University of Washington

Displaying 1-40 of 184 results

  • Webcasts // Jun 2012

    The Journey of the Entrepreneur

    In this webcast, the presenter shares stories from the trenches, lessons learned and insights about what it takes for a promising technology to become an innovation that changes the world.

    Provided By University of Washington

  • Webcasts // Jun 2012

    Photo Tourism at Google

    Two years ago, researcher Steve Seitz created a new 3D computer vision group in Google's Seattle office. In this webcast, the presenter discusses what the group has been up to, including Picasa face movies, MapsGL, and the newest feature called Photo Tours.

    Provided By University of Washington

  • Webcasts // Jun 2012

    Hogwild for Machine Learning on Multicore

    In this webcast, the presenter provides both theoretical and experimental evidence demonstrating the achievement of linear speedups on multi-core workstations on several benchmark optimization problems. Stochastic Gradient Descent (SGD) is a popular optimization algorithm for solving data-driven machine learning problems such as classification, model selection, sequence labeling, and recommendation.

    Provided By University of Washington

  • White Papers // May 2012

    Verification Games: Making Verification Fun

    Program verification is the only way to be certain that a given piece of software is free of (certain types of) errors - errors that could otherwise disrupt operations in the field. To date, formal verification has been done by specially-trained engineers. Labor costs have heretofore made formal verification too...

    Provided By University of Washington

  • White Papers // May 2012

    Inference and Checking of Object Ownership

    Ownership type systems describe a heap topology and enforce an encapsulation discipline; they aid in various program correctness and understanding tasks. However, the annotation overhead of ownership type systems has hindered their widespread use. The authors present a unified framework for specification, type inference and type checking of ownership type...

    Provided By University of Washington

  • Webcasts // Mar 2012

    Crowd Computation: Social Computing and Mass Disruption

    In this webcast, the presenter describes several ways in which members of the social media crowd act to shape the information space through their actions and interactions within the space.

    Provided By University of Washington

  • Webcasts // Mar 2012

    Advancing Computer Vision by Leveraging Humans

    This discussion on human-centered contributions to computing describes recent efforts in expanding the roles humans play in advancing computer vision. In the first part of this webcast, the presenter describes the recently-introduced "Human-debugging" paradigm. It allows for identification of weak-links in machine vision approaches that require further research. In the...

    Provided By University of Washington

  • Webcasts // Mar 2012

    Predicting the Present With Google Trends

    In this webcast, the presenter explains how to use Google Trends data to measure the state of the economy in various sectors, and discuss some of the implications for research and policy.

    Provided By University of Washington

  • Webcasts // Mar 2012

    Parallel Programmability for High Performance Computing

    In this webcast, the presenter describes Chapel, an emerging language from Cray, Inc., that strives to address challenges to parallel programmability by making it more productive for both High Performance Computing (HPC) and mainstream programmers.

    Provided By University of Washington

  • Webcasts // Mar 2012

    Adventures in Scaling the Multicore Memory Wall

    In this webcast, the presenter covers three different approaches to multicore cache management that can help bridge the "Memory wall." If the application thread mapping and the cache topology are both static (i.e., do not change during runtime), then compiler enhancements that support cache topology-aware code optimization can be used...

    Provided By University of Washington

  • Webcasts // Mar 2012

    Optimizing Human Computation

    In this webcast, the presenter describes crowdsourcing work on two fronts. First, Crowd Algorithms, which view the crowd as data processors to design human computation versions of fundamental algorithms like sort, filter, and search, where the basic operations are done by people. Second, Declarative Crowdsourcing which views the crowd as...

    Provided By University of Washington

  • White Papers // Mar 2012

    User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

    Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem in such systems is how to allow users to grant applications access to user-owned resources, e.g., to privacy- and cost-sensitive devices like...

