University of California

Displaying 1-40 of 583 results

  • White Papers // Feb 2015

    Task Scheduling Strategies to Mitigate Hardware Variability in Embedded Shared Memory Clusters

    Manufacturing and environmental variations cause timing errors that are typically avoided by conservative design guardbands or corrected by circuit level error detection and correction. These measures incur energy and performance penalties. This paper considers methods to reduce this cost by expanding the scope of variability mitigation through the software stack....

    Provided By University of California

  • White Papers // Jan 2015

    Algebra-Based Identification of Tree Patterns in XQuery

    Query processing performance in XML databases can be greatly enhanced by the usage of materialized views whose content has been stored in the database. This requires a method for identifying query subexpressions matching the views, a process known as view-based query rewriting. This process is quite complex for relational databases,...

    Provided By University of California

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Nov 2014

    Approximate Associative Memristive Memory for Energy-Efficient GPUs

    Multimedia applications running on thousands of deep and wide pipelines working concurrently in GPUs have been an important target for power minimization both at the architectural and algorithmic levels. At the hardware level, energy-efficiency techniques that employ voltage overscaling face a barrier so-called "Path walls": reducing operating voltage beyond a...

    Provided By University of California

  • White Papers // Feb 2014

    Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to Task-level Approach

    Variation in performance and power across manufactured parts and their operating conditions is an accepted reality in aggressive CMOS (Complementary Metal-Oxide-Semiconductor) processes. This paper considers challenges and opportunities in identifying this variation and methods to combat or even use these variations for improved computing systems. The authors introduce the notion...

    Provided By University of California

  • White Papers // Dec 2013

    Temporal Memoization for Energy-Efficient Timing Error Recovery in GPGPUs

    Manufacturing and environmental variability lead to timing errors in computing systems that are typically corrected by error detection and correction mechanisms at the circuit level. The cost and speed of recovery can be improved by memoization-based optimization methods that exploit spatial or temporal parallelisms in suitable computing fabrics such as...

    Provided By University of California

  • White Papers // Dec 2013

    Declarative Ajax Web Applications through SQL++ on a Unified Application State

    Implementing even a conceptually simple web application requires an inordinate amount of time. Forward addresses three problems that reduce developer productivity: impedance mismatch across the multiple languages used at different tiers of the application architecture. Distributed data access across the multiple data sources of the application (user input of the...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // Dec 2012

    Variation-tolerant OpenMP Tasking on Tightly-coupled Processor Clusters

    In this paper, the authors present a variation-tolerant tasking technique for tightly-coupled shared memory processor clusters that relies upon modeling advance across the hardware/software interface. This is implemented as an extension to the OpenMP 3.0 tasking programming model. Using the notion of Task-Level Vulnerability (TLV) proposed here, they capture dynamic...

    Provided By University of California

  • White Papers // Dec 2012

    Hierarchically Focused Guardbanding: An Adaptive Approach to Mitigate PVT Variations and Aging

    In this paper, the authors proposes a new model of functional units for variation-induced timing errors due to PVT variations and device Aging (PVTA). The model takes into account PVTA parameter variations, clock frequency and the physical details of Placed-and-Routed (P&R) functional units in 45nm TSMC analysis flow. Using this...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Aug 2009

    Integrating Marine Observatories Into a System-of-Systems: Messaging in the US Ocean Observatories Initiative

    The Ocean Observatories Initiative (OOI) will implement ocean sensor networks covering a diversity of oceanic environments, ranging from the coastal to the deep ocean. Construction will begin in Fall 2009, with deployment phased over five years. The integrating feature of the OOI is a comprehensive Cyberinfrastructure (CI), whose design is...

    Provided By University of California

  • White Papers // Sep 2010

    Streaming Satellite Data to Cloud Workflows for On-Demand Computing of Environmental Products

    Environmental data arriving constantly from satellites and weather stations are used to compute weather coefficients that are essential for agriculture and viticulture. For example, the reference evapotranspiration (ET0) coefficient, overlaid on regional maps, is provided each day by the California Department of Water Resources to local farmers and turf managers...

    Provided By University of California

  • White Papers // Oct 2009

    Australasian Accounting Business And Finance Journal

    During the Great Depression, one third of all banks in the United States failed. Scholars dispute reason for their demise. This essay analyzes new evidence on the sources of bank distress. The data demonstrates that contagion via correspondent networks and bank runs propagated the initial banking panics in the fall...

