Provided By University of California

  • White Papers // Jul 2010

    Comprehending Environmental And Economic Sustainability: Comparative Analysis Of Stability Principles In The Biosphere And Free Market Economy

    Using the formalism of Lyapunov potential function it is shown that the stability principles for biomass in the ecosystem and for employment in economics are mathematically similar. The ecosystem is found to have a stable and an unstable stationary state with high (forest) and low (grasslands) biomass, respectively. In economics,...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship Between Web Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // Jan 2010

    Preventing Capability Leaks in Secure JavaScript Subsets

    Publishers wish to sandbox third-party advertisements to protect themselves from malicious advertisements. One promising approach used by ADsafe, Dojo Secure, and Jacaranda, sandboxes advertisements by statically verifying that their JavaScript conforms to a safe subset of the language. These systems blacklist known dangerous properties that would let advertisements escape the...

    Provided By University of California

  • White Papers // May 2009

    Achieving Linear Scaling With Interference Alignment

    Recent results have shown that interference alignment can achieve K/2 degrees of freedom in a K-user interference channel with time or frequency varying channel coefficients. For fixed number of users K, the number of degrees of freedom characterizes the asymptotic behavior of the performance in the high SNR limit but...

    Provided By University of California

  • White Papers // Jan 2011

    Cryptographic Voting Protocols: A Systems Perspective

    Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and they must analyze their security by considering...

    Provided By University of California

  • White Papers // Jan 2011

    Distillation Codes and Applications to DoS Resistant Multicast Authentication

    The authors introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast to erasure codes, distillation codes are robust against pollution attacks, a powerful class of Denial of Service (DoS) attacks...

    Provided By University of California

  • White Papers // Jan 2011

    Hidden Markov Model Cryptanalysis

    The authors present HMM attacks, a new type of cryptanalysis based on modeling randomized side channel countermeasures as Hidden Markov Models (HMM's). They also introduce Input Driven Hidden Markov Models (IDHMM's), a generalization of HMM's that provides a powerful and unified cryptanalytic framework for analyzing countermeasures whose operational behavior can...

    Provided By University of California

  • White Papers // May 2009

    The VIKING Project: An Initiative on Resilient Control of Power Networks

    This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system manaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. The authors will present the consortium, the motivation behind this research, the main objective...

    Provided By University of California

  • White Papers // Feb 2010

    Estimating Time Preferences From Convex Budgets

    Experimentally elicited discount rates are frequently higher than what one would infer from market interest rates and seem unreasonable for economic decision-making. Such high rates have often been attributed to dynamic inconsistency, as in present bias and hyperbolic discounting. A commonly recognized bias of standard elicitation techniques is the use...

    Provided By University of California

  • White Papers // Jan 2010

    Risk Preferences Are Not Time Preferences

    Risk and time are intertwined. The present is known while the future is inherently risky. Discounted expected utility provides a simple, coherent structure for analyzing decisions in intertemporal, uncertain environments. Critical to such analysis is the notion that certain and uncertain utility are functionally interchangeable. The authors document an important...

    Provided By University of California

  • White Papers // Jan 2010

    Certain And Uncertain Utility: The Allais Paradox And Five Decision Theory Phenomena

    In the study of decision making under risk, preferences are assumed to be continuous. The authors present a model of discontinuous preferences over certain and uncertain outcomes. Using existing parameter estimates for certain and uncertain utility, five important decision theory phenomena are discussed: the certainty effect, experimentally observed probability weighting,...

    Provided By University of California

  • White Papers // Apr 2009

    The Empirics Of China's Outward Direct Investment

    The authors investigate the empirical determinants of China's Outward Direct Investment (ODI). It is found that China's investments in developed and developing countries are driven by different sets of factors. Subject to the differences between developed and developing countries, there is evidence that both market seeking and resources seeking motives...

    Provided By University of California

  • White Papers // Apr 2010

    The Challenge of Heterogeneously Licensed Systems in Open Architecture Software Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. But this...

    Provided By University of California

  • White Papers // Jul 2009

    The Role of Software Licenses in Open Architecture Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously-licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. The software licenses...

    Provided By University of California

  • White Papers // Dec 2009

    Collaboration Practices and Affordances in Free/Open Source Software Development

    This paper examines collaborative work practices, development processes, project and community dynamics, and other socio-technical relationships in Free and Open Source Software Development (FOSSD). It also describes what kinds of collaboration affordances facilitate collaborative work in FOSSD projects. It reviews a set of empirical studies of FOSSD that articulate different...

    Provided By University of California

  • White Papers // Sep 2009

    Essays On The Financial Crisis And Globalization

    The authors have certainly been living in interesting times. While avoiding the worst connotations of that concept (no global war or other catastrophe), they have seen the fall of communism, the rise of information technology, and the beginnings of a shift in the global economic balance, back toward the days...

    Provided By University of California

  • White Papers // Apr 2009

    The Effect Of Global Output On U.S. Inflation And Inflation Expectations: A Structural Estimation

    Recent research has suggested that globalization may have transformed the U.S. Phillips curve by making inflation a function of global, rather than domestic, economic activity. This paper tests this view by estimating a structural model for the U.S., which incorporates a role of global output on the domestic demand and...

    Provided By University of California

  • White Papers // Jul 2009

    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods

    Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods...

    Provided By University of California

  • White Papers // Dec 2009

    Privacy in Online Social Networking at Workplace

    Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...

    Provided By University of California

  • White Papers // Apr 2009

    Facilitating Controlled Tests of Website Design Changes Using Aspect-Oriented Software Development and Software Product Lines

    Controlled online experiments in which envisaged changes to a website are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort. This paper advocates...

    Provided By University of California

  • White Papers // Apr 2009

    Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites

    Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, the authors proposed a dynamic privacy-enhancing user modeling framework based on a software Product Line Architecture (PLA). The system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well...

    Provided By University of California