University of California

Displaying 1-40 of 796 results

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Jan 2012

    Distributed Measurement-Aware Routing: Striking a Balance Between Measurement and Traffic Engineering

    Network-wide traffic measurement is important for various network management tasks, ranging from traffic accounting, traffic engineering, and network troubleshooting to security. Existing techniques for traffic measurement tend to be sub-optimal due to poor choice of monitor deployment location or due to constantly evolving monitoring objectives and traffic characteristics. It is...

    Provided By University of California

  • White Papers // Jan 2012

    Efficient Synthesis of Networks on Chip

    The authors propose an efficient heuristic for the Constraint-Driven Communication Synthesis (CDCS) of on-chip communication networks. The complexity of the synthesis problems comes from the number of constraints that have to be considered. In this paper, they propose to cluster constraints to reduce the number that needs to be considered...

    Provided By University of California

  • White Papers // Jan 2012

    Effective and Efficient Localization of Multiple Faults Using Value Replacement

    The authors previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement. The technique searches for program statements involving values that can be altered during runtime to cause the incorrect output of a failing run to become...

    Provided By University of California

  • White Papers // Jan 2012

    BugFix: A Learning-Based Tool to Assist Developers in Fixing Bugs

    The authors present a tool called BugFix that can assist developers in fixing program bugs. Their tool automatically analyzes the debugging situation at a statement and reports a prioritized list of relevant bug-fix suggestions that are likely to guide the developer to an appropriate fix at that statement. BugFix incorporates...

    Provided By University of California

  • White Papers // Jun 2009

    A Measurement Driven, 802.11 Anti-Jamming System

    Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, the authors first conduct extensive experiments on an indoor 802.11 network to assess the ability of...

    Provided By University of California

  • White Papers // Sep 2010

    Identifying BGP Routing Table Transfers

    BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to the understanding of the global routing system. However the collected BGP data contains both the updates generated by actual route changes, and the updates of BGP routing table transfers resulted from BGP...

    Provided By University of California

  • White Papers // Sep 2008

    Reducing Transient Disconnectivity Using Anomaly- Cognizant Forwarding

    It is well known that BGP convergence can cause widespread temporary losses of connectivity resulting from inconsistent routing state. In this paper, the authors present Anomaly-Cognizant Forwarding (ACF) - a novel technique for protecting end-to-end packet delivery during periods of convergence. The preliminary evaluation demonstrates that ACF succeeds in eliminating...

    Provided By University of California

  • White Papers // Jun 2009

    Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations

    Security protocols often use randomization to achieve probabilistic non-determinism. This non-determinism, in turn, is used in obfuscating the dependence of observable values on secret data. Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature. Randomized security protocols have also...

    Provided By University of California

  • White Papers // Sep 2009

    Distributed Random Access Algorithm: Scheduling and Congesion Control

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict...

    Provided By University of California

  • White Papers // Jul 2009

    Incorporating Integrity Constraints in Uncertain Databases

    The authors develop an approach to incorporate additional knowledge, in the form of general-purpose Integrity Constraints (ICs), to reduce uncertainty in probabilistic databases. While incorporating ICs improves data quality (and hence quality of answers to a query), it significantly complicates query processing. To overcome the additional complexity, they develop an...

    Provided By University of California

  • White Papers // Jan 2011

    The Case for Efficient File Access Pattern Modeling

    Most modern I/O systems treat each file access independently. However, events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and are by no means independent. The result is that modern I/O systems ignore useful information. Using traces of file system activity the...

    Provided By University of California

  • White Papers // Oct 2008

    Privacy-Enhanced Web Personalization

    Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people's interaction entails gathering considerable amounts of data about them. As numerous recent surveys have consistently...

    Provided By University of California

  • White Papers // Apr 2009

    Facilitating Controlled Tests of Website Design Changes: A Systematic Approach

    Controlled online experiments in which envisaged changes to a web site are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort. This paper...

    Provided By University of California

  • White Papers // Apr 2009

    Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences

    To understand how collaborators reconcile the often conflicting needs of awareness and privacy, the authors studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. They present a theoretical framework describing privacy management practices and their determinants that emerged from field...

