University of California

Displaying 321-360 of 720 results

  • White Papers // Jul 2010

    A Novel Delay-And Reliability-Aware Inter-Vehicle Routing Protocol

    Intelligent transportation systems could improve transportation safety, driving assistance and traffic management system. Vehicular Ad hoc NETwork (VANET) is an emerging field of technology, embedding wireless communication networks into vehicles to achieve intelligent transportation systems. The development of such systems pose many unique challenges like designing routing protocols that not...

    Provided By University of California

  • White Papers // Jul 2010

    EEFSim: Energy Efficiency Simulator

    Nowadays Cloud computing has emerged as one of the most promising computer paradigms. The idea of selling software as a service has promoted IT enterprises to bet for this new paradigm. Cloud computing aims to power the next generation data centers not only offering software as a service but virtual...

    Provided By University of California

  • White Papers // Jul 2010

    Provenance Based Information Trustworthiness Evaluation in Multi-Hop Networks

    In this paper, the authors present a trust model to evaluate the trustworthiness of information as well as the information publishing nodes based on the information provenance. They consider two factors in evaluating the provenance based information trust: path similarity and information similarity. In multihop networks, information can flow through...

    Provided By University of California

  • White Papers // Jul 2010

    New Advances in Self-Policing Cloud Computing

    Cloud computing is a style of computing in which dynamically scalable and often virtualized resources e.g., CPU, memory, storage, and network bandwidth are provided as a service over the Internet. This model is considered affordable for cloud users as they avoid the significant financial overheads associated with deploying, maintaining, and...

    Provided By University of California

  • White Papers // Jul 2010

    Frequency Quorum Rendezvous for Fast and Resilient Key Establishment Under Jamming Attack

    Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. Existing countermeasures often make use of spread-spectrum techniques such as Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum. Communication parties rely on a pre-shared common key (hopping sequence or spread code)...

    Provided By University of California

  • White Papers // Jul 2010

    Assessing the VANET's Local Information Storage Capability Under Different Traffic Mobility

    Wireless networking enabled vehicles can form Vehicular Ad hoc Mesh Networks (VMesh). By cooperative communication among VMeshes, a local transient information could be "Retained" within a given geographic region for a certain period of time, without any infrastructure help. In this paper, the authors study this "Storage Capability" of VMesh....

    Provided By University of California

  • White Papers // Jul 2010

    Knowledge Transfers From Multinational To Domestic Firms: Evidence From Worker Mobility

    Labor turnover is a commonly-cited mechanism for the transmission of technology from multinational to domestic firms, but until now there has been little direct evidence for this mechanism. Using a novel matched establishment-worker database from Brazil, the author presents evidence consistent with the existence of positive multinational wage spillovers through...

    Provided By University of California

  • White Papers // Jun 2010

    Does Tariff Liberalization Kick The Good Apples Out? Theory And Evidence

    This paper examines the liberalization of a common tariff when imported varieties vary in quality and cost. Varieties of higher quality and/or lower costs are imported at lower absolute demand elasticities and also to earn higher revenues. By virtue of larger demand elasticities, low revenue varieties benefit the most from...

    Provided By University of California

  • White Papers // Jun 2010

    Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems

    Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, the authors argue that one of the prominent challenges...

    Provided By University of California

  • White Papers // Jun 2010

    A Novel SLA Framework for Time-Differentiated Resilience in Optical Mesh Networks

    Telecom customers may have specific time periods during which they require extra resilience. However, these time-differentiated resilience requirements are not effectively addressed by current SLA frameworks. To satisfy these high priority periods, a generic SLA framework typically provides upgraded protection over the entire service duration, which is unnecessary and expensive....

    Provided By University of California

  • White Papers // Jun 2010

    Efficient Computation of Queueing Delay at a Network Port From Output Link Packet Traces

    Current Internet core routers provide enough buffer capacity at each output port to keep the link busy for 250 msec. to avoid disrupting TCP flows because of dropped packets. Since link speeds are rising much more quickly than the availability and cost-effectiveness of large high-speed memories, there is now significant...

    Provided By University of California

  • White Papers // Jun 2010

    Organizing Large Scale Hacking Competitions

    Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security competitions and challenges were carried out, each with different characteristics, configurations, and goals. From 2003 to 2007, the authors carried out a number of...

    Provided By University of California

  • White Papers // Jun 2010

    Cross-Language, Type-Safe, and Transparent Object Sharing for Co-Located Managed Runtimes UCSB Technical Report #2010-11 June, 2010

    As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, Object-Oriented (OO) programming languages and to architect systems that comprise multiple components. Different components are often implemented in different programming languages. In state-of-the-art multi-component, multi-language systems, cross-component communication relies...

