University of Pennsylvania

Displaying 1-40 of 173 results

  • White Papers // May 2012

    TROPIC: Transactional Resource Orchestration Platform in the Cloud

    Realizing Infrastructure-as-a-Service (IaaS) cloud requires a control platform to orchestrate cloud resource provisioning, configuration, and decommissioning across a distributed set of diverse physical resources. This orchestration is challenging due to the rapid growth of data centers, high failure rate of commodity hardware and the increasing sophistication of cloud services. This...

    Provided By University of Pennsylvania

  • White Papers // Mar 2012

    Cologne: A Declarative Distributed Constraint Optimization Platform

    This paper presents Cologne, a declarative optimization platform that enables Constraint Optimization Problems (COPs) to be declaratively specified and incrementally executed in distributed systems. Cologne integrates a declarative networking engine with an off-the-shelf constraint solver. The authors have developed the Colog language that combines distributed Datalog used in declarative networking...

    Provided By University of Pennsylvania

  • White Papers // Mar 2012

    Rehoming Edge Links for Better Traffic Engineering

    Traditional traffic engineering adapts the routing of traffic within the network to maximize performance. The authors propose a new approach that also adaptively changes where traffic enters and leaves the network - changing the "Traffic matrix", and not just the intra-domain routing configuration. Their approach does not affect traffic patterns...

    Provided By University of Pennsylvania

  • White Papers // Feb 2012

    Irrelevance, Heterogeneous Equality, and Call-by-Value Dependent Type Systems

    The authors present a full-spectrum dependently typed core language which includes both non-termination and computational irrelevance (a.k.a. erasure), a combination which has not been studied before. The two features interact: to protect type safety they must be careful to only erase terminating expressions. Their language design is strongly influenced by...

    Provided By University of Pennsylvania

  • White Papers // Jan 2012

    Virtual Switching Without a Hypervisor for a More Secure Cloud

    Cloud computing leverages virtualization to offer resources on demand to multiple "Tenants". However, sharing the server and network infrastructure creates new vulnerabilities, where one tenant can attack another by compromising the underlying hypervisor. The authors design a system that supports virtualized networking using software switches without a hypervisor. In the...

    Provided By University of Pennsylvania

  • White Papers // Dec 2011

    Step-Indexed Normalization for a Language With General Recursion

    The TRELLYS project has produced several designs for practical dependently typed languages. These languages are broken into two fragments - a logical fragment where every term normalizes and which is consistent when interpreted as a logic, and a programmatic fragment with general recursion and other convenient, but unsound features. In...

    Provided By University of Pennsylvania

  • White Papers // Sep 2011

    Partial Specification of Routing Configurations

    The formal analysis of routing protocol configurations for safety properties is well established. Methods exist to identify potential protocol oscillations by analysis of the network topology and route preference information. However, if not all of this information is available, then the existing theory does not apply. The authors present an...

    Provided By University of Pennsylvania

  • White Papers // Sep 2011

    Secure Network Provenance

    This paper introduces Secure Network Provenance (SNP), a novel technique that enables networked systems to explain to their operators why they are in a certain state - e.g., why a suspicious routing table entry is present on a certain router, or where a given cache entry originated. SNP provides network...

    Provided By University of Pennsylvania

  • White Papers // Aug 2011

    Declarative Policy-Based Adaptive Mobile Ad Hoc Networking

    This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. DAWN leverages declarative networking techniques to achieve extensible routing and forwarding using declarative languages. The authors make the following contributions. First, they demonstrate that traditional MANET protocols can be expressed in a concise fashion as declarative...

    Provided By University of Pennsylvania

  • White Papers // Jun 2011

    Differential Privacy Under Fire

    Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ and Airavat now offer convenient frameworks for processing arbitrary user-specified queries...

    Provided By University of Pennsylvania

  • White Papers // May 2011

    MOSAIC: Declarative Platform for Dynamic Overlay Composition

    Overlay networks create new networking services using nodes that communicate using pre-existing networks. They are often optimized for specific applications and targeted at niche vertical domains, but lack interoperability with which their functionalities can be shared. MOSAIC is a declarative platform for constructing new overlay networks from multiple existing overlays,...