    Provided By University of California

  • White Papers // Mar 2010

    The ProximalWorkspace Architecture: A Latency-Focused Approach to Supporting Context-Aware Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, and applications that represent a new generation of computation-and-data-intensive programs. They are developing a new system architecture based on supporting workspaces which provide nearby computing power to...

    Provided By University of California

  • White Papers // Mar 2010

    Towards a Proximal Resource-Based Architecture to Support Augmented Reality Applications

    The authors are developing a new enhanced cloud-based computing architecture, called the Proximal Workspace architecture to allow access and interaction between lightweight devices, e.g., video glasses, earphones, wrist displays, body sensors, etc., and applications that represent a new generation of computation and-data-intensive programs in areas such as augmented reality. While...

    Provided By University of California

  • White Papers // Mar 2010

    When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

    Random Number Generators (RNGs) are consistently a weak link in the secure use of cryptography. Routine cryptographic operations such as encryption and signing can fail spectacularly given predictable or repeated randomness, even when using good long-lived key material. This has proved problematic in prior settings when RNG implementation bugs, poor...

    Provided By University of California

  • White Papers // May 2011

    FingerGlass: Efficient Multiscale Interaction on Multitouch Screens

    Many tasks in graphical user interfaces require users to interact with elements at various levels of precision. The authors present FingerGlass, a bimanual technique designed to improve the precision of graphical tasks on multitouch screens. It enables users to quickly navigate to different locations and across multiple scales of a...

    Provided By University of California

  • White Papers // Jan 2010

    Fisheye State Routing in Mobile Ad Hoc Networks

    In this paper, the authors present a novel routing protocol for wireless ad hoc networks - Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on...

    Provided By University of California

  • White Papers // Jan 2010

    The Role Of Search Engine Optimization In Search Rankings

    Web sites invest significant resources in trying to influence their visibility among online search results. In addition to paying for sponsored links, they invest in methods known as search engine optimization (SEO). The authors study the economic incentives of Web sites to invest in SEO and its implications on visitor...

    Provided By University of California

  • White Papers // Jan 2011

    Host Multicast: A Framework for Delivering Multicast to End Users

    While the advantages of multicast delivery over multiple unicast deliveries is undeniable, the deployment of the IP multicast protocol has been limited to "Islands" of network domains under single administrative control. Deployment of inter-domain multicast delivery has been slow due to both technical and administrative reasons. In this paper the...

    Provided By University of California

  • White Papers // Jun 2010

    Does Tariff Liberalization Kick The Good Apples Out? Theory And Evidence

    This paper examines the liberalization of a common tariff when imported varieties vary in quality and cost. Varieties of higher quality and/or lower costs are imported at lower absolute demand elasticities and also to earn higher revenues. By virtue of larger demand elasticities, low revenue varieties benefit the most from...

    Provided By University of California

  • White Papers // Jun 2010

    Accelerating Viola-Jones Face Detection to FPGA-Level Using GPUs

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. The authors present a multi-GPU implementation of the Viola-Jones face detection algorithm that meets the performance of the fastest known FPGA implementation. The GPU design offers far lower development costs, but the FPGA implementation consumes less...

    Provided By University of California

  • White Papers // Aug 2009

    Implementation and Evaluation of a Mobile PlanetLab Node

    With the introduction of cellular phones, mobile wireless communication has become an integral part of day-to-day life in this century. A testbed is crucial in continuing cutting-edge wireless technology research and development since physical and MAC layers in mobile wireless communication have many parameters pertinent to performance that are often...

    Provided By University of California

  • White Papers // Aug 2010

    Inter-Socket Victim Cacheing for Platform Power Reduction

    On a multi-socket architecture with load below peak, as is often the case in a server installation, it is common to consolidate load onto fewer sockets to save processor power. However, this can increase main memory power consumption due to the decreased total cache space. This paper describes inter-socket victim...

    Provided By University of California

  • White Papers // Jan 2011

    Optimal Communication Complexity of Generic Multicast Key Distribution

    The authors prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager are obtained by arbitrarily nested application of a symmetric encryption scheme, with random or pseudorandom keys. The lower bound shows that for any group of size n,...

    Provided By University of California

  • White Papers // Jan 2011

    Soundness of Formal Encryption in the Presence of Active Adversaries

    Cryptographic protocols are a fundamental tool in the design of secure distributed computing systems, but they are also extremely hard to design and validate. The difficulty of designing valid cryptographic protocols stems mostly from the fact that security properties should remain valid even when the protocol is executed in an...

