University of California

Displaying 1-40 of 625 results

  • White Papers // Jan 2015

    Simple Identity-Based Cryptography with Mediated RSA

    "Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity's public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // Aug 2012

    A Benes Packet Network

    Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are re-arrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing. Routing in Benes networks can be...

    Provided By University of California

  • White Papers // Jun 2012

    Cooperative Localization Using Angle of Arrival Measurements: Sequential Algorithms and Non-Line-of-Sight Suppression

    The authors investigate localization of a source based on Angle of Arrival (AoA) measurements made at a geographically dispersed network of cooperating receivers. The goal is to efficiently compute accurate estimates despite outliers in the AoA measurements due to multipath reflections in Non-Line-Of-Sight (NLOS) environments. Maximal Likelihood (ML) location estimation...

    Provided By University of California

  • White Papers // Jun 2012

    Collaborative High Accuracy Localization in Mobile Multipath Environments

    The authors study the problem of high accuracy localization of mobile nodes in a multipath-rich environment where sub-meter accuracies are required. They employ a peer-to-peer framework where the vehicles/nodes can get pair-wise multipath-degraded ranging estimates in local neighborhoods together with a fixed number of anchor nodes. The challenge is to...

    Provided By University of California

  • White Papers // Jun 2012

    Hybrid Cloud Support for Large Scale Analytics and Web Processing

    Platform-as-a-service (PaaS) systems, such as Google App Engine (GAE), simplify web application development and cloud deployment by providing developers with complete software stacks: runtime systems and scalable services accessible from well-defined APIs. Extant PaaS offerings are designed and specialized to support large numbers of concurrently executing web applications (multi-tier programs...

    Provided By University of California

  • White Papers // May 2012

    Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk Vs. Freelancer

    Research in the economics of security has contributed more than a decade of empirical findings to the understanding of the microeconomics of (in) security, privacy, and ecrime. Here, the authors build on insights from previous macro-level research on crime, and microeconomic analyses of ecrime to develop a set of hypotheses...

    Provided By University of California

  • White Papers // May 2012

    Provenance Management in Databases Under Schema Evolution

    Since, changes caused by database updates combine with the internal changes caused by database schema evolution, an integrated provenance management for data and metadata represents a key requirement for modern information systems. In this paper, the authors introduce the Archived Metadata and Provenance Manager (AM&PM) system which addresses this requirement...

    Provided By University of California

  • White Papers // May 2012

    Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters

    Many important "Big data" applications need to process data arriving in real time. However, current programming models for distributed stream processing are relatively low-level, often leaving the user to worry about consistency of state across the system and fault recovery. Furthermore, the models that provide fault recovery do so in...

    Provided By University of California

  • White Papers // May 2012

    Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

    Flash memory is a promising new storage technology. To fully utilize future multi-level cell Flash memories, it is necessary to develop error correction coding schemes attuned to the underlying physical characteristics of Flash. Based on a careful inspection of fine-grained, experimentally-collected error patterns of TLC (three bits per cell) Flash,...

    Provided By University of California

  • White Papers // May 2012

    North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms

    Cloud technology is evolving at a rapid pace with innovation occurring throughout the software stack. While updates to Software-as-a-Service (SaaS) products require a simple push of code to the production servers or platform, updates to the Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) layers require more intricate procedures to prevent disruption to...

    Provided By University of California

  • White Papers // May 2012

    A Case for Performance-Centric Network Allocation

    The authors consider the problem of allocating network resources across applications in a private cluster running data-parallel frameworks. Their primary observation is that these applications have different communication requirements and thus require different support from the network to effectively parallelize. They argue that network resources should be shared in a...

    Provided By University of California

  • White Papers // May 2012

    Sweet Storage SLOs With Frosting

    Modern datacenters support a large number of applications with diverse performance requirements. These performance requirements are expressed at the application layer as high-level Service-Level Objectives (SLOs). However, large-scale distributed storage systems are unaware of these high-level SLOs. This lack of awareness results in poor performance when workloads from multiple applications...

    Provided By University of California

  • White Papers // Apr 2012

    On the Performance of Certain Private Set Intersection Protocols

    Private Set Intersection (PSI) is a useful cryptographic primitive that allows two parties (client and server) to interact based on their respective (private) input sets, in such a way that client obtains nothing other than the set intersection, while server learns nothing beyond client set size. This paper considers one...