    Provided By University of Pennsylvania

  • White Papers // May 2011

    TAP: Time-Aware Provenance for Distributed Systems

    In this paper, the authors explore the use of provenance for analyzing execution dynamics in distributed systems. They argue that provenance could have significant practical benefits for system administrators, e.g., for reasoning about changes in a system's state, diagnosing protocol misconfigurations, detecting intrusions, and pinpointing performance bottlenecks. However, to realize...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    Discriminative ImageWarping With Attribute Flow

    The authors address the problem of finding deformation between two images for the purpose of recognizing objects. The challenge is that discriminative features are often transformation-variant (e.g. histogram of oriented gradients, texture), while transformation-invariant features (e.g. intensity, color) are often not discriminative. They introduce the concept of attribute flow which...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP

    The Border Gateway Protocol (BGP) works by frequently exchanging updates that disseminate reachability information about IP prefixes (i.e., IP address blocks) between Autonomous Systems (ASes) on the Internet. The ideal operation of BGP relies on three major behavioral assumptions (BAs): Information contained in the update is legal and correct, a...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    Network Neutrality Or Internet Innovation?

    Network neutrality has received sustained attention from both policymakers and academic commentators for the past several years, and it shows no signs of retreating from the forefront of the policy debate. President Obama effectively ensured that network neutrality will remain at the top of the policy agenda by including provisions...

    Provided By University of Pennsylvania

  • White Papers // Mar 2011

    Portfolio Optimization in Secondary Spectrum Markets

    In this paper, the authors address the Spectrum Portfolio Optimization (SPO) question in the context of secondary spectrum markets, where bandwidth (spectrum access rights) can be bought in the form of primary and secondary contracts. While a primary contract on a channel provides guaranteed access to the channel bandwidth (possibly...

    Provided By University of Pennsylvania

  • White Papers // Mar 2011

    An Open-Source and Declarative Approach Towards Teaching Large-Scale Networked Systems Programming

    This paper describes the authors' experiences at the University of Pennsylvania in developing course projects for a large advanced undergraduate and first year graduate course in networked systems. Students work in teams to develop substantial networked systems programming projects (>10000 lines of code) using network simulator 3 (ns-3), an emerging...

    Provided By University of Pennsylvania

  • White Papers // Mar 2011

    Reoccurring Financial Crises In The United States

    The economic history of the United States is riddled with financial crises and banking panics. During the nineteenth-century, eight major such episodes occurred. In the period following World War II, some believed that these crises would no longer happen, and that the U.S. had reached a time of everlasting financial...

    Provided By University of Pennsylvania

  • White Papers // Mar 2011

    A Monetary Theory With Non-Degenerate Distributions

    Dispersion of money balances among individuals is the basis for a range of policies but it has been abstracted from in monetary theory for tractability reasons. In this paper, the authors fill in this gap by constructing a tractable search model of money with a non-degenerate distribution of money holdings....

    Provided By University of Pennsylvania

  • White Papers // Feb 2011

    Pro-Cyclical Unemployment Benefits? Optimal Policy In An Equilibrium Business Cycle Model

    The authors study the optimal provision of Unemployment Insurance (UI) over the business cycle. They consider an equilibrium Mortensen-Pissarides search and matching model with risk-averse workers and aggregate shocks to labor productivity. Both the vacancy creation decisions of firms and the search e ort decisions of workers respond endogenously to...

    Provided By University of Pennsylvania

  • White Papers // Feb 2011

    An Operational Semantics for Network Datalog

    Network Datalog (NDlog) is a recursive query language that extends Datalog by allowing programs to be distributed in a network. In the authors' initial efforts to formally specify NDlog's operational semantics, they have found several problems with the current evaluation algorithm being used, including unsound results, unintended multiple derivations of...