    Provided By University of Washington

  • Webcasts // Feb 2012

    GraphLab: A Distributed Abstraction for Machine Learning

    Today, machine learning (ML) methods play a central role in industry and science. In this webcast, the presenter describes the GraphLab framework, which naturally expresses asynchronous, dynamic graph computations that are key for state-of-the-art ML algorithms.

    Provided By University of Washington

  • Webcasts // Feb 2012

    Document Discovery: Advancing Research With Large Knowledge Networks

    By putting the world's scholarly literature online, publisher websites and digital archives have made millions articles instantly available anywhere, any time, in digital form. In this webcast, the presenter describes new approaches to measuring, mapping and evaluating documents are creating new forms of value that can be derived from the...

    Provided By University of Washington

  • White Papers // Jan 2012

    Type-Directed Completion of Partial Expressions

    Modern programming frameworks provide enormous libraries arranged in complex structures, so much so that a large part of modern programming is searching for APIs that "Surely exist" somewhere in an unfamiliar part of the framework. The authors present a novel way of phrasing a search for an unknown API: the...

    Provided By University of Washington

  • Webcasts // Dec 2011

    Towards Balanced, Data-Intensive Scalable Computing

    While many interesting systems are able to scale linearly with additional servers, per-server performance can lag behind per-server capacity by more than an order of magnitude. In this webcast, the presenter will presents Themis, a runtime supporting highly-efficient data-intensive computing.

    Provided By University of Washington

  • Webcasts // Dec 2011

    Computer Science and Engineering Distinguished Lecturer Series-Internet-Scale Storage

    The pace of innovation in data center design has been rapidly accelerating over the last 5 years, driven by the mega-service operators. In this webcast, the presenter will take apart a high-scale cloud service data center, looking at power distribution from high voltage to the server, compute and storage, networking,...

    Provided By University of Washington

  • Webcasts // Dec 2011

    Cooperative Concurrency for a Multicore World

    Multi-threaded programs are notoriously prone to unintended interference between concurrent threads. To address this problem, these presenters argue that yield annotations in the source code should document all thread interference, and they present a type system for verifying the absence of undocumented interference.

    Provided By University of Washington

  • Webcasts // Dec 2011

    Using Surrogate Benchmarks to Project the Performance of HPC Applications

    Performance projections of High Performance Computing (HPC) applications onto various hardware platforms are important for hardware vendors and HPC users. The projections aid hardware vendors in the design of future systems and help HPC users with system procurement.

    Provided By University of Washington

  • Webcasts // Nov 2011

    Full Duplex Wireless

    In this webcast, the presenter describing that a full-duplex radio - a radio that can receive and transmit simultaneously on the same frequency, like a two-lane bridge - can be built using commodity, off-the-shelf components. Full duplex has the potential to revolutionize a large number of wireless systems.

    Provided By University of Washington

  • White Papers // Aug 2011

    New Directions for Self-Destructing Data Systems

    This paper seeks to advance the state of the art in practical self-destructing data systems that secure sensitive data from disclosure in the highly mobile, social-networked, cloud-computing world. The authors' work facilitates the automatic, timed, and simultaneous destruction of all copies of a self-destructing data object (such as a message...

    Provided By University of Washington

  • White Papers // Aug 2011

    Energy-Efficient Low Power Listening for Wireless Sensor Networks in Noisy Environments

    Low Power Listening (LPL) is a common MAC layer technique for reducing energy consumption in wireless sensor networks, where nodes periodically wake up to sample the wireless channel for activity. However, LPL is highly susceptible to false wakeups caused by environmental noise being detected as energy on the channel, causing...

    Provided By University of Washington

  • White Papers // Aug 2011

    Hierarchical Scheduling for Multicores With Multilevel Cache Hierarchies

    To achieve good performance, programs must exploit locality in its memory references, i.e., it must utilize its caches effectively. For machines with a single processor or core, there is a rich history of work on external memory and hierarchical memory models and algorithms, all aimed at reducing the number of...

