University of California

Displaying 321-360 of 766 results

  • White Papers // Jul 2010

    A Novel Delay-And Reliability-Aware Inter-Vehicle Routing Protocol

    Intelligent transportation systems could improve transportation safety, driving assistance and traffic management system. Vehicular Ad hoc NETwork (VANET) is an emerging field of technology, embedding wireless communication networks into vehicles to achieve intelligent transportation systems. The development of such systems pose many unique challenges like designing routing protocols that not...

    Provided By University of California

  • White Papers // Jul 2010

    EEFSim: Energy Efficiency Simulator

    Nowadays Cloud computing has emerged as one of the most promising computer paradigms. The idea of selling software as a service has promoted IT enterprises to bet for this new paradigm. Cloud computing aims to power the next generation data centers not only offering software as a service but virtual...

    Provided By University of California

  • White Papers // Jul 2010

    Provenance Based Information Trustworthiness Evaluation in Multi-Hop Networks

    In this paper, the authors present a trust model to evaluate the trustworthiness of information as well as the information publishing nodes based on the information provenance. They consider two factors in evaluating the provenance based information trust: path similarity and information similarity. In multihop networks, information can flow through...

    Provided By University of California

  • White Papers // Jul 2010

    New Advances in Self-Policing Cloud Computing

    Cloud computing is a style of computing in which dynamically scalable and often virtualized resources e.g., CPU, memory, storage, and network bandwidth are provided as a service over the Internet. This model is considered affordable for cloud users as they avoid the significant financial overheads associated with deploying, maintaining, and...

    Provided By University of California

  • White Papers // Jul 2010

    Frequency Quorum Rendezvous for Fast and Resilient Key Establishment Under Jamming Attack

    Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. Existing countermeasures often make use of spread-spectrum techniques such as Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum. Communication parties rely on a pre-shared common key (hopping sequence or spread code)...

    Provided By University of California

  • White Papers // Jul 2010

    Assessing the VANET's Local Information Storage Capability Under Different Traffic Mobility

    Wireless networking enabled vehicles can form Vehicular Ad hoc Mesh Networks (VMesh). By cooperative communication among VMeshes, a local transient information could be "Retained" within a given geographic region for a certain period of time, without any infrastructure help. In this paper, the authors study this "Storage Capability" of VMesh....

    Provided By University of California

  • White Papers // Jul 2010

    Knowledge Transfers From Multinational To Domestic Firms: Evidence From Worker Mobility

    Labor turnover is a commonly-cited mechanism for the transmission of technology from multinational to domestic firms, but until now there has been little direct evidence for this mechanism. Using a novel matched establishment-worker database from Brazil, the author presents evidence consistent with the existence of positive multinational wage spillovers through...

    Provided By University of California

  • White Papers // Jun 2010

    Does Tariff Liberalization Kick The Good Apples Out? Theory And Evidence

    This paper examines the liberalization of a common tariff when imported varieties vary in quality and cost. Varieties of higher quality and/or lower costs are imported at lower absolute demand elasticities and also to earn higher revenues. By virtue of larger demand elasticities, low revenue varieties benefit the most from...

    Provided By University of California

  • White Papers // Jun 2010

    Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems

    Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, the authors argue that one of the prominent challenges...

    Provided By University of California

  • White Papers // Jun 2010

    A Novel SLA Framework for Time-Differentiated Resilience in Optical Mesh Networks

    Telecom customers may have specific time periods during which they require extra resilience. However, these time-differentiated resilience requirements are not effectively addressed by current SLA frameworks. To satisfy these high priority periods, a generic SLA framework typically provides upgraded protection over the entire service duration, which is unnecessary and expensive....

    Provided By University of California

  • White Papers // Jun 2010

    Efficient Computation of Queueing Delay at a Network Port From Output Link Packet Traces

    Current Internet core routers provide enough buffer capacity at each output port to keep the link busy for 250 msec. to avoid disrupting TCP flows because of dropped packets. Since link speeds are rising much more quickly than the availability and cost-effectiveness of large high-speed memories, there is now significant...

    Provided By University of California

  • White Papers // Jun 2010

    Organizing Large Scale Hacking Competitions

    Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security competitions and challenges were carried out, each with different characteristics, configurations, and goals. From 2003 to 2007, the authors carried out a number of...