    Provided By University of Pennsylvania

  • White Papers // Feb 2011

    Formally Verifiable Networking

    This paper proposes Formally Verifiable Networking (FVN), a novel approach towards unifying the design, specification, implementation, and verification of networking protocols within a logic-based framework. In FVN, formal logical statements are used to specify the behavior and the properties of the protocol. FVN uses declarative networking as an intermediary layer...

    Provided By University of Pennsylvania

  • White Papers // Feb 2011

    Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

    In this paper, the authors design routing and scheduling policies that optimize network throughput in energy-constrained wireless ad-hoc networks where nodes are powered by renewable energy sources. They take into account the fact that renewable energy harvesting processes are unpredictable and stochastic in nature - typically depending on environmental factors...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    What Should Central Banks Do About Real Estate Prices?

    Many central banks use inflation targeting as the basis for their monetary policy. The underlying notion of this approach is that there are no long term benefits in terms of reduced unemployment from having inflation. The traditional view is that monetary policy should focus on controlling consumer price inflation. Asset...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Spectrum Pricing Games With Spatial Reuse in Cognitive Radio Networks

    In Cognitive Radio Networks (CRN), there are multiple primary and secondary users in a region, and primaries can lease out their unused bandwidth to secondaries in exchange for a fee. This gives rise to price competition among the primaries, wherein each primary tries to attract secondaries by setting a lower...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Moment-Based Analysis of Spreading Processes from Network Structural Information

    The intricate structure of many large-scale networked systems has attracted the attention of the scientific community, leading to many results attempting to explain the relationship between network structural properties and dynamical performance. A common approach to study this relationship is the usage of synthetic network models in which the researcher...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Cloud Resource Orchestration: A DataCentric Approach

    Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infrastructure, as a service, to their customers. Providers benefit from economies of scale and multiplexing gains afforded by sharing of resources through virtualization of the underlying physical infrastructure....

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Languages of Nested Trees

    The authors study languages of nested trees-structures obtained by augmenting trees with sets of nested jump-edges. These graphs can naturally model branching behaviors of push-down programs, so that the problem of branching-time software model checking may be phrased as a membership question for such languages. They define finite-state automata accepting...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Encoding Information Flow in Haskell

    This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification, without modifying the base language. This design avoids the redundant work of producing new languages, lowers the...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Characterizing Temporal SNR Variation in 802.11 Networks

    The analysis and design of wireless MAC protocols, coding schemes and transmission algorithms can significantly benefit from an understanding of the channel quality variation. The authors attempt to represent channel quality variation using a finite state birth-death Markov model. The authors outline a method to compute the parameters of the...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks Using Graph Partitioning

    Several policies have recently been proposed for attaining the maximum throughput region, or a guaranteed fraction thereof, through dynamic link scheduling. Among these policies, the ones that attain the maximum throughput region require a computation time which is linear in the network size, and the ones that require constant or...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Multiplicative Updates for Large Margin Classifiers

    Various problems in nonnegative quadratic programming arise in the training of large margin classifiers. The authors derive multiplicative updates for these problems that converge monotonically to the desired solutions for hard and soft margin classifiers. The updates differ strikingly in form from other multiplicative updates used in machine learning. In...

    Provided By University of Pennsylvania

  • White Papers // Dec 2010

    Information, Liquidity, Asset Prices And Monetary Policy Second Version

    What determines which assets are used in transactions? The authors develop a framework where the extent to which assets are recognizable determines the extent to which they are acceptable in exchange - i.e., their liquidity. They analyze the effects of monetary policy on asset markets. Recognizability and liquidity are endogenized...

    Provided By University of Pennsylvania

  • White Papers // Dec 2010

    Enabling Privacy in Provenance-Aware Workflow Systems

    A new paradigm for creating and correcting scientific analyses is emerging, that of provenance-aware workflow systems. In such systems, repositories of workflow specifications and of provenance graphs that represent their executions will be made available as part of scientific information sharing. This will allow users to search and query both...