    Provided By University of Washington

  • White Papers // Aug 2011

    User Centered Design and Evaluation of an Eye Movement-Based Biometric Authentication System

    Biometric authentication systems offer advantages over knowledge-based and token-based systems because the authors do not require users to remember anything or carry a physical object. However, usability and acceptability issues have often been neglected in favor of optimizing technical performance. They present on the design and development of a novel...

    Provided By University of Washington

  • White Papers // Jul 2011

    Efficient Deadlock Avoidance for Streaming Computation With Filtering

    Parallel streaming computation has been studied extensively, and many languages, libraries, and systems have been designed to support this model of computation. While some streaming computations send data at a priori predictable rates on every channel between compute nodes, many natural applications lack this property. In particular, the authors consider...

    Provided By University of Washington

  • White Papers // Jun 2011

    DeSEO: Combating Search-Result Poisoning

    The authors perform an in-depth study of SEO attacks that spread malware by poisoning search results for popular queries. Such attacks, although recent, appear to be both widespread and effective. They compromise legitimate Web sites and generate a large number of fake pages targeting trendy keywords. They first dissect one...

    Provided By University of Washington

  • Webcasts // Jun 2011

    How I Learned to Stop Worrying and Trust Mobile Systems

    In this webcast, the presenter explains about "How he learned to stop worrying and trust mobile systems" and Mobile phones have become the eyes and ears of the Internet by placing digital communication, computation, and sensing at the center of nearly all human activity.

    Provided By University of Washington

  • White Papers // May 2011

    Mercury BLASTN Biosequence Similarity Search System: Technical Reference Guide

    The Mercury BLASTN application is a hybrid hardware-software implementation of DNA-to-DNA sequence comparison. It presents an interface similar to that of NCBI BLASTN 2.2 (and indeed uses much of that package's source code internally) but has many changes "Under the hood" to support very large sequence comparisons. Much of Mercury...

    Provided By University of Washington

  • White Papers // May 2011

    Region-Based Dynamic Separation for STM Haskell

    The authors present the first design and implementation of dynamic separation in STM Haskell. Dynamic separation is a recent approach to Software Transactional Memory (STM) that achieves strongly-atomic semantics with performance comparable to that of a weakly-atomic STM. STM Haskell, a lazy-versioning STM library for Haskell, previously supported strongly-atomic semantics...

    Provided By University of Washington

  • White Papers // May 2011

    Operating System Implications of Fast, Cheap, Non-Volatile Memory

    The existence of two basic levels of storage (fast/volatile and slow/non-volatile) has been a long-standing premise of most computer systems, influencing the design of OS components, including file systems, virtual memory, scheduling, execution models, and even their APIs. Emerging resistive memory technologies - such as Phase-Change Memory (PCM) and memristors...

    Provided By University of Washington

  • White Papers // May 2011

    Scheduling-Control Co-Design for WirelessHART Networks

    WirelessHART is an open standard for wireless sensor-actuator networks in process monitoring and control. Recent years have seen initial success in real-world deployment of control systems over WirelessHART networks. Due to stringent bandwidth constraints in WirelessHART networks, it is important to develop a wireless transmission scheduling and control co-design approach...

    Provided By University of Washington

  • White Papers // May 2011

    Efficient Inter-Vehicle Data Dissemination

    Data services for in-vehicle consumption are expected to become a primary driver in the development of future vehicular networks. Due to download rate limitations of present wide-area cellular connectivity such as 3G (the likely "Pipe" to/from vehicles), and direct peer-to-peer data sharing among vehicles can supplement vertical downloading. This paper...

    Provided By University of Washington

  • White Papers // May 2011

    Tunable Static Inference for Generic Universe Types

    Object ownership is useful for many applications, including program verification, thread synchronization, and memory management. However, the annotation overhead of ownership type systems hampers their widespread application. This paper addresses this issue by presenting a tunable static type inference for Generic Universe Types. In contrast to classical type systems, ownership...