    Provided By University of California

  • White Papers // Jun 2010

    Cross-Language, Type-Safe, and Transparent Object Sharing for Co-Located Managed Runtimes UCSB Technical Report #2010-11 June, 2010

    As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, Object-Oriented (OO) programming languages and to architect systems that comprise multiple components. Different components are often implemented in different programming languages. In state-of-the-art multi-component, multi-language systems, cross-component communication relies...

    Provided By University of California

  • White Papers // Jun 2010

    Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices

    Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to implement multiple technologies into a single radio. This system-on-a-chip architecture leads to competition among networks when devices toggle across different technologies to communicate with multiple networks. In this paper, authors...

    Provided By University of California

  • White Papers // Jun 2010

    Multinational Firms And Trade: Gravity Versus Market Power In A Ricardian World

    Are multinational firms good for consumer welfare? The authors build a model of foreign direct investment and trade that exploits both firm heterogeneity and strategic pricing behavior, embodying direct exporting and multinational production for both export and local sale in one framework. They show that improved efficiency in target firms...

    Provided By University of California

  • White Papers // Jun 2010

    Gibbs Sampling in Open-Universe Stochastic Languages

    Languages for Open-Universe Probabilistic Models (OUPMs) can represent situations with an unknown number of objects and identity uncertainty. While such cases arise in a wide range of important real-world applications, existing general purpose inference methods for OUPMs are far less efficient than those available for more restricted languages and model...

    Provided By University of California

  • White Papers // Jun 2010

    Protecting a Moving Target: Addressing Web Application Concept Drift

    Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The reason is that these systems are able to characterize the applications' normal behavior in an automated fashion. However, anomaly-based detectors for web applications suffer from false...

    Provided By University of California

  • White Papers // Jun 2010

    Examining Energy Use in Heterogeneous Archival Storage Systems

    Controlling energy usage in data centers, and storage in particular, continues to rise in importance. Many systems and models have examined energy efficiency through intelligent spin-down of disks and novel data layouts, yet little work has been done to examine how power usage over the course of months to years...

    Provided By University of California

  • White Papers // Jun 2010

    Analyzing and Detecting Malicious Flash Advertisements

    The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe's Flash have been instrumental in creating web-based interfaces that are similar to those of traditional applications. Dynamic content has also become popular in advertising, where Flash is...

    Provided By University of California

  • White Papers // Jun 2010

    FIRE: FInding Rogue nEtworks

    For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizations such as the Russian Business Network (RBN), Atrivo (a.k.a., Intercage),McColo, and most recently, the Triple Fiber Network (3FN) operated with impunity, providing a safe haven for...

    Provided By University of California

  • White Papers // Jun 2010

    Rate-Optimal Video Transmission Over MIMO Channels

    In this paper, the authors propose a low complexity method for optimal video transmission over a quasi-static Rayleigh fading channel utilizing multiple transmit and receive antennas. Under the assumption that the total transmission bandwidth is fixed, their method jointly selects the optimal Space-Time Code (STC) with fixed and finite signal...

    Provided By University of California

  • White Papers // Jun 2010

    Accelerating Viola-Jones Face Detection to FPGA-Level Using GPUs

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. The authors present a multi-GPU implementation of the Viola-Jones face detection algorithm that meets the performance of the fastest known FPGA implementation. The GPU design offers far lower development costs, but the FPGA implementation consumes less...

    Provided By University of California

  • White Papers // Jun 2010

    Towards Practical Taint Tracking

    This paper proposes several technical measures that significantly improve performance and largely limit kernel taint explosion in a XEN- and QEMU-based taint tracking system. Full-system, fine-grained taint tracking is a fundamental primitive that can be used for a number of purposes, most notably for tracking the flow of information through...

    Provided By University of California

  • White Papers // Jun 2010

    Data Privacy With Multi-Function Printers, Printers and Copiers

    Hard drives have become prevalent temporary or static storage components within many print devices. In fact, most copiers and multi-function printers manufactured since 2005 have hard drives. While the campus Cyber-safety program has, to date, focused on computer and network security, the focus needs to be expanded to include hard...