    Provided By University of California

  • White Papers // Jun 2010

    Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices

    Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to implement multiple technologies into a single radio. This system-on-a-chip architecture leads to competition among networks when devices toggle across different technologies to communicate with multiple networks. In this paper, authors...

    Provided By University of California

  • White Papers // Jun 2010

    Multinational Firms And Trade: Gravity Versus Market Power In A Ricardian World

    Are multinational firms good for consumer welfare? The authors build a model of foreign direct investment and trade that exploits both firm heterogeneity and strategic pricing behavior, embodying direct exporting and multinational production for both export and local sale in one framework. They show that improved efficiency in target firms...

    Provided By University of California

  • White Papers // Jun 2010

    Gibbs Sampling in Open-Universe Stochastic Languages

    Languages for Open-Universe Probabilistic Models (OUPMs) can represent situations with an unknown number of objects and identity uncertainty. While such cases arise in a wide range of important real-world applications, existing general purpose inference methods for OUPMs are far less efficient than those available for more restricted languages and model...

    Provided By University of California

  • White Papers // Jun 2010

    Protecting a Moving Target: Addressing Web Application Concept Drift

    Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The reason is that these systems are able to characterize the applications' normal behavior in an automated fashion. However, anomaly-based detectors for web applications suffer from false...

    Provided By University of California

  • White Papers // Jun 2010

    Examining Energy Use in Heterogeneous Archival Storage Systems

    Controlling energy usage in data centers, and storage in particular, continues to rise in importance. Many systems and models have examined energy efficiency through intelligent spin-down of disks and novel data layouts, yet little work has been done to examine how power usage over the course of months to years...

    Provided By University of California

  • White Papers // Jun 2010

    Analyzing and Detecting Malicious Flash Advertisements

    The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe's Flash have been instrumental in creating web-based interfaces that are similar to those of traditional applications. Dynamic content has also become popular in advertising, where Flash is...

    Provided By University of California

  • White Papers // Jun 2010

    FIRE: FInding Rogue nEtworks

    For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizations such as the Russian Business Network (RBN), Atrivo (a.k.a., Intercage),McColo, and most recently, the Triple Fiber Network (3FN) operated with impunity, providing a safe haven for...

    Provided By University of California

  • White Papers // Jun 2010

    Rate-Optimal Video Transmission Over MIMO Channels

    In this paper, the authors propose a low complexity method for optimal video transmission over a quasi-static Rayleigh fading channel utilizing multiple transmit and receive antennas. Under the assumption that the total transmission bandwidth is fixed, their method jointly selects the optimal Space-Time Code (STC) with fixed and finite signal...

    Provided By University of California

  • White Papers // Jun 2010

    Accelerating Viola-Jones Face Detection to FPGA-Level Using GPUs

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. The authors present a multi-GPU implementation of the Viola-Jones face detection algorithm that meets the performance of the fastest known FPGA implementation. The GPU design offers far lower development costs, but the FPGA implementation consumes less...

    Provided By University of California

  • White Papers // Jun 2010

    Towards Practical Taint Tracking

    This paper proposes several technical measures that significantly improve performance and largely limit kernel taint explosion in a XEN- and QEMU-based taint tracking system. Full-system, fine-grained taint tracking is a fundamental primitive that can be used for a number of purposes, most notably for tracking the flow of information through...

    Provided By University of California

  • White Papers // Jun 2010

    Data Privacy With Multi-Function Printers, Printers and Copiers

    Hard drives have become prevalent temporary or static storage components within many print devices. In fact, most copiers and multi-function printers manufactured since 2005 have hard drives. While the campus Cyber-safety program has, to date, focused on computer and network security, the focus needs to be expanded to include hard...

    Provided By University of California

  • White Papers // Jun 2010

    Financial Constraints And Innovation: Why Poor Countries Dont Catchup

    The authors examine micro-level channels of how financial development can affect macroeconomic outcomes like the level of income and export intensity. They investigate theoretically and empirically how financial constraints affect a firm's innovation and export activities, using unique firm survey data which provides direct measures for innovations and firm-specific financial...

    Provided By University of California

  • White Papers // May 2010

    P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust Against Malicious Users

    In this paper the authors introduce a framework for privacy preserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy (P4P) and features a novel heterogeneous architecture and a number of efficient tools for performing private computation and ensuring security at large scale....