    Provided By University of Pennsylvania

  • White Papers // Nov 2010

    Pricing And Investments In Matching Markets Second Version

    Different markets are cleared by different types of prices-seller-specific prices that are uniform across buyers in some markets, and personalized prices tailored to the buyer in others. The authors examine a setting in which buyers and sellers make investments before matching in a competitive market. They introduce the notion of...

    Provided By University of Pennsylvania

  • White Papers // Nov 2010

    Changing Institutional Preferences And Investment Performance: A Stock Holdings Perspective

    Institutional investors have rapidly increased their percentage holdings of US equities in recent years. In this paper the authors update previous research on the nature of institutional stock ownership, extending the evidence by twelve years to the end of 2008. In contrast to previous research, they find that institutions, and...

    Provided By University of Pennsylvania

  • White Papers // Nov 2010

    Asset Commonality, Debt Maturity And Systemic Risk

    The authors develop a model where financial institutions swap projects in order to diversify their individual risk. This can lead to two different asset structures. In a clustered structure groups of financial institutions hold identical portfolios and default together. In an un-clustered structure defaults are more dispersed. With long term...

    Provided By University of Pennsylvania

  • White Papers // Nov 2010

    Deriving Probabilistic Databases With Inference Ensembles

    Many real-world applications deal with uncertain or missing data, prompting a surge of activity in the area of probabilistic databases. A shortcoming of prior work is the assumption that an appropriate probabilistic model, along with the necessary probability distributions, is given. This paper addresses this shortcoming by presenting a framework...

    Provided By University of Pennsylvania

  • White Papers // Nov 2010

    Quantifying The Impact Of Financial Development On Economic Development

    How important is financial development for economic development? A costly state verification model of financial intermediation is presented to address this question. The model is calibrated to match facts about the U.S. economy, such as intermediation spreads and the firm-size distribution for the years 1974 and 2004. It is then...

    Provided By University of Pennsylvania

  • White Papers // Oct 2010

    Expressiveness of Streaming String Transducers

    Streaming string transducers define (partial) functions from input strings to output strings. A streaming string transducer makes a single pass through the input string and uses a finite set of variables that range over strings from the output alphabet. At every step, the transducer processes an input symbol, and updates...

    Provided By University of Pennsylvania

  • White Papers // May 2010

    Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

    With the proliferation of different wireless network technologies like cellular networks, Wireless Local Area Networks, Wireless Meteropolitan Area networks etc., demand for radio spectrum is increasing. Currently, spectrum is regulated by a government agency like the Federal Communications Commission (FCC) and it allocates spectrum by assigning exclusive licenses to users...

    Provided By University of Pennsylvania

  • White Papers // Dec 2009

    Economy of Spectrum Access in Time Varying Multi-Channel Networks

    The authors consider a wireless network consisting of two classes of potentially mobile users: Primary users and secondary users. Primary users license frequency channels and transmit in their respective bands as required. Secondary users resort to unlicensed access of channels that are not used by their primary users. Primaries impose...

    Provided By University of Pennsylvania

  • White Papers // Sep 2010

    Dispatch Then Stop: Optimal Dissemination of Security Patches in Mobile Wireless Networks

    The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidth which is specially scarce in wireless networks, and must therefore be judiciously controlled in order to attain desired trade-offs between security risks and resource consumption....

    Provided By University of Pennsylvania

  • White Papers // Oct 2010

    Dynamic Contract Trading in Spectrum Markets

    The authors address the question of optimal trading of bandwidth (service) contracts in wireless spectrum markets, for the primary spectrum providers. They propose a structured spectrum market and consider two basic types of spectrum contracts that can help attain desired flexibilities and tradeoffs in terms of service quality, spectrum usage...

    Provided By University of Pennsylvania

  • White Papers // Mar 2011

    Portfolio Optimization in Secondary Spectrum Markets

    In this paper, the authors address the Spectrum Portfolio Optimization (SPO) question in the context of secondary spectrum markets, where bandwidth (spectrum access rights) can be bought in the form of primary and secondary contracts. While a primary contract on a channel provides guaranteed access to the channel bandwidth (possibly...