    Provided By University of California

  • White Papers // Jun 2010

    Financial Constraints And Innovation: Why Poor Countries Dont Catchup

    The authors examine micro-level channels of how financial development can affect macroeconomic outcomes like the level of income and export intensity. They investigate theoretically and empirically how financial constraints affect a firm's innovation and export activities, using unique firm survey data which provides direct measures for innovations and firm-specific financial...

    Provided By University of California

  • White Papers // May 2010

    P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust Against Malicious Users

    In this paper the authors introduce a framework for privacy preserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy (P4P) and features a novel heterogeneous architecture and a number of efficient tools for performing private computation and ensuring security at large scale....

    Provided By University of California

  • White Papers // May 2010

    Spark: Cluster Computing With Working Sets

    MapReduce and its variants have been highly successful in implementing large-scale data-intensive applications on commodity clusters. However, most of these systems are built around an acyclic data flow model that is not suitable for other popular applications. This paper focuses on one such class of applications: those that reuse a...

    Provided By University of California

  • White Papers // May 2010

    Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center

    This paper present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI 1. Sharing improves cluster utilization and avoids per-framework data replication. Mesos shares resources in a fine-grained manner, allowing frameworks to achieve data locality by taking turns reading data stored...

    Provided By University of California

  • White Papers // May 2010

    Measuring Online Service Availability Using Twitter

    Real-time micro-blogging services such as Twitter are widely recognized for their social dynamics - how they both encapsulate a social graph and propagate information across it. However, the content of this information is equally interesting since it frequently reflects individual experiences with a broad variety of real-time events. Indeed, events...

    Provided By University of California

  • White Papers // May 2010

    An Empirical Study of the Control and Data Planes (or Control Plane Determinism Is Key for Replay Debugging Data center Applications)

    Replay debugging systems enable the reproduction and debugging of non-deterministic failures in production application runs. However, no existing replay system is suitable for datacenter applications like Cassandra, Hadoop, and Hypertable. For these large scale, distributed, and data intensive programs, existing methods either incur excessive production overheads or don't scale to...

    Provided By University of California

  • White Papers // May 2010

    Towards an Efficient Distributed Object Recognition System in Wireless Smart Camera Networks

    The authors propose an efficient distributed object recognition system for sensing, compression, and recognition of 3-D objects and landmarks using a network of wireless smart cameras. The foundation is based on a recent work that shows the representation of scale-invariant image features exhibit certain degree of sparsity: if a common...

    Provided By University of California

  • White Papers // May 2010

    FDI In The Banking Sector

    It is a well known quandary that when countries open their financial sectors, foreign-owned banks appear to bring superior efficiency to their host markets but also charge higher markups on borrowed funds than their domestically owned rivals, with unknown impacts on interest rates and welfare. Using heterogeneous, imperfectly competitive lenders,...

    Provided By University of California

  • White Papers // May 2010

    Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing

    Data center cloud computing distinguishes computational services such as database transactions and data storage from computational resources such as server farms and disk arrays. Cloud computing enables a software-as-a-service business model where clients may only pay for the service they really need and providers may fully utilize the resources they...

    Provided By University of California

  • White Papers // May 2010

    The Emperor's New APIs: On the (In)Secure Usage of New Client-Side Primitives

    Several new browser primitives have been proposed to meet the demands of application interactivity while enabling security. To investigate whether applications consistently use these primitives safely in practice, the authors study the real-world usage of two client-side primitives, namely postMessage and HTML5's client-side database storage. They examine new purely client-side...

    Provided By University of California

  • White Papers // May 2010

    DBTaint: Cross-Application Information Flow Tracking Via Databases

    Information flow tracking has been an effective approach for identifying malicious input and detecting software vulnerabilities. However, most current schemes can only track data within a single application. This single application approach means that the program must consider data from other programs as either all tainted or all untainted, inevitably...

    Provided By University of California

  • White Papers // May 2010

    Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications

    The IEEE 1609.4 standard has been proposed to provide multi-channel operations in Wireless Access for Vehicular Environments (WAVE), where all the channels are periodically synchronized into control and service intervals. The communication device in each vehicle will stay at the control channel for negotiation and contention during the control interval,...

