University of California

Displaying 1-40 of 586 results

  • White Papers // Feb 2015

    Task Scheduling Strategies to Mitigate Hardware Variability in Embedded Shared Memory Clusters

    Manufacturing and environmental variations cause timing errors that are typically avoided by conservative design guardbands or corrected by circuit level error detection and correction. These measures incur energy and performance penalties. This paper considers methods to reduce this cost by expanding the scope of variability mitigation through the software stack....

    Provided By University of California

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Jan 2015

    Algebra-Based Identification of Tree Patterns in XQuery

    Query processing performance in XML databases can be greatly enhanced by the usage of materialized views whose content has been stored in the database. This requires a method for identifying query subexpressions matching the views, a process known as view-based query rewriting. This process is quite complex for relational databases,...

    Provided By University of California

  • White Papers // Nov 2014

    Approximate Associative Memristive Memory for Energy-Efficient GPUs

    Multimedia applications running on thousands of deep and wide pipelines working concurrently in GPUs have been an important target for power minimization both at the architectural and algorithmic levels. At the hardware level, energy-efficiency techniques that employ voltage overscaling face a barrier so-called "Path walls": reducing operating voltage beyond a...

    Provided By University of California

  • White Papers // Feb 2014

    Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to Task-level Approach

    Variation in performance and power across manufactured parts and their operating conditions is an accepted reality in aggressive CMOS (Complementary Metal-Oxide-Semiconductor) processes. This paper considers challenges and opportunities in identifying this variation and methods to combat or even use these variations for improved computing systems. The authors introduce the notion...

    Provided By University of California

  • White Papers // Dec 2013

    Temporal Memoization for Energy-Efficient Timing Error Recovery in GPGPUs

    Manufacturing and environmental variability lead to timing errors in computing systems that are typically corrected by error detection and correction mechanisms at the circuit level. The cost and speed of recovery can be improved by memoization-based optimization methods that exploit spatial or temporal parallelisms in suitable computing fabrics such as...

    Provided By University of California

  • White Papers // Dec 2013

    Declarative Ajax Web Applications through SQL++ on a Unified Application State

    Implementing even a conceptually simple web application requires an inordinate amount of time. Forward addresses three problems that reduce developer productivity: impedance mismatch across the multiple languages used at different tiers of the application architecture. Distributed data access across the multiple data sources of the application (user input of the...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // Dec 2012

    Variation-tolerant OpenMP Tasking on Tightly-coupled Processor Clusters

    In this paper, the authors present a variation-tolerant tasking technique for tightly-coupled shared memory processor clusters that relies upon modeling advance across the hardware/software interface. This is implemented as an extension to the OpenMP 3.0 tasking programming model. Using the notion of Task-Level Vulnerability (TLV) proposed here, they capture dynamic...

    Provided By University of California

  • White Papers // Dec 2012

    Hierarchically Focused Guardbanding: An Adaptive Approach to Mitigate PVT Variations and Aging

    In this paper, the authors proposes a new model of functional units for variation-induced timing errors due to PVT variations and device Aging (PVTA). The model takes into account PVTA parameter variations, clock frequency and the physical details of Placed-and-Routed (P&R) functional units in 45nm TSMC analysis flow. Using this...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Nov 2009

    Reverse Traceroute

    Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Researchers use it to map the Internet, predict performance, geo-locate routers, and classify the performance of ISPs. However, trace-route has a fundamental limitation that affects all...

    Provided By University of California

  • White Papers // Jan 2011

    SARA: Combining Stack Allocation and Register Allocation

    Commonly-used memory units enable a processor to load and store multiple registers in one instruction. The authors showed in 2003 how to extend gcc with a Stack-Location-Allocation (SLA) phase that reduces memory traffic by rearranging the stack and replacing some load/store instructions with load/store-multiple instructions. While speeding up the target...

    Provided By University of California

  • White Papers // Mar 2011

    Scaling Laws for Cooperative Node Localization in Non-Line-of-Sight Wireless Networks

    The authors study the problem of cooperative node localization in Non-Line-Of-Sight (NLOS) wireless networks and address design questions such as, "How many anchors and what fraction of Line-Of-Sight (LOS) measurements are needed achieve a specified target accuracy?". They analytically characterize the performance improvement in localization accuracy as a function of...