    Provided By University of Washington

  • White Papers // May 2011

    Maverick: Providing Web Applications With Safe and Flexible Access to Local Devices

    Web browsers do not yet provide Web programs with the same safe, convenient access to local devices that operating systems provide to native programs. As a result, Web programmers must either wait for the slowly evolving HTML standard to add support for the device classes they want to use, or...

    Provided By University of Washington

  • White Papers // May 2011

    Webcam Image Alignment

    AMOS, The Archive of Many Outdoor Scenes, has been a major project at Washington University. The project focus has been collecting images from webcams all over the world. Images have been logged from thousands of webcams for over 5 years. The large datasets created by AMOS are useful for a...

    Provided By University of Washington

  • White Papers // Apr 2011

    Crunching Large Graphs With Commodity Processors

    Crunching large graphs is the basis of many emerging applications, such as social network analysis and bio-informatics. Graph analytics algorithms exhibit little locality and therefore present significant performance challenges. Hardware multi-threading systems (e.g., Cray XMT) show that with enough concurrency, the authors can tolerate long latencies. Unfortunately, this solution is...

    Provided By University of Washington

  • White Papers // Apr 2011

    Robust FDI Determinants: Bayesian Model Averaging In The Presence Of Selection Bias

    The literature on Foreign Direct Investment (FDI) determinants is remarkably diverse in terms of competing theories and empirical results. The authors utilize Bayesian Model Averaging (BMA) to resolve the model uncertainty that surrounds the validity of the competing FDI theories. Since the structure of existing FDI data is known to...

    Provided By University of Washington

  • White Papers // Mar 2011

    SSLShader: Cheap SSL Acceleration With Commodity Processors

    Secure end-to-end communication is becoming increasingly important as more private and sensitive data is transferred on the Internet. Unfortunately, today's SSL deployment is largely limited to security or privacy critical domains. The low adoption rate is mainly attributed to the heavy cryptographic computation overhead on the server side, and the...

    Provided By University of Washington

  • White Papers // Mar 2011

    A Software Radio-Based UHF RFID Reader for PHY/MAC Experimentation

    The authors present the design and evaluation of a flexible UHF RFID reader that enables new PHY/MAC designs to be prototyped and evaluated. Their reader is built using the USRP software radio platform in conjunction with software they developed in the open-source GNU Radio framework. They believe it is the...

    Provided By University of Washington

  • White Papers // Mar 2011

    Dewdrop: An Energy-Aware Runtime for Computational RFID

    Computational RFID (CRFID) tags embed sensing and computation into the physical world. The operation of the tags is limited by the RF energy that can be harvested from a nearby power source. The authors present a CRFID runtime, Dewdrop that makes effective use of the harvested energy. Dewdrop treats iterative...

    Provided By University of Washington

  • White Papers // Oct 2008

    EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond

    EPC (Electronic Product Code) tags are industry-standard RFID devices poised to supplant optical barcodes in many applications. They are prevalent in case and pallet tracking, and also percolating into individual consumer items and border-crossing documents. This paper explores the systemic risks and challenges created by increasingly common use of EPC...

    Provided By University of Washington

  • White Papers // Oct 2008

    Experimental Results With Two Wireless Power Transfer Systems

    This paper describes two wireless power transfer systems. The Wireless Identification and Sensing Platform (WISP) is a platform for sensing and computation that is powered and read by a commercial off-the-shelf UHF (915MHz) RFID reader. WISPs are small sensor devices that consume on the order of 2uW to 2mW, and...

    Provided By University of Washington

  • White Papers // Jun 2008

    Multi-Domain RFID Access Control Using Asymmetric Key Based Tag-Reader Mutual Authentication

    Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications...

    Provided By University of Washington

  • White Papers // Jan 2009

    SEMEX: Toward On-the-Fly Personal Information Integration

    On-the-y information integration attempts to change the basic cost-benefit equation association with building information integration applications. This paper argues that on-the-fly can be supported by extending one's personal information space. As a first step in this direction, they describe the Semex system that provides a logical and integrated view of...