    Provided By University of California

  • White Papers // May 2010

    An Evaluation of Distributed Datastores Using the AppScale Cloud Platform

    The authors present new cloud support that employs a single API the Datastore API from Google App Engine (GAE) to interface to different open source distributed database technologies. They employ this support to "Plug in" these technologies to the API so that they can be used by web applications and...

    Provided By University of California

  • White Papers // May 2010

    Beyond Multi-Hop: Optimal Cooperation in Large Wireless Networks

    Multi-hop is the communication architecture of current wireless networks such as mesh or ad hoc networks. Packets are sent from each source to its destination via multiple point-to-point transmissions between relaying nodes. The origins of this approach are rooted in the practice of traditional wire-line networks. Today, the increasing need...

    Provided By University of California

  • White Papers // May 2010

    Is the Internet for Porn? an Insight Into the Online Adult Industry

    The online adult industry is among the most profitable business branches on the Internet, and its web sites attract large amounts of visitors and traffic. Nevertheless, no study has yet characterized the industry's economical and security-related structure. As cyber-criminals are motivated by financial incentives, a deeper understanding and identification of...

    Provided By University of California

  • White Papers // May 2010

    Secure Cooperative Sharing of JavaScript, Browser, and Physical Resources

    For better application-level controls on mashups, they advocate extending the Single Origin Policy and associated primitives to support a cooperative model that allows applications to express explicit sharing policies over browser, Javascript, and physical resources. First, the authors introduce an isolation model for content loading that is more complete than...

    Provided By University of California

  • White Papers // May 2009

    The VIKING Project: An Initiative on Resilient Control of Power Networks

    This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system manaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. The authors will present the consortium, the motivation behind this research, the main objective...

    Provided By University of California

  • White Papers // Feb 2010

    Estimating Time Preferences From Convex Budgets

    Experimentally elicited discount rates are frequently higher than what one would infer from market interest rates and seem unreasonable for economic decision-making. Such high rates have often been attributed to dynamic inconsistency, as in present bias and hyperbolic discounting. A commonly recognized bias of standard elicitation techniques is the use...

    Provided By University of California

  • White Papers // Jan 2010

    Risk Preferences Are Not Time Preferences

    Risk and time are intertwined. The present is known while the future is inherently risky. Discounted expected utility provides a simple, coherent structure for analyzing decisions in intertemporal, uncertain environments. Critical to such analysis is the notion that certain and uncertain utility are functionally interchangeable. The authors document an important...

    Provided By University of California

  • White Papers // Jan 2010

    Certain And Uncertain Utility: The Allais Paradox And Five Decision Theory Phenomena

    In the study of decision making under risk, preferences are assumed to be continuous. The authors present a model of discontinuous preferences over certain and uncertain outcomes. Using existing parameter estimates for certain and uncertain utility, five important decision theory phenomena are discussed: the certainty effect, experimentally observed probability weighting,...

    Provided By University of California

  • White Papers // Apr 2009

    The Empirics Of China's Outward Direct Investment

    The authors investigate the empirical determinants of China's Outward Direct Investment (ODI). It is found that China's investments in developed and developing countries are driven by different sets of factors. Subject to the differences between developed and developing countries, there is evidence that both market seeking and resources seeking motives...

    Provided By University of California

  • White Papers // Apr 2010

    The Challenge of Heterogeneously Licensed Systems in Open Architecture Software Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. But this...

    Provided By University of California

  • White Papers // Jul 2009

    The Role of Software Licenses in Open Architecture Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously-licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. The software licenses...

    Provided By University of California

  • White Papers // Dec 2009

    Collaboration Practices and Affordances in Free/Open Source Software Development

    This paper examines collaborative work practices, development processes, project and community dynamics, and other socio-technical relationships in Free and Open Source Software Development (FOSSD). It also describes what kinds of collaboration affordances facilitate collaborative work in FOSSD projects. It reviews a set of empirical studies of FOSSD that articulate different...

    Provided By University of California

  • White Papers // Sep 2009

    Essays On The Financial Crisis And Globalization

    The authors have certainly been living in interesting times. While avoiding the worst connotations of that concept (no global war or other catastrophe), they have seen the fall of communism, the rise of information technology, and the beginnings of a shift in the global economic balance, back toward the days...