    Provided By University of Pennsylvania

  • White Papers // Dec 2009

    Arrows for Secure Information Flow

    This paper presents an embedded security sub-language for enforcing information-flow policies in the standard Haskell programming language. The sub-language provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, lowers...

    Provided By University of Pennsylvania

  • White Papers // Apr 2009

    Updatable Security Views

    Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, they are instead provided with a restricted view, from which all confidential information has been removed. The program that generates the view effectively embodies a confidentiality...

    Provided By University of Pennsylvania

  • White Papers // Apr 2010

    Model Checking of Linearizability of Concurrent List Implementations

    Concurrent data structures with fine-grained synchronization are notoriously difficult to implement correctly. The difficulty of reasoning about these implementations does not stem from the number of variables or the program size, but rather from the large number of possible inter-leavings. These implementations are therefore prime candidates for model checking. The...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Languages of Nested Trees

    The authors study languages of nested trees-structures obtained by augmenting trees with sets of nested jump-edges. These graphs can naturally model branching behaviors of push-down programs, so that the problem of branching-time software model checking may be phrased as a membership question for such languages. They define finite-state automata accepting...

    Provided By University of Pennsylvania

  • White Papers // Jun 2009

    Algorithmic Analysis of Array-Accessing Programs

    For programs whose data variables range over boolean or nite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. In this paper, the authors consider algorithmic verification of programs that use boolean variables, and in addition, access a single read-only array whose...

    Provided By University of Pennsylvania

  • White Papers // Oct 2010

    Expressiveness of Streaming String Transducers

    Streaming string transducers define (partial) functions from input strings to output strings. A streaming string transducer makes a single pass through the input string and uses a finite set of variables that range over strings from the output alphabet. At every step, the transducer processes an input symbol, and updates...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Spectrum Pricing Games With Spatial Reuse in Cognitive Radio Networks

    In Cognitive Radio Networks (CRN), there are multiple primary and secondary users in a region, and primaries can lease out their unused bandwidth to secondaries in exchange for a fee. This gives rise to price competition among the primaries, wherein each primary tries to attract secondaries by setting a lower...

    Provided By University of Pennsylvania

  • White Papers // Jun 2011

    Differential Privacy Under Fire

    Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ and Airavat now offer convenient frameworks for processing arbitrary user-specified queries...

    Provided By University of Pennsylvania

  • White Papers // Feb 2009

    Generic Coverage Verification Without Location Information Using Dimension Reduction

    Wireless Sensor Networks (WSNs) have recently emerged as a key sensing technology with diverse civilian and military applications. In these networks, a large number of small sensors or nodes perform distributed sensing of a target field. Each node is capable of sensing events of interest within its sensing range and...

    Provided By University of Pennsylvania

  • White Papers // May 2010

    On the Security Cost of Interval Multicast

    Interval multicast was defined as to send a message to a subset of a group, rather than all of the members in the group, which is important in battle fields and other applications. A Key-Tree based approach was proposed by Gouda et. al. to achieve interval-multicast security, i.e., to securely...

    Provided By University of Pennsylvania

  • White Papers // Mar 2012

    Cologne: A Declarative Distributed Constraint Optimization Platform

    This paper presents Cologne, a declarative optimization platform that enables Constraint Optimization Problems (COPs) to be declaratively specified and incrementally executed in distributed systems. Cologne integrates a declarative networking engine with an off-the-shelf constraint solver. The authors have developed the Colog language that combines distributed Datalog used in declarative networking...

    Provided By University of Pennsylvania

  • White Papers // Jan 2012

    Virtual Switching Without a Hypervisor for a More Secure Cloud

    Cloud computing leverages virtualization to offer resources on demand to multiple "Tenants". However, sharing the server and network infrastructure creates new vulnerabilities, where one tenant can attack another by compromising the underlying hypervisor. The authors design a system that supports virtualized networking using software switches without a hypervisor. In the...