    Provided By University of California

  • White Papers // Apr 2012

    Automated MAC Protocol Generation With Multiple Neighborhoods and Acknowledgments Based on Symbolic Monte Carlo Simulation

    The authors present a framework for automated Medium Access Control (MAC) protocol generation based on a model that incorporates multiple MAC neighborhoods as well as acknowledgments. Both the advertisement and acknowledgment packets are automatically generated by an optimization program that is built based on symbolic Monte Carlo simulation. The design...

    Provided By University of California

  • White Papers // Apr 2012

    Intrusion Detection in Resource-Constrained Cyber Networks: A Restless Multi-Armed Bandit Approach

    The authors consider a large-scale cyber network with N components. Each component is either in a healthy state (0) or an abnormal state (1). Due to intrusions, the state of each component transits from 0 to 1 over time according to an arbitrary stochastic process. The objective is to design...

    Provided By University of California

  • White Papers // Mar 2012

    Static Detection of Loop-Invariant Data Structures

    As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can cause severe runtime bloat, which degrades significantly application performance and scalability. A frequently-occurring coding pattern that may lead to large volumes of (temporary) objects is the creation...

    Provided By University of California

  • White Papers // Mar 2012

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers Via Randomized Cascading

    The authors consider the question of efficiently extending the key length of block ciphers. To date, the approach providing highest security is triple encryption (used e.g., in Triple-DES), which was proved to have roughly k + minfn=2; k=2g bits of security when instantiated with ideal block ciphers with key length...

    Provided By University of California

  • White Papers // Mar 2012

    Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks

    This paper reports on the first systematic study of congestion-aware routing algorithms for wireless mesh networks to achieve an improved end-end delay performance. In particular, the authors compare 802.11 compatible implementations of a set of congestion-aware routing protocols against their implementation of state of the art shortest path routing protocol...

    Provided By University of California

  • White Papers // Mar 2012

    Context-Aware Sensor Data Dissemination for Mobile Users in Remote Areas

    Many mobile sensing applications consider users reporting and accessing sensing data through the Internet. However, WiFi and 3G connectivities are not always available in remote areas. Existing data dissemination schemes for opportunistic networks are not sufficient for sensing applications as sensing context has not been explored. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2012

    Defining CPS Challenges in a Sustainable Electricity Grid

    Cyber-Physical Systems (CPS) is characterized as complex distributed systems exhibiting substantial uncertainty due to interactions with the physical world. Today's electric grids are often described as CPS because a portfolio of distributed supplies must be dispatched in real-time to match uncontrolled, uncertain demand while adhering to constraints imposed by the...

    Provided By University of California

  • White Papers // Mar 2012

    OnController Initialization in Multivariable Switching Systems

    The authors consider a class of switched systems which consists of a linear MIMO and possibly unstable process in feedback interconnection with a multi-controller whose dynamics switch. It is shown how one can achieve significantly better transient performance by selecting the initial condition for every controller when it is inserted...

    Provided By University of California

  • White Papers // Mar 2012

    Primary User Traffic Estimation for Dynamic Spectrum Access

    Accurate estimation of licensed channel Primary User's (PU) temporal statistics is important for Dynamic Spectrum Access (DSA) systems. With accurate estimation of the mean duty cycle, u, and the mean off- and on-times of PUs, DSA systems can more efficiently assign PU resources to its subscribers, thus, increasing channel utilization....

    Provided By University of California

  • White Papers // Mar 2012

    Broadcast-Efficient Secure Multiparty Computation

    Secure MultiParty Computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known...

    Provided By University of California

  • White Papers // Mar 2012

    Elements of Cellular Blind Interference Alignment - Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    The authors explore Degrees of Freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, they introduce three fundamental elements - aligned frequency reuse, wireless index coding and interference diversity - through a series of examples, focusing first on infinite...

    Provided By University of California

  • White Papers // Mar 2012

    Opportunistic Routing With Congestion Diversity in Wireless Ad-Hoc Networks

    The authors consider the problem of routing packets across a multi-hop network consisting of multiple sources of traffic and wireless links while ensuring bounded expected delay. Each packet transmission can be overheard by a random subset of receiver nodes among which the next relay is selected opportunistically. The main challenge...

    Provided By University of California

  • White Papers // Feb 2012

    Uncovering Performance Problems in Java Applications With Reference Propagation Profiling

    Many applications suffer from run-time bloat: excessive memory usage and work to accomplish simple tasks. Bloat significantly affects scalability and performance, and exposing it requires good diagnostic tools. The authors present a novel analysis that profiles the run-time execution to help programmers uncover potential performance problems. The key idea of...