    Provided By University of California

  • White Papers // Jan 2011

    Generating Tests From Counterexamples

    The authors have extended the software model checker BLAST to automatically generate test suites that guarantee full coverage with respect to a given predicate. More precisely, given a C program and a target predicate, BLAST determines the set of program locations which program execution can reach with true, and automatically...

    Provided By University of California

  • White Papers // Jan 2011

    Secure IP Telephony Using Multi-Layered Protection

    This paper presents the design and analysis of a multilayer protection scheme against Denial-of-Service (DoS) attacks in IP telephony enabled enterprise networks. While there are many types of DoS attacks, the authors focus on flood-based attacks using application layer and transport layer signaling messages in IP telephony. They design sensors...

    Provided By University of California

  • White Papers // Dec 2009

    Immigration, Offshoring And American Jobs

    Increased immigration and offshoring over the last decades has generated deep concerns about the effect of both phenomena on the jobs of American workers. How many "American" jobs are lost due to immigration and offshoring? Or is it possible, instead, that immigration and offshoring, by promoting cost-savings and enhanced efficiency...

    Provided By University of California

  • White Papers // Dec 2010

    A Meta-Notation for Data Visualization

    The authors describe a meta-notation devised to express the major structural characteristics in widely-used data visualizations. The meta-notation consists of unary and binary operators that can be combined to represent a visualization. Capturing structural features of a visualization, the meta-notation can be applied to match or compare two visualizations at...

    Provided By University of California

  • White Papers // Aug 2009

    Global Slack And Domestic Inflation Rates: A Structural Investigation For G-7 Countries

    Recent papers have argued that one implication of globalization is that domestic inflation rates may have now become more a function of "Global", rather than domestic, economic conditions, as postulated by closed-economy Phillips curves. This paper aims to assess the empirical importance of global output in determining domestic inflation rates...

    Provided By University of California

  • White Papers // Jan 2011

    Data Mining by Navigation - An Experience with Systems Biology

    This paper proposes a navigational method for mining by collecting evidences from diverse data sources. Since the representation method and even semantics of data elements differ widely from one data source to the other, consolidation of data under a single platform doesn't become cost effective. Instead, this paper has proposed...

    Provided By University of California

  • White Papers // Oct 2009

    Privacy Concerns in Upcoming Demand-Response Systems

    The collection of power consumption data in current and future demand-response systems creates serious privacy concerns. In a lax regulatory environment, the detailed household consumption data gathered by advanced metering projects is likely to be repurposed by interested parties to reveal personally identifying information, including an individual's activities, preferences, and...

    Provided By University of California

  • White Papers // Jan 2011

    A Bayesian Network Framework for Reject Inference

    Most learning methods assume that the training set is drawn randomly from the population to which the learned model is to be applied. However in many applications this assumption is invalid. For example, lending institutions create models of who is likely to repay a loan from training sets consisting of...

    Provided By University of California

  • White Papers // Jan 2011

    A Secure, Publisher-Centric Web Caching Infrastructure

    The current web caching infrastructure, though it has a number of performance benefits for clients and network providers, does not meet publishers' requirements. The authors argue that to satisfy these requirements, caches should be enhanced in both the data and control planes. In the data plane, caches will dynamically generate...

    Provided By University of California

  • White Papers // Apr 2010

    The Rise And Fall Of The Nonconventional Mortgage Industry

    The 2007-2009 financial crises were centered on the nonconventional mortgage industry. Scholars have just begun to carefully consider what really caused the crisis. This paper pushes the debate forward in several ways. First, the authors elucidate four different theoretical approaches, "Financialization", "Actor-Network/Performativity", "Perverse Incentives", and "Markets As Politics" to understanding...

    Provided By University of California

  • White Papers // Feb 2010

    Earnings Determination And Taxes: Evidence From A Cohort-Based Payroll Tax Reform In Greece

    This paper analyzes the response of earnings to payroll tax rates using a cohort-based reform in Greece. All individuals who started working on or after 1993 face permanently a much higher earnings cap for payroll taxes, creating a large and permanent discontinuity in marginal payroll tax rates by date of...

    Provided By University of California

  • White Papers // Feb 2010

    The Anatomy Of The Mortgage Securitization Crisis

    The current crisis in the mortgage securitization industry highlights significant failures in the models of how markets work and the political will, organizational capability, and ideological desire to intervene in markets. This paper shows that one of the main sources of failure has been the lack of a coherent understanding...