    Provided By University of Pennsylvania

  • White Papers // Mar 2012

    Rehoming Edge Links for Better Traffic Engineering

    Traditional traffic engineering adapts the routing of traffic within the network to maximize performance. The authors propose a new approach that also adaptively changes where traffic enters and leaves the network - changing the "Traffic matrix", and not just the intra-domain routing configuration. Their approach does not affect traffic patterns...

    Provided By University of Pennsylvania

  • White Papers // Feb 2012

    Irrelevance, Heterogeneous Equality, and Call-by-Value Dependent Type Systems

    The authors present a full-spectrum dependently typed core language which includes both non-termination and computational irrelevance (a.k.a. erasure), a combination which has not been studied before. The two features interact: to protect type safety they must be careful to only erase terminating expressions. Their language design is strongly influenced by...

    Provided By University of Pennsylvania

  • White Papers // May 2012

    TROPIC: Transactional Resource Orchestration Platform in the Cloud

    Realizing Infrastructure-as-a-Service (IaaS) cloud requires a control platform to orchestrate cloud resource provisioning, configuration, and decommissioning across a distributed set of diverse physical resources. This orchestration is challenging due to the rapid growth of data centers, high failure rate of commodity hardware and the increasing sophistication of cloud services. This...

    Provided By University of Pennsylvania

  • White Papers // Apr 2010

    On the Adoption Paths and Competition of Network Applications

    Much of the growth of the Internet has been driven by new network technologies and applications. The successful adoption of theses applications greatly depend on the underlying diffusion process as governed by the system parameters and network externality effects. Developing guidelines for judicious deployment of such network applications require a...

    Provided By University of Pennsylvania

  • White Papers // May 2009

    The Labor Market Of Italian Politicians Second Version

    Like voters (the represented), politicians (the representees) are the heart and soul of representative democracy. But isn't being a politician just like any other job? After the authors get past the rhetoric, is politics any different than other occupations? In the political sector, voters, parties and politicians represent the counterparts...

    Provided By University of Pennsylvania

  • White Papers // Jan 2010

    Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos

    The authors present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which the authors consider authentication and key secrecy properties. The proofs rely on the Dolev-Yao-style model of Backes, Pfitzmann, and Waidner, which allows for mapping results obtained symbolically within this model to cryptographically...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP

    The Border Gateway Protocol (BGP) works by frequently exchanging updates that disseminate reachability information about IP prefixes (i.e., IP address blocks) between Autonomous Systems (ASes) on the Internet. The ideal operation of BGP relies on three major behavioral assumptions (BAs): Information contained in the update is legal and correct, a...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    Network Neutrality Or Internet Innovation?

    Network neutrality has received sustained attention from both policymakers and academic commentators for the past several years, and it shows no signs of retreating from the forefront of the policy debate. President Obama effectively ensured that network neutrality will remain at the top of the policy agenda by including provisions...

    Provided By University of Pennsylvania

  • White Papers // Jan 2009

    Declarative Reconfigurable Trust Management

    In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement of security policies. These systems have different tradeoffs in expressiveness and complexity, depending on the security constructs (e.g. authentication, delegation, secrecy, etc.) that are supported, and...

    Provided By University of Pennsylvania

  • White Papers // Oct 2009

    Hedge Funds: Pricing Controls And The Smoothing Of Self-Reported Returns

    The authors investigate the extent to which hedge fund managers smooth self-reported returns. In contrast with prior research on the "Anomalous" properties of hedge fund returns, they observe the mechanisms used to price the fund's investment positions and report the fund's performance to investors, thereby allowing one to differentiate between...

    Provided By University of Pennsylvania

  • White Papers // Jan 2010

    5th International Workshop on Networking Meets Databases (NetDB 2009)

    The Workshop on Networking Meets DataBases (NetDB) is a venue that aims to bring together researchers from the systems and networking community and the database community. Many current research areas, such as cloud computing, data-center networking, sensor networks, network management, or social networks, raise research problems that lie at the...