    Provided By University of California

  • White Papers // Feb 2012

    A Flexible In-Network IP Anonymization Service

    User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches...

    Provided By University of California

  • White Papers // Feb 2012

    Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    This paper considers the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of California

  • White Papers // Feb 2012

    The Bleak Future of NAND Flash Memory

    In recent years, flash-based SSDs have grown enormously both in capacity and popularity. In highperformance enterprise storage applications, accelerating adoption of SSDs is predicated on the ability of manufacturers to deliver performance that far exceeds disks while closing the gap in cost per gigabyte. However, while flash density continues to...

    Provided By University of California

  • White Papers // Feb 2012

    Sparse Online Low-Rank Projection and Outlier Rejection (SOLO) for 3-D Rigid-Body Motion Registration

    Motivated by an emerging theory of robust low-rank matrix representation, in this paper, the authors introduce a novel solution for online rigid-body motion registration. The goal is to develop algorithmic techniques that enable a robust, real-time motion registration solution suitable for low-cost, portable 3-D camera devices. Assuming 3-D image features...

    Provided By University of California

  • White Papers // Feb 2012

    Controlling Applications by Managing Network Characteristics

    Edge network operators have limited tools to control activities on their networks. This paper examines network dissuasion, a new approach to edge network control, based on controlling the fundamental parameters of the network, such as loss rate, delay, and jitter, with the intention of making particular uses of a network...

    Provided By University of California

  • White Papers // Feb 2012

    Mitigate Funnel Effect in Sensor Networks With Multi-Interface Relay Nodes

    Overlay network architectures that use orthogonal channels have been known to provide effective additional resources to underlying networks in high demand. Overlays are composed of relay nodes provided with rich computational resources and multiple wireless interfaces that make them capable of establishing several non-interfering networks. These networks can be used...

    Provided By University of California

  • White Papers // Jan 2012

    Enhancing LRU Replacement Via Phantom Associativity

    In this paper, the authors propose a novel cache design, Phantom Associative Cache (PAC), that alleviates cache thrashing in L2 caches by keeping the in-cache data blocks for a longer time period. To realize PAC, they introduce the concept of phantom lines. A phantom line works like a real cache...

    Provided By University of California

  • White Papers // Jan 2012

    BlueSky: A Cloud-Backed File System for the Enterprise

    The authors present BlueSky, a network file system backed by cloud storage. BlueSky stores data persistently in a cloud storage provider such as Amazon S3 or Windows Azure, allowing users to take advantage of the reliability and large storage capacity of cloud providers and avoid the need for dedicated server...

    Provided By University of California

  • White Papers // Jan 2012

    Weighted Fair Queuing With Differential Dropping

    Weighted Fair Queuing (WFQ) allows Internet operators to define traffic classes and then assign different bandwidth proportions to these classes. Unfortunately, the complexity of efficiently allocating the buffer space to each traffic class turns out to be overwhelming, leading most operators to vastly overprovision buffering - resulting in a large...

    Provided By University of California

  • White Papers // Jan 2012

    PLASMA: A New Routing Paradigm for Wireless Multihop Networks

    In this paper, the authors present a new routing paradigm for wireless multi-hop networks. In plasma routing, each packet is delivered over the best available path to one of the gateways. The choice of the path and gateway for each packet is not made beforehand by the source node, but...

    Provided By University of California

  • White Papers // Jan 2012

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Network coding involves packets being combined at intermediate nodes inside the network. Depending on whether packets from the same or different sessions are combined, network coding is classified as intra-session or inter-session, respectively. Inter-session coding, that is the focus of this paper, has been implemented in practice, such as in...

    Provided By University of California

  • White Papers // Jan 2012

    Distributed Measurement-Aware Routing: Striking a Balance Between Measurement and Traffic Engineering

    Network-wide traffic measurement is important for various network management tasks, ranging from traffic accounting, traffic engineering, and network troubleshooting to security. Existing techniques for traffic measurement tend to be sub-optimal due to poor choice of monitor deployment location or due to constantly evolving monitoring objectives and traffic characteristics. It is...

    Provided By University of California

  • White Papers // Jan 2012

    On Wormhole Attacks in Under-Water Sensor Networks: A Two-Tier Localization Approach

    Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper, the authors show that underwater denial-of-service...

    Provided By University of California

  • White Papers // Sep 2009

    Optical Label Switching Technology and Energy-Efficient Future Networks

    The future Internet is rapidly emerging with a new set of very challenging requirements. It must support exponentially rising traffic volume with scalability, performance, and low power consumption. At the same time, new emerging applications require higher degrees of security, utilization, and quality of service. A unified networking platform in...