    Provided By University of California

  • White Papers // May 2010

    Spark: Cluster Computing With Working Sets

    MapReduce and its variants have been highly successful in implementing large-scale data-intensive applications on commodity clusters. However, most of these systems are built around an acyclic data flow model that is not suitable for other popular applications. This paper focuses on one such class of applications: those that reuse a...

    Provided By University of California

  • White Papers // May 2010

    Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center

    This paper present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI 1. Sharing improves cluster utilization and avoids per-framework data replication. Mesos shares resources in a fine-grained manner, allowing frameworks to achieve data locality by taking turns reading data stored...

    Provided By University of California

  • White Papers // May 2010

    Measuring Online Service Availability Using Twitter

    Real-time micro-blogging services such as Twitter are widely recognized for their social dynamics - how they both encapsulate a social graph and propagate information across it. However, the content of this information is equally interesting since it frequently reflects individual experiences with a broad variety of real-time events. Indeed, events...

    Provided By University of California

  • White Papers // May 2010

    An Empirical Study of the Control and Data Planes (or Control Plane Determinism Is Key for Replay Debugging Data center Applications)

    Replay debugging systems enable the reproduction and debugging of non-deterministic failures in production application runs. However, no existing replay system is suitable for datacenter applications like Cassandra, Hadoop, and Hypertable. For these large scale, distributed, and data intensive programs, existing methods either incur excessive production overheads or don't scale to...

    Provided By University of California

  • White Papers // May 2010

    Towards an Efficient Distributed Object Recognition System in Wireless Smart Camera Networks

    The authors propose an efficient distributed object recognition system for sensing, compression, and recognition of 3-D objects and landmarks using a network of wireless smart cameras. The foundation is based on a recent work that shows the representation of scale-invariant image features exhibit certain degree of sparsity: if a common...

    Provided By University of California

  • White Papers // May 2010

    FDI In The Banking Sector

    It is a well known quandary that when countries open their financial sectors, foreign-owned banks appear to bring superior efficiency to their host markets but also charge higher markups on borrowed funds than their domestically owned rivals, with unknown impacts on interest rates and welfare. Using heterogeneous, imperfectly competitive lenders,...

    Provided By University of California

  • White Papers // May 2010

    Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing

    Data center cloud computing distinguishes computational services such as database transactions and data storage from computational resources such as server farms and disk arrays. Cloud computing enables a software-as-a-service business model where clients may only pay for the service they really need and providers may fully utilize the resources they...

    Provided By University of California

  • White Papers // May 2010

    The Emperor's New APIs: On the (In)Secure Usage of New Client-Side Primitives

    Several new browser primitives have been proposed to meet the demands of application interactivity while enabling security. To investigate whether applications consistently use these primitives safely in practice, the authors study the real-world usage of two client-side primitives, namely postMessage and HTML5's client-side database storage. They examine new purely client-side...

    Provided By University of California

  • White Papers // May 2010

    DBTaint: Cross-Application Information Flow Tracking Via Databases

    Information flow tracking has been an effective approach for identifying malicious input and detecting software vulnerabilities. However, most current schemes can only track data within a single application. This single application approach means that the program must consider data from other programs as either all tainted or all untainted, inevitably...

    Provided By University of California

  • White Papers // May 2010

    Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications

    The IEEE 1609.4 standard has been proposed to provide multi-channel operations in Wireless Access for Vehicular Environments (WAVE), where all the channels are periodically synchronized into control and service intervals. The communication device in each vehicle will stay at the control channel for negotiation and contention during the control interval,...

    Provided By University of California

  • White Papers // May 2010

    An Evaluation of Distributed Datastores Using the AppScale Cloud Platform

    The authors present new cloud support that employs a single API the Datastore API from Google App Engine (GAE) to interface to different open source distributed database technologies. They employ this support to "Plug in" these technologies to the API so that they can be used by web applications and...

    Provided By University of California

  • White Papers // May 2010

    Beyond Multi-Hop: Optimal Cooperation in Large Wireless Networks

    Multi-hop is the communication architecture of current wireless networks such as mesh or ad hoc networks. Packets are sent from each source to its destination via multiple point-to-point transmissions between relaying nodes. The origins of this approach are rooted in the practice of traditional wire-line networks. Today, the increasing need...