    Provided By University of Pennsylvania

  • White Papers // Mar 2009

    xDomain: Cross-Border Proofs of Access

    A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy - a technique called proof-carrying authorization. Numerous authorization logics have been proposed as vehicles by which these proofs can be expressed and checked. A challenge in...

    Provided By University of Pennsylvania

  • White Papers // May 2011

    TAP: Time-Aware Provenance for Distributed Systems

    In this paper, the authors explore the use of provenance for analyzing execution dynamics in distributed systems. They argue that provenance could have significant practical benefits for system administrators, e.g., for reasoning about changes in a system's state, diagnosing protocol misconfigurations, detecting intrusions, and pinpointing performance bottlenecks. However, to realize...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Cloud Resource Orchestration: A DataCentric Approach

    Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infrastructure, as a service, to their customers. Providers benefit from economies of scale and multiplexing gains afforded by sharing of resources through virtualization of the underlying physical infrastructure....

    Provided By University of Pennsylvania

  • White Papers // Jan 2009

    Modeling and Analysis of Multi-Hop Control Networks

    The authors propose a mathematical framework, inspired by the WirelessHART specification, for modeling and analysing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. The authors separate control, topology, routing, and scheduling and propose formal syntax and semantics for...

    Provided By University of Pennsylvania

  • White Papers // Jun 2009

    Scalable Scheduling Algorithms for Wireless Networked Control Systems

    In this paper, the authors address the problem of designing scalable scheduling and routing policies over a time-triggered multi-hop control network, when closing a considerable number of control loops on the same network. The key idea is to formally define by means of regular languages the set of schedules for...

    Provided By University of Pennsylvania

  • White Papers // Apr 2009

    SmartCIS: Integrating Digital and Physical Environments

    As networked sensors continue to grow in sophistication and decrease in cost, the authors are seeing a new class of applications: those that combine data from the digital world with sensor readings, to facilitate environments that intelligently manage resources and assist humans. Examples include intelligent power grids, smart hospitals, home...

    Provided By University of Pennsylvania

  • White Papers // Apr 2011

    Discriminative ImageWarping With Attribute Flow

    The authors address the problem of finding deformation between two images for the purpose of recognizing objects. The challenge is that discriminative features are often transformation-variant (e.g. histogram of oriented gradients, texture), while transformation-invariant features (e.g. intensity, color) are often not discriminative. They introduce the concept of attribute flow which...

    Provided By University of Pennsylvania

  • White Papers // May 2008

    Evidence-Based Audit

    Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence that an access-control decision has been made in accordance with policy. Using such proofs for auditing reduces the trusted computing base and enable...

    Provided By University of Pennsylvania

  • White Papers // Jan 2011

    Encoding Information Flow in Haskell

    This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification, without modifying the base language. This design avoids the redundant work of producing new languages, lowers the...

    Provided By University of Pennsylvania

  • White Papers // Nov 2009

    On The "Hot Potato Effect" Of Inflation: Intensive Versus Extensive Margins

    Conventional wisdom is that inflation makes people spend money faster; trying to get rid of it like a "hot potato" and this is a channel through which inflation affects velocity and welfare. Monetary theory with endogenous search intensity seems ideal for studying this. However, in standard models, inflation is a...

    Provided By University of Pennsylvania

  • White Papers // Jul 2009

    Temporal Reasoning for Procedural Programs

    While temporal verification of programs is a topic with a long history, its traditional basis-semantics based on word languages-is ill-suited for modular reasoning about procedural programs. The authors address this issue by defining the semantics of procedural (potentially recursive) programs using languages of nested words and developing a framework for...

    Provided By University of Pennsylvania

  • White Papers // Feb 2009

    On The "Hot Potato" Effect Of Inflation

    Conventional wisdom is that when inflation or nominal interest rates rise people try to spend their money more quickly - like a "Hot potato" they want to get rid of sooner rather than later - and this is a channel through which inflation increases velocity. Search-based monetary theory seems like...

    Provided By University of Pennsylvania