    Provided By University of California

  • White Papers // May 2009

    Ad as You Go: A Study of Ad Placement on Personal Navigation Devices

    Mobile advertising (M-advertising) is an emergent trend in the marketing world. "M-advertising enables not only the sending of unique, personalized, and customized adverts, but also the ability to engage consumers in interactions with the sender of the message." Cell phones, PDAs, and other mobile devices have been tapped to exercise...

    Provided By University of California

  • White Papers // Jul 2009

    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods

    Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods...

    Provided By University of California

  • White Papers // Dec 2009

    Privacy in Online Social Networking at Workplace

    Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...

    Provided By University of California

  • White Papers // Apr 2009

    Facilitating Controlled Tests of Website Design Changes Using Aspect-Oriented Software Development and Software Product Lines

    Controlled online experiments in which envisaged changes to a website are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort. This paper advocates...

    Provided By University of California

  • White Papers // Apr 2009

    Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites

    Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, the authors proposed a dynamic privacy-enhancing user modeling framework based on a software Product Line Architecture (PLA). The system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well...

    Provided By University of California

  • White Papers // Jan 2009

    Why Is Evaluating Usability of Privacy Designs so Hard? Lessons Learned From a User Study of PRISM

    Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privacy...

    Provided By University of California

  • White Papers // Oct 2009

    Enhancing Privacy Management Support in Instant Messaging

    Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. In-adequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits. The authors conducted interviews and an Internet survey to...

    Provided By University of California

  • White Papers // Jan 2011

    Balancing Computation and Code Distribution Costs: The Case for Hybrid Execution in Sensor Networks

    Virtual Machines (VM) are promising as system software in networks of embedded systems and pervasive computing spaces. VMs facilitate the development of platform-independent applications with small footprints to enable low cost application distribution and evolution. A major impediment to their more widespread acceptance is the performance overhead of interpretation. Compiling...

    Provided By University of California

  • White Papers // Jan 2011

    Remote Incremental Linking for Energy-Efficient Reprogramming of Sensor Networks

    With sensor networks expected to be deployed for long periods of time, the ability to reprogram them remotely is necessary for providing new services, fixing bugs, and enhancing applications and system software. Given the envisioned scales of future sensor network deployments, their restricted accessibility, and the limited energy and computing...

    Provided By University of California

  • White Papers // Oct 2009

    XML-Based Computation for Scientific Workflows

    Scientific workflows are increasingly used for rapid integration of existing algorithms to form larger and more complex programs. Such workflows promise to provide more abstract, yet executable views of data analyses through graphs of components representing computational tasks and edges representing the data-flow between tasks. However, designing workflows using purely...

    Provided By University of California

  • White Papers // Jan 2011

    Timing Analysis of Keystrokes and Timing Attacks on SSH

    SSH is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has two weakness: First, the transmitted packets are padded only to an eight-byte boundary (if a block cipher is in use), which reveals the approximate size of the original data....

    Provided By University of California

  • White Papers // Oct 2009

    Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels

    This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and the authors examine both the broadcast...

    Provided By University of California

  • White Papers // Nov 2009

    A Simple Conceptual Generator for the Internet Graph

    The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing...

    Provided By University of California

  • White Papers // Nov 2009

    Feeds as Query Result Serializations

    Many Web-based data sources and services are available as feeds, a model that provides consumers with a loosely coupled way of interacting with providers. The current feed model is limited in its capabilities, however. Though it is simple to implement and scales well, it cannot be transferred to a wider...

    Provided By University of California

  • White Papers // Jan 2011

    The SQL-Based All-Declarative FORWARD Web Application Development Framework

    The vast majority of database-driven web applications perform, at a logical level, fundamentally simple Insert/Update/Delete commands. In response to a user action on the browser, the web application executes a program that transitions the old state to a new state. The state is primarily persistent and often captured in a...

    Provided By University of California

  • White Papers // Jul 2010

    Comprehending Environmental And Economic Sustainability: Comparative Analysis Of Stability Principles In The Biosphere And Free Market Economy

    Using the formalism of Lyapunov potential function it is shown that the stability principles for biomass in the ecosystem and for employment in economics are mathematically similar. The ecosystem is found to have a stable and an unstable stationary state with high (forest) and low (grasslands) biomass, respectively. In economics,...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship Between Web Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // Jan 2010

    Preventing Capability Leaks in Secure JavaScript Subsets

    Publishers wish to sandbox third-party advertisements to protect themselves from malicious advertisements. One promising approach used by ADsafe, Dojo Secure, and Jacaranda, sandboxes advertisements by statically verifying that their JavaScript conforms to a safe subset of the language. These systems blacklist known dangerous properties that would let advertisements escape the...