    Provided By University of California

  • White Papers // Mar 2011

    A Game Theoretical Approach to Communication Security

    The increased reliance on the Internet has made information and communication systems more vulnerable to security attacks. Many recent incidents demonstrate this vulnerability, such as the rapid propagation of sophisticated malwares, the fast growth of botnets, Denial-of-Service (DoS) attacks against business and government websites, and attacks against the power grid...

    Provided By University of California

  • White Papers // Mar 2011

    Addressing Modeling Challenges in Cyber-Physical Systems

    This paper focuses on the challenges of modeling cyber-physical systems that arise from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It uses a portion of an aircraft Vehicle Management Systems (VMS), specifically the fuel management subsystem, to illustrate the challenges, and then discusses technologies that at...

    Provided By University of California

  • White Papers // Mar 2011

    Synthesizing Switching Logic to Minimize Long-Run Cost

    Given a multi-modal dynamical system, optimal switching logic synthesis involves generating the conditions for switching between the system modes such that the resulting hybrid system satisfies a quantitative specification. The authors formalize and solve the problem of optimal switching logic synthesis for quantitative specifications over long run behavior. Each trajectory...

    Provided By University of California

  • White Papers // Jan 2011

    An Observation of Fine-Grain Usage Patterns for Two Configuration Management Tools

    This paper presents the results of a survey of employees from one company that uses different configuration management tools and processes for the development of two separate products. Results from this study suggest that workspace semantics, and build semantics both have a significant impact on the fine grain use pattern...

    Provided By University of California

  • White Papers // Sep 2010

    Toward an Error Handling Mechanism for Timing Errors With Java Pathfinder and Ptolemy II

    Designing effective error handling systems in an embedded software system is essential for acceptable and reliable functionality in cases of errors and for the recovery from faults. Errors in the error handling system can cause catastrophic failures of the software, lead to mission failures and can endanger human life. The...

    Provided By University of California

  • White Papers // Sep 2010

    Copperhead: Compiling an Embedded Data Parallel Language

    Modern parallel microprocessors deliver high performance on applications that expose substantial fine-grained data parallelism. Although data parallelism is widely available in many computations, implementing data parallel algorithms in low-level languages is often an unnecessarily difficult task. The characteristics of parallel microprocessors and the limitations of current programming methodologies motivate the...

    Provided By University of California

  • White Papers // Sep 2010

    FATE and DESTINI: A Framework for Cloud Recovery Testing

    As the cloud era begins and failures become commonplace, the fate and destiny of availability, reliability and performance are in the hands of failure recovery. Unfortunately, recovery problems still take place, causing downtimes, data loss, and many other problems. The authors propose a new testing framework for cloud recovery: FATE...

    Provided By University of California

  • White Papers // Sep 2010

    A System for Managing Physical Data in Buildings

    In order to reduce building energy consumption, the authors need a global, accurate view of the building. Many modern buildings have a sensing infrastructure that can be used to do fine-grained accounting and understand the complex interactions between systems and spaces. However, through the experience with an active, campus-wide Building...

    Provided By University of California

  • White Papers // Oct 2010

    The Earlier the Better: A Theory of Timed Actor Interfaces

    Programming embedded and cyber-physical systems requires attention not only to functional behavior and correctness, but also to non-functional aspects and specifically timing and performance constraints. A structured, compositional, model-based approach based on stepwise refinement and abstraction techniques can support the development process, increase its quality and reduce development time through...

    Provided By University of California

  • White Papers // Oct 2010

    Communication-Avoiding QR Decomposition for GPU's

    The authors describe an implementation of the Communication-Avoiding QR (CAQR) factorization that runs entirely on a single graphics processor (GPU). They show that the reduction in memory traffic provided by CAQR allows one to outperform existing parallel GPU implementations of QR for a large class of tall-skinny matrices. Other GPU...

    Provided By University of California

  • White Papers // Dec 2010

    Diesel: Applying Privilege Separation to Database Access

    Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege separation, the authors argue that database data should be subject to limitations such...

    Provided By University of California

  • White Papers // Dec 2010

    Robust Communication in Vehicular Ad Hoc Networks

    The development of intelligent transportation systems is one of the most important strategies for making roads safer and more efficient. The key technology underpinning all such systems, from cooperative safety systems to electronic tolling, is wireless communications. Vehicles must be able to communicate with each other, and with fixed infrastructure,...