    Provided By University of California

  • White Papers // Aug 2013

    Effects of Collectivism on Actual S-Commerce Use and the Moderating Effect of Price Consciousness

    Social media has become increasingly popular over the past few years and is continuing to flourish throughout the world. Its rise in popularity and use is propelling user-generated content on commercial websites facilitating the online buying of goods and services referred to as social commerce (s-commerce). This paper examines the...

    Provided By University of California

  • White Papers // May 2008

    Buy It Now: A Hybrid Internet Market Institution

    In this paper, the authors analyze seller choices and outcomes in approximately 700 Internet auctions of a relatively homogeneous good. The 'Buy it now' option allows the seller to convert the auction into a posted price market. They use a structural model to control for the conduct of the auction...

    Provided By University of California

  • White Papers // Aug 2009

    Evaluation of Traffic Data Obtained Via GPS-Enabled Mobile Phones: The Mobile Century Field Experiment

    The growing need of the driving public for accurate traffic information has spurred the deployment of large scale dedicated monitoring infrastructure systems, which mainly consist in the use of inductive loop detectors and video cameras. On-board electronic devices have been proposed as an alternative traffic sensing infrastructure, as they usually...

    Provided By University of California

  • White Papers // Jan 2011

    Power Conservation and Quality of Surveillance in Target Tracking Sensor Networks

    Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target object. The network operations have two states: the surveillance state during the absence of any event of interest, and the tracking state which...

    Provided By University of California

  • White Papers // Jan 2011

    Comparison: ASR is a Variant of ANODR

    Recently, on-demand routing approach has been embraced by several anonymous routing schemes to protect Mobile Ad hoc NETworks (MANETs) from traffic analysts' attacks. ANODR is the first in literature an on-demand anonymous routing protocol proposed for MANETs, followed by SDAR, ASR and MASK which use the same on-demand approach. While...

    Provided By University of California

  • White Papers // Jan 2010

    What's New About Cloud Computing Security?

    While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. This paper strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. The paper examines contemporary and historical perspectives from industry, academia, government, and "Black...

    Provided By University of California

  • White Papers // Feb 2010

    Rain: A Workload Generation Toolkit for Cloud Computing Applications

    Existing workload generation tools are not flexible enough to generate workloads that vary in three key dimensions relevant for making resource allocation decisions for Cloud Computing applications - variations in the amount of load, variations in the mix of operations performed by clients (e.g. changes in reads vs. writes or...

    Provided By University of California

  • White Papers // Mar 2010

    Financial Analysis Using SAS PROCS

    Financial services industry is interested in analyzing vast financial data including price trends from stock exchanges around the world. SAS analytical and graphical tools are extremely useful to enable statistical analysis of various financial data including stock price information. Time Series statistical method is a valuable approach for analysis of...

    Provided By University of California

  • White Papers // Apr 2010

    Using "Recycled Predictions" for Computing Marginal Effects

    A conventional way to estimate the marginal effect of a risk factor is to omit the risk factor (e.g., gender, treatment) from the multivariate model and then use the omitted risk factor as class/group variable to compare observed and predicted outcomes. This can have an undesirable impact on the model...

    Provided By University of California

  • White Papers // Sep 2009

    VrtProf: Vertical Profiling for System Virtualization

    As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under virtualization the virtual machine and OS each try to manage the same resources independently, the underlying hardware is now multiplexed between many streams of execution,...

    Provided By University of California

  • White Papers // Aug 2009

    Automated Spyware Collection and Analysis

    Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. How-ever, the term spyware is ambiguous and can refer to anything from plug-ins that display advertisements to software that records and leaks user input. To shed light on the true nature of...

    Provided By University of California

  • White Papers // Jan 2010

    Visualizing Industrial CT Volume Data for Nondestructive Testing Applications

    This paper describes a set of techniques developed for the visualization of high-resolution volume data generated from industrial computed tomography for NonDestructive Testing (NDT) applications. Because the data are typically noisy and contain ne features, direct volume rendering methods do not always give one satisfactory results. This paper has coupled...

    Provided By University of California

  • White Papers // Jan 2010

    Error-Resilient LZW Data Compression

    As many practitioners know, compressed streams are very sensitive the transmission errors. Even a single error can have devastating effects and compromise all the data downstream. In fact, the non-resilience of adaptive data compression has been a practical drawback of its use in many applications. Joint source-channel coding has emerged...