    Provided By University of California

  • White Papers // May 2010

    Is the Internet for Porn? an Insight Into the Online Adult Industry

    The online adult industry is among the most profitable business branches on the Internet, and its web sites attract large amounts of visitors and traffic. Nevertheless, no study has yet characterized the industry's economical and security-related structure. As cyber-criminals are motivated by financial incentives, a deeper understanding and identification of...

    Provided By University of California

  • White Papers // May 2010

    Secure Cooperative Sharing of JavaScript, Browser, and Physical Resources

    For better application-level controls on mashups, they advocate extending the Single Origin Policy and associated primitives to support a cooperative model that allows applications to express explicit sharing policies over browser, Javascript, and physical resources. First, the authors introduce an isolation model for content loading that is more complete than...

    Provided By University of California

  • White Papers // Jan 2009

    Why Is Evaluating Usability of Privacy Designs so Hard? Lessons Learned From a User Study of PRISM

    Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privacy...

    Provided By University of California

  • White Papers // Oct 2009

    Enhancing Privacy Management Support in Instant Messaging

    Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. In-adequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits. The authors conducted interviews and an Internet survey to...

    Provided By University of California

  • White Papers // Jan 2011

    Balancing Computation and Code Distribution Costs: The Case for Hybrid Execution in Sensor Networks

    Virtual Machines (VM) are promising as system software in networks of embedded systems and pervasive computing spaces. VMs facilitate the development of platform-independent applications with small footprints to enable low cost application distribution and evolution. A major impediment to their more widespread acceptance is the performance overhead of interpretation. Compiling...

    Provided By University of California

  • White Papers // Jan 2011

    Remote Incremental Linking for Energy-Efficient Reprogramming of Sensor Networks

    With sensor networks expected to be deployed for long periods of time, the ability to reprogram them remotely is necessary for providing new services, fixing bugs, and enhancing applications and system software. Given the envisioned scales of future sensor network deployments, their restricted accessibility, and the limited energy and computing...

    Provided By University of California

  • White Papers // Oct 2009

    XML-Based Computation for Scientific Workflows

    Scientific workflows are increasingly used for rapid integration of existing algorithms to form larger and more complex programs. Such workflows promise to provide more abstract, yet executable views of data analyses through graphs of components representing computational tasks and edges representing the data-flow between tasks. However, designing workflows using purely...

    Provided By University of California

  • White Papers // Jan 2011

    Visualizing Online News Reporting For Public Display

    The authors describe the iterative design and implementation of "Spheres of Influence," an interactive digital multimedia installation in a public space that visualizes the spatial, temporal, and semantic dimensions of online international news reporting. The installation invites the casual passerby to explore a continually growing collection of up-to-the-minute news reports...

    Provided By University of California

  • White Papers // Jan 2011

    IPv4 Address Allocation and the BGP Routing Table Evolution

    The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. This paper quantitatively characterize the IPv4 ad-dress allocations made over the past six years and the global BGP routing table size changes during the same period of time. About 63,000...

    Provided By University of California

  • White Papers // Feb 2010

    Speculative Trade Under Unawareness: The Infinite Case

    The authors generalize the "No-Trade" theorem for finite unawareness belief structures in Heifetz, Meier, and Schipper (2009) to the in finite case. Unawareness refers to the lack of conception rather than to the lack of information. It is natural to presume that asymmetric unawareness may lead to speculative trade. Indeed,...

    Provided By University of California

  • White Papers // May 2010

    FDI In The Banking Sector

    It is a well known quandary that when countries open their financial sectors, foreign-owned banks appear to bring superior efficiency to their host markets but also charge higher markups on borrowed funds than their domestically owned rivals, with unknown impacts on interest rates and welfare. Using heterogeneous, imperfectly competitive lenders,...

    Provided By University of California

  • White Papers // Oct 2009

    A Theory Of Banks, Bonds, And The Distribution Of Firm Size

    The authors draw on stylized facts from the finance literature to build a model where altering the relative costs of bank and bond financing changes the entire distribution of firm size, with implications for the aggregate capital stock, output, and welfare. Reducing transactions costs in the bond market increases the...

    Provided By University of California

  • White Papers // Dec 2010

    Path-Based Inductive Synthesis for Program Inversion

    In this paper, the authors investigate the problem of semi-automated inversion of imperative programs, which has the potential to make it much easier and less error prone to write programs that naturally pair as inverses, such as insert/delete operations, compressors/ decompressors, and so on. Viewing inversion as a sub-problem of...

    Provided By University of California

  • White Papers // Jun 2009

    Noise Injection for Search Privacy Protection

    To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining, require a server-side deployment, thus users have little control over their data and privacy. In this paper the authors propose a user-side solution within the context of keyword...