    Provided By University of California

  • White Papers // Dec 2010

    Solution Processed Silver Sulfide Thin Films for Filament Memory Applications

    Filament Memories based on resistive switching have been attracting attention in recent years as a potential replacement for flash memory in CMOS technology and as a potential candidate memory for low-cost, large-area electronics. These memories operate at low voltages with fast switching speeds. These devices are based on ionic conduction...

    Provided By University of California

  • White Papers // Dec 2010

    Optimizing Irregular Data Accesses for Cluster and Multi-Core Architectures

    Applications with irregular accesses to shared state are one of the most challenging computational patterns in parallel computing. Accesses can involve both read or write operations, with writes having the additional complexity of requiring some form of synchronization. Irregular accesses perform poorly in local cached-based memory systems and across networks...

    Provided By University of California

  • White Papers // Feb 2011

    An Empirical Analysis of XSS Sanitization in Web Application Frameworks

    Filtering or sanitization is the predominant mechanism in today's applications to defend against cross-site scripting (XSS) attacks. XSS sanitization can be difficult to get right as it ties in closely with the parsing behavior of the browser. This paper explains some of the subtleties of ensuring correct sanitization, as well...

    Provided By University of California

  • White Papers // Feb 2011

    Towards a Societal Scale, Mobile Sensing System

    With the proliferation of sensor equipped smart phones, and augmented reality applications fast appearing, the mobile phone is becoming something much more than a scaled-down, connected IO and processing device. In addition to these standard PC traits, a cell phone is situated in an environment, mobile, and typically co-located with...

    Provided By University of California

  • White Papers // Jan 2010

    Axioms for Asynchronous Processes

    From classical computability theory to modern programming language design, the mathematical concept of function has dominated the perception of sequential computation. But as soon as the authors venture into the realm of concurrent interaction, it is well understood that this concept has to be abandoned. What are they to replace...

    Provided By University of California

  • White Papers // Jan 2010

    PreFail: Programmable and Efficient Failure Testing Framework

    As hardware failures are no longer rare in the era of cloud computing, reliability has become a first-class design goal of today's cloud software systems. To ensure that software's fault-tolerance "Prevails" against hardware failures, cloud systems have to be tested against multiple, diverse failures that are likely to occur in...

    Provided By University of California

  • White Papers // May 2010

    An Empirical Study of the Control and Data Planes (or Control Plane Determinism Is Key for Replay Debugging Data center Applications)

    Replay debugging systems enable the reproduction and debugging of non-deterministic failures in production application runs. However, no existing replay system is suitable for datacenter applications like Cassandra, Hadoop, and Hypertable. For these large scale, distributed, and data intensive programs, existing methods either incur excessive production overheads or don't scale to...

    Provided By University of California

  • White Papers // Jun 2010

    Towards Practical Taint Tracking

    This paper proposes several technical measures that significantly improve performance and largely limit kernel taint explosion in a XEN- and QEMU-based taint tracking system. Full-system, fine-grained taint tracking is a fundamental primitive that can be used for a number of purposes, most notably for tracking the flow of information through...

    Provided By University of California

  • White Papers // Jul 2010

    An Adaptive Multi-Channel P2P Video-on-Demand System Using Plug-and-Play Helpers

    They authors present a multi-channel P2P Video-on-Demand (VoD) system using "plug-and-play" helpers. Helpers are heterogeneous "micro-servers" with limited storage, bandwidth and number of users they can serve simultaneously. The proposed system has the following salient features: it minimizes the server load; it is distributed, and requires little or no maintenance...

    Provided By University of California

  • White Papers // Aug 2010

    System Problem Detection by Mining Console Logs

    The console logs generated by an application contain information that the developers believed would be useful in debugging or monitoring the application. Despite the ubiquity and large size of these logs, they are rarely exploited because they are not readily machine-parsable. The authors propose a fully automatic methodology for mining...

    Provided By University of California

  • White Papers // Aug 2010

    Automating Data Center Operations Using Machine Learning

    Today's Internet data-centers run many complex and large-scale Web applications that are very difficult to manage. The main challenges are understanding user workloads and application performance, and quickly identifying and resolving performance problems. Statistical Machine Learning (SML) provides a methodology for quickly processing the large quantities of monitoring data generated...