    Provided By University of California

  • White Papers // Feb 2010

    Power Efficiency With Correlated Data Compression in Sensor Networks

    One of the main constraints for wireless sensor networks is its power budget, which creates a tradeoff on the amount of data the sensor network can transmit and the amount of time that it is functional. This project aims to analyze the power savings for data transmission through the use...

    Provided By University of California

  • White Papers // Sep 2009

    HiperSense: An Integrated System for Dense Wireless Sensing and Massively Scalable Data Visualization

    HiperSense is a system for sensing and data visualization. Its sensing part is comprised of a heterogeneous Wireless Sensor Network (WSN) as enabled by infrastructure support for handoff and bridging. Hando support enables simple, densely deployed, low-complexity, ultra-compact wireless sensor nodes operating at non-trivial data rates to achieve mobility by...

    Provided By University of California

  • White Papers // Oct 2009

    Extending Networking Into the Virtualization Layer

    The move to virtualization has created a new network access layer residing on hosts that connects the various VMs. Virtualized deployment environments impose requirements on networking for which traditional models are not well suited. They also provide advantages to the networking layer (such as software flexibility and well-defined end host...

    Provided By University of California

  • White Papers // Jan 2010

    A Multi-Radio 802.11 Mesh Network Architecture

    Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the benefits of multiple radios does not exist. The focus of the work is to offer such an architecture. The architecture provides solutions to challenges in three...

    Provided By University of California

  • White Papers // Jul 2009

    SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks

    This paper describes the design, implementation and performance evaluation of SenSearch, an outdoors, GPS assisted personnel tracking system using MICA motes. SenSearch is a mobile wireless ad-hoc network comprised of sensor nodes worn by users. These nodes store and forward information about the location of other nodes in an environment...

    Provided By University of California

  • White Papers // Dec 2010

    Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. The authors propose Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California

  • White Papers // Jun 2010

    Data Privacy With Multi-Function Printers, Printers and Copiers

    Hard drives have become prevalent temporary or static storage components within many print devices. In fact, most copiers and multi-function printers manufactured since 2005 have hard drives. While the campus Cyber-safety program has, to date, focused on computer and network security, the focus needs to be expanded to include hard...

    Provided By University of California

  • White Papers // Jan 2010

    Performance Analysis of Server Virtualization Networking Capability

    This paper presents a comparison and analysis of the performance of the various networking capabilities and topologies used to enable a typical server virtualization environment. A fundamental component in the Virtual Machine Monitor (VMM) is a software implementation of a traditional network forwarding device (bridges, routers and NAT gateways). The...

    Provided By University of California

  • White Papers // Jan 2010

    Saving Portable Computer Battery Power Through Remote Process Execution

    This paper describes a new approach to power saving and battery life extension on an untethered laptop through wireless remote processing of power-costly tasks. The authors ran a series of experiments comparing the power consumption of processes run locally with that of the same processes run remotely. This paper examined...

    Provided By University of California

  • White Papers // Aug 2009

    Automatic Scene Relighting for Video Conferencing

    This paper describes a new method to automatically improve scene lighting for video conferencing by learning the photometric mapping between a lower exposure and desired exposure created using High Dynamic Range (HDR) imaging techniques. Once the mapping is learned in a calibration step, it can be used to transform all...

    Provided By University of California

  • White Papers // Nov 2008

    Bluetooth, ZigBee, and Wibree: A Comparison of WPAN Technologies

    Wireless Personal Area Network (WPAN) designs have been flourishing in recent years. The pervasive success of Bluetooth has been a boon to all devices in the IEEE 802.15 working group. As competing and complementary standards are formed within this working group, a successful embedded system designer must understand the differences...

    Provided By University of California

  • White Papers // Oct 2009

    Australasian Accounting Business And Finance Journal

    During the Great Depression, one third of all banks in the United States failed. Scholars dispute reason for their demise. This essay analyzes new evidence on the sources of bank distress. The data demonstrates that contagion via correspondent networks and bank runs propagated the initial banking panics in the fall...

    Provided By University of California

  • White Papers // May 2009

    Maximizing Efficiency by Trading Storage for Computation

    Traditionally, computing has meant calculating results and then storing those results for later use. Unfortunately, committing large volumes of rarely used data to storage wastes space and energy, making it a very expensive strategy. Cloud computing, with its readily available and flexibly allocatable computing resources, suggests an alternative: storing the...