    Provided By University of California

  • White Papers // Aug 2009

    Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages

    Paging is an important mechanism for network bandwidth efficiency and mobile terminal battery life. It has been widely adopted by mobile networks, such as cellular networks, WiMax, and Mobile IP. Due to certain mechanisms for achieving paging efficiency and the convergence of wireless voice and data networks, the paging channel...

    Provided By University of California

  • White Papers // Aug 2009

    Measuring Privacy Risk in Online Social Networks

    Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. The authors present PrivAware, a tool to detect and report unintended information loss in online social networks. The goal is to provide a rudimentary framework to...

    Provided By University of California

  • White Papers // Nov 2011

    Learning in a Changing World: Restless Multi-Armed Bandit With Unknown Dynamics

    The authors consider the Restless Multi-Armed Bandit (RMAB) problem with unknown dynamics in which a player chooses one out of N arms to play at each time. The reward state of each arm transits according to an unknown Markovian rule when it is played and evolves according to an arbitrary...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Apr 2011

    OppSense: Information Sharing for Mobile Phones in Sensing Field With Data Repositories

    With the popularity and advancements of smart phones, mobile users can interact with the sensing facilities and exchange information with other wireless devices in the environment by short range communications. Opportunistic exchange has recently been suggested in similar contexts; yet the authors show strong evidence that, in their application, opportunistic...

    Provided By University of California

  • White Papers // Jan 2012

    The Selective Intermediate Nodes Scheme for Ad Hoc On-Demand Routing Protocols

    The on-demand routing schemes in mobile ad hoc networks are appealing because of the lower routing overhead, compared with traditional proactive schemes. The on-demand routing protocols introduce routing overhead only in the presence of data packets that need routes. However, the control overhead of on-demand routing schemes increases with node...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Dec 2011

    Limitations of Scanned Human Copresence Encounters for Modelling Proximity-Borne Malware

    Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. The authors investigate errors introduced by using scanners that detect the presence of devices on the assumption that device co-presence at a scanner corresponds to...

    Provided By University of California

  • White Papers // Oct 2011

    Topic Modeling of Freelance Job Postings to Monitor Web Service Abuse

    Web services such as Google, Facebook, and Twitter are recurring victims of abuse, and their plight will only worsen as more attackers are drawn to their large user bases. Many attackers hire cheap, human labor to actualize their schemes, connecting with potential workers via crowd-sourcing and freelancing sites such as...

    Provided By University of California

  • White Papers // Jul 2011

    Dirty Jobs: The Role of Freelance Labor in Web Service Abuse

    Modern Web services inevitably engender abuse, as attackers find ways to exploit a service and its user base. However, while defending against such abuse is generally considered a technical endeavor, the authors argue that there is an increasing role played by human labor markets. Using over seven years of data...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Dec 2011

    Dynamic Intrusion Detection in Resource-Constrained Cyber Networks

    The objective of Intrusion Detection Systems (IDS) is to locate malicious activities (e.g., denial of service attack, port scans, hackers) in the quickest way such that the infected parts can be timely fixed to minimize the overall damage to the network. With the increasing size, diversity, and interconnectivity of the...

    Provided By University of California

  • White Papers // Sep 2011

    Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems

    In the Multi-Armed Bandit (MAB) problem, there is a given set of arms with unknown reward models. At each time, a player selects one arm to play, aiming to maximize the total expected reward over a horizon of length T. An approach based on a Deterministic Sequencing of Exploration and...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Feb 2011

    A Stateless Traceback Technique for Identifying the Origin of Attacks From a Single Packet

    Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prove its authenticity. In this paper, the authors propose a stateless IP traceback technique that identifies the origin network of each individual...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Jun 2009

    P2P Streaming Systems: A Survey and Experiments

    The great success of P2P systems for the purpose of file-sharing has set the path to likely be the next killer-app over the Internet, once the video streaming technology matures. Although solving scalability issues, P2P technology experiences problems of long start-time and churn-induced instability which can heavily affect the user...

    Provided By University of California

  • White Papers // Jul 2010

    On Developing Smart Applications for VANETs: Where Are We Now? Some Insights on Technical Issues and Open Problems

    The advances in research on ad hoc networks, the availability of cheap radio interfaces (e.g. Wi-Fi) and the increasing amount of electronic devices installed in vehicles have set the path for vehicular ad hoc networks. In the past few years, Vehicular Ad hoc NETwork (VANET) research has addressed all layers,...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California