    Provided By University of California

  • White Papers // Oct 2008

    Does Global Slack Matter More Than Domestic Slack In Determining U.S. Inflation?

    This paper employs a structural model to estimate whether global output gap has become an important determinant of U.S. inflation dynamics. The results provide support for the relevance of global slack as a determinant of U.S. inflation after 1985. The role of domestic output gap, instead, seems to have diminished...

    Provided By University of California

  • White Papers // Apr 2009

    The Effect Of Global Output On U.S. Inflation And Inflation Expectations: A Structural Estimation

    Recent research has suggested that globalization may have transformed the U.S. Phillips curve by making inflation a function of global, rather than domestic, economic activity. This paper tests this view by estimating a structural model for the U.S., which incorporates a role of global output on the domestic demand and...

    Provided By University of California

  • White Papers // Jul 2009

    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods

    Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods...

    Provided By University of California

  • White Papers // Dec 2009

    Privacy in Online Social Networking at Workplace

    Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...

    Provided By University of California

  • White Papers // Apr 2009

    Facilitating Controlled Tests of Website Design Changes Using Aspect-Oriented Software Development and Software Product Lines

    Controlled online experiments in which envisaged changes to a website are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort. This paper advocates...

    Provided By University of California

  • White Papers // Apr 2009

    Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites

    Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, the authors proposed a dynamic privacy-enhancing user modeling framework based on a software Product Line Architecture (PLA). The system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well...

    Provided By University of California

  • White Papers // Jan 2009

    Why Is Evaluating Usability of Privacy Designs so Hard? Lessons Learned From a User Study of PRISM

    Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privacy...

    Provided By University of California

  • White Papers // Oct 2009

    Enhancing Privacy Management Support in Instant Messaging

    Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. In-adequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits. The authors conducted interviews and an Internet survey to...

    Provided By University of California

  • White Papers // Jan 2011

    Balancing Computation and Code Distribution Costs: The Case for Hybrid Execution in Sensor Networks

    Virtual Machines (VM) are promising as system software in networks of embedded systems and pervasive computing spaces. VMs facilitate the development of platform-independent applications with small footprints to enable low cost application distribution and evolution. A major impediment to their more widespread acceptance is the performance overhead of interpretation. Compiling...

    Provided By University of California

  • White Papers // Jan 2011

    Remote Incremental Linking for Energy-Efficient Reprogramming of Sensor Networks

    With sensor networks expected to be deployed for long periods of time, the ability to reprogram them remotely is necessary for providing new services, fixing bugs, and enhancing applications and system software. Given the envisioned scales of future sensor network deployments, their restricted accessibility, and the limited energy and computing...

    Provided By University of California

  • White Papers // Oct 2009

    XML-Based Computation for Scientific Workflows

    Scientific workflows are increasingly used for rapid integration of existing algorithms to form larger and more complex programs. Such workflows promise to provide more abstract, yet executable views of data analyses through graphs of components representing computational tasks and edges representing the data-flow between tasks. However, designing workflows using purely...

    Provided By University of California

  • White Papers // Jan 2011

    Visualizing Online News Reporting For Public Display

    The authors describe the iterative design and implementation of "Spheres of Influence," an interactive digital multimedia installation in a public space that visualizes the spatial, temporal, and semantic dimensions of online international news reporting. The installation invites the casual passerby to explore a continually growing collection of up-to-the-minute news reports...

    Provided By University of California

  • White Papers // Jan 2011

    IPv4 Address Allocation and the BGP Routing Table Evolution

    The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. This paper quantitatively characterize the IPv4 ad-dress allocations made over the past six years and the global BGP routing table size changes during the same period of time. About 63,000...

    Provided By University of California

  • White Papers // Feb 2010

    Speculative Trade Under Unawareness: The Infinite Case

    The authors generalize the "No-Trade" theorem for finite unawareness belief structures in Heifetz, Meier, and Schipper (2009) to the in finite case. Unawareness refers to the lack of conception rather than to the lack of information. It is natural to presume that asymmetric unawareness may lead to speculative trade. Indeed,...