    Provided By University of California

  • White Papers // May 2009

    Achieving Linear Scaling With Interference Alignment

    Recent results have shown that interference alignment can achieve K/2 degrees of freedom in a K-user interference channel with time or frequency varying channel coefficients. For fixed number of users K, the number of degrees of freedom characterizes the asymptotic behavior of the performance in the high SNR limit but...

    Provided By University of California

  • White Papers // Jan 2011

    Cryptographic Voting Protocols: A Systems Perspective

    Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and they must analyze their security by considering...

    Provided By University of California

  • White Papers // Jan 2011

    Distillation Codes and Applications to DoS Resistant Multicast Authentication

    The authors introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast to erasure codes, distillation codes are robust against pollution attacks, a powerful class of Denial of Service (DoS) attacks...

    Provided By University of California

  • White Papers // Jan 2011

    Hidden Markov Model Cryptanalysis

    The authors present HMM attacks, a new type of cryptanalysis based on modeling randomized side channel countermeasures as Hidden Markov Models (HMM's). They also introduce Input Driven Hidden Markov Models (IDHMM's), a generalization of HMM's that provides a powerful and unified cryptanalytic framework for analyzing countermeasures whose operational behavior can...

    Provided By University of California

  • White Papers // May 2009

    The VIKING Project: An Initiative on Resilient Control of Power Networks

    This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system manaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. The authors will present the consortium, the motivation behind this research, the main objective...

    Provided By University of California

  • White Papers // Feb 2010

    Estimating Time Preferences From Convex Budgets

    Experimentally elicited discount rates are frequently higher than what one would infer from market interest rates and seem unreasonable for economic decision-making. Such high rates have often been attributed to dynamic inconsistency, as in present bias and hyperbolic discounting. A commonly recognized bias of standard elicitation techniques is the use...

    Provided By University of California

  • White Papers // Jan 2010

    Risk Preferences Are Not Time Preferences

    Risk and time are intertwined. The present is known while the future is inherently risky. Discounted expected utility provides a simple, coherent structure for analyzing decisions in intertemporal, uncertain environments. Critical to such analysis is the notion that certain and uncertain utility are functionally interchangeable. The authors document an important...

    Provided By University of California

  • White Papers // Jan 2010

    Certain And Uncertain Utility: The Allais Paradox And Five Decision Theory Phenomena

    In the study of decision making under risk, preferences are assumed to be continuous. The authors present a model of discontinuous preferences over certain and uncertain outcomes. Using existing parameter estimates for certain and uncertain utility, five important decision theory phenomena are discussed: the certainty effect, experimentally observed probability weighting,...

    Provided By University of California

  • White Papers // Apr 2009

    The Empirics Of China's Outward Direct Investment

    The authors investigate the empirical determinants of China's Outward Direct Investment (ODI). It is found that China's investments in developed and developing countries are driven by different sets of factors. Subject to the differences between developed and developing countries, there is evidence that both market seeking and resources seeking motives...

    Provided By University of California

  • White Papers // Apr 2010

    The Challenge of Heterogeneously Licensed Systems in Open Architecture Software Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. But this...

    Provided By University of California

  • White Papers // Jul 2009

    The Role of Software Licenses in Open Architecture Ecosystems

    The role of software ecosystems in the development and evolution of open architecture systems has received insufficient consideration. Such systems are composed of heterogeneously-licensed components, open source or proprietary or both, in an architecture in which evolution can occur by evolving existing components or by replacing them. The software licenses...

    Provided By University of California

  • White Papers // Dec 2009

    Collaboration Practices and Affordances in Free/Open Source Software Development

    This paper examines collaborative work practices, development processes, project and community dynamics, and other socio-technical relationships in Free and Open Source Software Development (FOSSD). It also describes what kinds of collaboration affordances facilitate collaborative work in FOSSD projects. It reviews a set of empirical studies of FOSSD that articulate different...

    Provided By University of California