    Provided By University of California

  • White Papers // Aug 2010

    Results and Techniques in Multiuser Information Theory

    In this dissertation the authors develop new techniques and apply them to prove new results in multiuser information theory. In the first part of the dissertation, they introduce the "Potential function method," and apply it to prove converses for a series of multi-terminal network capacity problems. In the second part...

    Provided By University of California

  • White Papers // Aug 2010

    A Model-Based Process for Evaluating Cluster Building Blocks

    Traditional servers account for more than 1.5% of the US electricity use though spend their lives largely underutilized or idle. Because a large portion of power in a data center is due directly or indirectly to servers, power savings in a data center environment can be achieved simply by using...

    Provided By University of California

  • White Papers // Aug 2010

    Two-Handed Marking Menus for Multi-Touch Devices

    The authors investigate multi-stroke marking menus for multi-touch devices and they show that using two hands can improve performance. They present two new two-handed multi-stroke marking menu variants in which users either draw strokes with both hands simultaneously or alternate strokes between hands. In a pair of studies they find...

    Provided By University of California

  • White Papers // Oct 2009

    DesignMinders: A Design Knowledge Collaboration Approach

    Software developers face numerous challenges in capturing and reusing knowledge during informal design sessions. While the knowledge that is brought to bear and generated during these sessions provides valuable insights that can ideally be reused, informal software design is a time when developers are gathered at the whiteboard working to...

    Provided By University of California

  • White Papers // Jan 2011

    Energy Efficient Data Collection in Distributed Sensor Environments

    Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysis. Since sensors are resource constrained, often sensor data is collected into a sensor database that resides at (more powerful) servers. A natural...

    Provided By University of California

  • White Papers // May 2010

    P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust Against Malicious Users

    In this paper the authors introduce a framework for privacy preserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy (P4P) and features a novel heterogeneous architecture and a number of efficient tools for performing private computation and ensuring security at large scale....

    Provided By University of California

  • White Papers // Nov 2010

    Should Users Be Entitled to Run the Applications of Their Choice on Wireless Networks?

    The authors examine whether wireless ISPs should be able to legally limit the applications used on wireless devices. The analysis is based on wireless network architecture and communications law. They review how wired and wireless networks differ in traffic management, and conclude that wireless networks require stronger traffic management than...

    Provided By University of California

  • White Papers // Jan 2011

    Dynamic Resource Discovery for Wireless Sensor Networks

    As sensor networks mature and are increasingly deployed, they will play an integral role in everyday life as the interface between the physical and digital worlds. In contrast to the current generation of sensor networks that are application-specific and exposed only to a limited set of users, heterogeneous sensor networks...

    Provided By University of California

  • White Papers // Aug 2010

    Provenance in ORCHESTRA

    Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for settings in which structured data is collaboratively authored by a large community, such as in the sciences, there is seldom consensus about how...

    Provided By University of California

  • White Papers // Jun 2010

    Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems

    Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, the authors argue that one of the prominent challenges...

    Provided By University of California

  • White Papers // Jan 2011

    Enhancing Data Privacy in the Cloud

    Due to its low cost, robustness, flexibility and ubiquitous nature, cloud computing is changing the way entities manage their data. However, various privacy concerns arise whenever potentially sensitive data is outsourced to the cloud. This paper presents a novel approach for coping with such privacy concerns. The proposed scheme prevents...

    Provided By University of California

  • White Papers // Mar 2010

    Link-Layer Encryption Effect on Achievable Capacity in Wireless Network Coding

    In recent years, network coding has been enthusiastically promoted for certain wireless settings as a means of improving throughput and achieving higher capacity. Naturally, such proposals focused on communication issues, while paying less attention to security implications. This paper considers the effect of Link-Layer Encryption (LLE) on network coding in...

    Provided By University of California

  • White Papers // Sep 2010

    Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

    Private Set Intersection (PSI) protocols allow one party ("Client") to compute an intersection of its input set with that of another party ("Server"), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI...

    Provided By University of California

  • White Papers // Oct 2009

    Moodog: Tracking Students' Online Learning Activities

    Many universities are currently using a Course Management System (CMS) to organize course materials and conduct online learning activities. However, most commercial or open source CMS software does not include comprehensive access tracking and log analysis capabilities. In this paper, the authors propose and implement a CMS log analysis tool,...

    Provided By University of California