    Provided By University of California

  • White Papers // Feb 2010

    U.S. Health Care And Real Health In Comparative Perspective: Lessons From Abroad

    Among the 19 rich democracies I have studied for the past 40 years, the United States is odd man-out in its health-care spending, organization, and results. The Obama administration might therefore find lessons from abroad helpful as it moves toward national health insurance. In the past hundred years, with the...

    Provided By University of California

  • White Papers // Dec 2010

    Trade Booms, Trade Busts And Trade Costs

    What has driven trade booms and trade busts in the past and present? The authors derive a micro-founded measure of trade frictions from leading trade theories and use it to gauge the importance of bilateral trade costs in determining international trade flows. The authors construct a new balanced sample of...

    Provided By University of California

  • White Papers // Aug 2009

    Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages

    Paging is an important mechanism for network bandwidth efficiency and mobile terminal battery life. It has been widely adopted by mobile networks, such as cellular networks, WiMax, and Mobile IP. Due to certain mechanisms for achieving paging efficiency and the convergence of wireless voice and data networks, the paging channel...

    Provided By University of California

  • White Papers // Aug 2009

    Measuring Privacy Risk in Online Social Networks

    Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. The authors present PrivAware, a tool to detect and report unintended information loss in online social networks. The goal is to provide a rudimentary framework to...

    Provided By University of California

  • White Papers // Jan 2011

    Representative Multiprogram Workloads for Multithreaded Processor Simulation

    Almost all new consumer-grade processors are capable of executing multiple programs simultaneously. The analysis of multiprogrammed workloads for multicore and SMT processors is challenging and time-consuming because there are many possible combinations of benchmarks to execute and each combination may exhibit several different interesting behaviors. Missing particular combinations of program...

    Provided By University of California

  • White Papers // Jan 2011

    The Cost Of Inflation: A Mechanism Design Approach

    A classical topic in monetary economics is measuring the burden that inflation imposes on society. The standard methodology, pioneered by Bailey (1956) and Friedman (1969) and reviewed in Lucas (2000), consists of estimating a reduced-form money demand function and measuring the welfare cost of inflation as the area underneath money...

    Provided By University of California

  • White Papers // Jan 2011

    The P2P War: Someone Is Monitoring Your Activities!

    In an effort to prosecute P2P users, RIAA and MPAA have reportedly started to create decoy users: they participate in P2P networks in order to identify illegal sharing of content. This has reportedly scared some users who are afraid of being caught. The question the authors attempt to answer is...

    Provided By University of California

  • White Papers // Apr 2010

    Is Our Monetary Structure A Systemic Cause For Financial Instability? Evidence And Remedies From Nature

    Fundamental laws govern all complex flow systems, including natural ecosystems, economic and financial systems. Natural ecosystems are practical exemplars of sustainability: enduring, vital, adaptive. The sustainability of any complex flow system can be measured with a single metric as an emergent property of its structural diversity and interconnectivity; it requires...

    Provided By University of California

  • White Papers // May 2010

    Measuring Online Service Availability Using Twitter

    Real-time micro-blogging services such as Twitter are widely recognized for their social dynamics - how they both encapsulate a social graph and propagate information across it. However, the content of this information is equally interesting since it frequently reflects individual experiences with a broad variety of real-time events. Indeed, events...

    Provided By University of California

  • White Papers // Jan 2011

    Query Selection Techniques for Efficient Crawling of Structured Web Sources

    The high quality, structured data from Web structured sources is invaluable for many applications. Hidden Web databases are not directly crawlable by Web search engines and are only accessible through Web query forms or via Web service interfaces. Recent research efforts have been focusing on understanding these Web query forms....

    Provided By University of California

  • White Papers // Feb 2010

    Who Profits From Innovation in Global Value Chains? a Study of the IPod and Notebook PCs

    The power of innovation to create economic value and reward pioneers with exceptional profits is a deeply-held belief of inventors, entrepreneurs, investors and the public. Innovation can enrich companies and individuals and sometimes disrupt entire industries. Yet many studies have shown that the value from innovation is often captured by...

    Provided By University of California

  • White Papers // Feb 2010

    Why Is Strategic R&D (Still) Homebound in a Globalized Industry? the Case of Leading Firms in Wireless Telecom

    The paper is structured as follows. The second section provides a brief conceptual discussion of major interpretations of R&D internationalization and a review of the major themes in the empirical literature. Also the authors consider the specificities of the wireless telecommunications industry. The third section discusses the data that they...

    Provided By University of California