    Provided By University of California

  • White Papers // May 2010

    FDI In The Banking Sector

    It is a well known quandary that when countries open their financial sectors, foreign-owned banks appear to bring superior efficiency to their host markets but also charge higher markups on borrowed funds than their domestically owned rivals, with unknown impacts on interest rates and welfare. Using heterogeneous, imperfectly competitive lenders,...

    Provided By University of California

  • White Papers // Oct 2009

    A Theory Of Banks, Bonds, And The Distribution Of Firm Size

    The authors draw on stylized facts from the finance literature to build a model where altering the relative costs of bank and bond financing changes the entire distribution of firm size, with implications for the aggregate capital stock, output, and welfare. Reducing transactions costs in the bond market increases the...

    Provided By University of California

  • White Papers // Dec 2010

    Path-Based Inductive Synthesis for Program Inversion

    In this paper, the authors investigate the problem of semi-automated inversion of imperative programs, which has the potential to make it much easier and less error prone to write programs that naturally pair as inverses, such as insert/delete operations, compressors/ decompressors, and so on. Viewing inversion as a sub-problem of...

    Provided By University of California

  • White Papers // Jun 2009

    Noise Injection for Search Privacy Protection

    To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining, require a server-side deployment, thus users have little control over their data and privacy. In this paper the authors propose a user-side solution within the context of keyword...

    Provided By University of California

  • White Papers // Sep 2008

    The Java 5 Generics Compromise Orthogonality to Keep Compatibility

    In response to a long-lasting anticipation by the Java community, version 1.5 of the Java 2 platform - referred to as Java 5 - introduced generic types and methods to the Java language. The Java 5 generics are a significant enhancement to the language expressivity because they allow straightforward composition...

    Provided By University of California

  • White Papers // Aug 2009

    Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages

    Paging is an important mechanism for network bandwidth efficiency and mobile terminal battery life. It has been widely adopted by mobile networks, such as cellular networks, WiMax, and Mobile IP. Due to certain mechanisms for achieving paging efficiency and the convergence of wireless voice and data networks, the paging channel...

    Provided By University of California

  • White Papers // Aug 2009

    Measuring Privacy Risk in Online Social Networks

    Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. The authors present PrivAware, a tool to detect and report unintended information loss in online social networks. The goal is to provide a rudimentary framework to...

    Provided By University of California

  • White Papers // Oct 2008

    Exploiting Opportunistic Scheduling in Cellular Data Networks

    Third Generation (3G) cellular networks utilize time varying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, the authors demonstrate that rogue...

    Provided By University of California

  • White Papers // Nov 2011

    Learning in a Changing World: Restless Multi-Armed Bandit With Unknown Dynamics

    The authors consider the Restless Multi-Armed Bandit (RMAB) problem with unknown dynamics in which a player chooses one out of N arms to play at each time. The reward state of each arm transits according to an unknown Markovian rule when it is played and evolves according to an arbitrary...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Apr 2011

    OppSense: Information Sharing for Mobile Phones in Sensing Field With Data Repositories

    With the popularity and advancements of smart phones, mobile users can interact with the sensing facilities and exchange information with other wireless devices in the environment by short range communications. Opportunistic exchange has recently been suggested in similar contexts; yet the authors show strong evidence that, in their application, opportunistic...

    Provided By University of California

  • White Papers // Oct 2008

    AODV-BR: Backup Routing in Ad Hoc Networks

    Nodes in mobile ad hoc networks communicate with one another via packet radios on wireless multi-hop links. Because of node mobility and power limitations, the network topology changes frequently. Routing protocols therefore play an important role in mobile multi-hop network communications. A recent trend in ad hoc network routing is...

    Provided By University of California

  • White Papers // Jan 2012

    The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols

    The on-demand routing schemes in mobile ad hoc networks are appealing because of the lower routing overhead, compared with traditional proactive schemes. The on-demand routing protocols introduce routing overhead only in the presence of data packets that need routes. However, the control overhead of on-demand routing schemes increases with node...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Dec 2011

    Limitations of Scanned Human Copresence Encounters for Modelling Proximity-Borne Malware

    Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. The authors investigate errors introduced by using scanners that detect the presence of devices on the assumption that device co-presence at a scanner corresponds to...

    Provided By University of California