    Provided By University of California

  • White Papers // Jun 2010

    Accelerating Viola-Jones Face Detection to FPGA-Level Using GPUs

    Face detection is an important aspect for biometrics, video surveillance and human computer interaction. The authors present a multi-GPU implementation of the Viola-Jones face detection algorithm that meets the performance of the fastest known FPGA implementation. The GPU design offers far lower development costs, but the FPGA implementation consumes less...

    Provided By University of California

  • White Papers // Aug 2009

    Implementation and Evaluation of a Mobile PlanetLab Node

    With the introduction of cellular phones, mobile wireless communication has become an integral part of day-to-day life in this century. A testbed is crucial in continuing cutting-edge wireless technology research and development since physical and MAC layers in mobile wireless communication have many parameters pertinent to performance that are often...

    Provided By University of California

  • White Papers // Aug 2010

    Inter-Socket Victim Cacheing for Platform Power Reduction

    On a multi-socket architecture with load below peak, as is often the case in a server installation, it is common to consolidate load onto fewer sockets to save processor power. However, this can increase main memory power consumption due to the decreased total cache space. This paper describes inter-socket victim...

    Provided By University of California

  • White Papers // May 2009

    A Common Substrate for Cluster Computing

    The success of MapReduce has sparked many e orts to design cluster computing frameworks. The authors argue that no single framework will be optimal for all applications, and that they should instead enable organizations to run multiple frameworks efficiently in the same cloud. Furthermore, to ease development of new frameworks,...

    Provided By University of California

  • White Papers // May 2010

    Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing

    Data center cloud computing distinguishes computational services such as database transactions and data storage from computational resources such as server farms and disk arrays. Cloud computing enables a software-as-a-service business model where clients may only pay for the service they really need and providers may fully utilize the resources they...

    Provided By University of California

  • White Papers // Jan 2011

    Generating Tests From Counterexamples

    The authors have extended the software model checker BLAST to automatically generate test suites that guarantee full coverage with respect to a given predicate. More precisely, given a C program and a target predicate, BLAST determines the set of program locations which program execution can reach with true, and automatically...

    Provided By University of California

  • White Papers // Jan 2011

    Optimal Communication Complexity of Generic Multicast Key Distribution

    The authors prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager are obtained by arbitrarily nested application of a symmetric encryption scheme, with random or pseudorandom keys. The lower bound shows that for any group of size n,...

    Provided By University of California

  • White Papers // Jan 2011

    Soundness of Formal Encryption in the Presence of Active Adversaries

    Cryptographic protocols are a fundamental tool in the design of secure distributed computing systems, but they are also extremely hard to design and validate. The difficulty of designing valid cryptographic protocols stems mostly from the fact that security properties should remain valid even when the protocol is executed in an...

    Provided By University of California

  • White Papers // Aug 2009

    The Tradeo Between Energy Efficiency and User State Estimation Accuracy in Mobile Sensing

    People-centric sensing and user state recognition can provide rich contextual information for various mobile applications and services. However, continuously capturing this contextual information on mobile devices drains device battery very quickly. In this paper, the authors study the tradeoff between device energy consumption and user state recognition accuracy from a...

    Provided By University of California

  • White Papers // Sep 2010

    Static Analysis for Detecting Taint-Style Vulnerabilities in Web Applications

    The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error-prone and costly, the need for automated solutions has become evident....

    Provided By University of California

  • White Papers // Apr 2010

    Effective Anomaly Detection With Scarce Training Data

    Learning-based anomaly detection has proven to be an effective black-box technique for detecting unknown attacks. However, the effectiveness of this technique crucially depends upon both the quality and the completeness of the training data. Unfortunately, in most cases, the traffic to the system (e.g., a web application or daemon process)...

    Provided By University of California

  • White Papers // Feb 2010

    Speculative Trade Under Unawareness: The Infinite Case

    The authors generalize the "No-Trade" theorem for finite unawareness belief structures in Heifetz, Meier, and Schipper (2009) to the in finite case. Unawareness refers to the lack of conception rather than to the lack of information. It is natural to presume that asymmetric unawareness may lead to speculative trade. Indeed,...

    Provided By University of California

  • White Papers // May 2010

    FDI In The Banking Sector

    It is a well known quandary that when countries open their financial sectors, foreign-owned banks appear to bring superior efficiency to their host markets but also charge higher markups on borrowed funds than their domestically owned rivals, with unknown impacts on interest rates and welfare. Using heterogeneous, imperfectly competitive lenders,...

    Provided By University of California