    Provided By University of Washington

  • White Papers // Apr 2009

    The Security Architecture of the Chromium Browser

    Most current web browsers employ a monolithic architecture that combines "The User" and "The Web" into a single protection domain. An attacker who exploits arbitrary code execution vulnerability in such a browser can steal sensitive les or install malware. This paper presents the security architecture of Chromium, the open-source browser...

    Provided By University of Washington

  • White Papers // Aug 2009

    Data Analysis and Reduction Using Stationary Solutions of the NLS Equation

    This paper demonstrates that the stationary solutions of the Nonlinear Schrodinger Equation (NLS) can be used as an orthonormal basis for the square integrable functions with periodic boundary conditions. This allows one to use these solutions in much the same way as regular Fourier modes or other basis sets. For...

    Provided By University of Washington

  • White Papers // Jun 2009

    Vanish: Increasing Data Privacy With Self-Destructing Data

    This paper presents Vanish, a system that meets this challenge through a novel integration of cryptographic techniques with global-scale, P2P, Distributed Hash Tables (DHTs). The paper implemented a proof-of-concept Vanish prototype to use both the million-plus-node Vuze Bit-Torrent DHT and the restricted-membership OpenDHT. The paper evaluates experimentally and analytically the...

    Provided By University of Washington

  • White Papers // Jan 2010

    Detecting Parser Errors Using Web-Based Semantic Filters

    NLP systems for tasks such as question answering and information extraction typically rely on statistical parsers. But the efficacy of such parsers can be surprisingly low, particularly for sentences drawn from heterogeneous corpora such as the web. The web-based semantic filtering is based on this concept. The fundamental hypothesis is...

    Provided By University of Washington

  • White Papers // Apr 2010

    Data Centers and Mission Critical Facilities Operations Procedures

    In order to provide reliable, safe and secure data centers and mission critical facilities, certain practices must be instituted and enforced. This paper establishes standards and procedures for UW Information Technology (UW-IT) centrally managed data centers for the University of Washington (UW), both owned and leased, along with other mission...

    Provided By University of Washington

  • White Papers // Jan 2010

    Execution Characteristics of Desktop Applications On Windows NT

    This paper examines the performance of desktop applications running on the Microsoft Windows NT operating system on Intel x86 processors, and contrasts these applications to the programs in the integer SPEC95 benchmark suite. This paper present measurement of basic instruction set and program characteristics, and detailed simulation results of the...

    Provided By University of Washington

  • White Papers // Aug 2008

    Gender And Diversity In Hiring Software Professionals: What Do Students Say?

    This paper provides an analysis of students' choices and rationale with respect to gender and diversity in hiring software professionals. The study population included students at two universities who were asked to hire a software developer and a program manager from a pool of four candidates for a fictitious software...

    Provided By University of Washington

  • White Papers // Dec 2008

    Identifying Game Players With Mouse Biometrics

    Recent work in mouse movement analysis has determined that, with sufficient data, users can be uniquely identified solely by their mouse movements. This paper considers the domain of video games and attempt to use mouse movements to identify game players. The authors conduct a user study that requires users to...

    Provided By University of Washington

  • White Papers // Feb 2010

    Service Outsourcing

    This paper reviews the Operations Management (OM) research on service outsourcing, a common practice among today's businesses. The authors focus on recent literature in three areas: capacity planning and supplier coordination, service outsourcing under information asymmetry, and quality concerns. Additionally, a mathematical framework is presented that can be used to...

    Provided By University of Washington

  • White Papers // Jan 2010

    JavaML: A Markup Language for Java Source Code

    The classical plain-text representation of source code is convenient for programmers but requires parsing to uncover the deep structure of the program. While sophisticated software tools parse source code to gain access to the program's structure, many lightweight programming aids such as grep rely instead on only the lexical structure...

    Provided By University of Washington

  • White Papers // Jan 2010

    Simultaneous Multithreading: A Platform for Next-Generation Processors

    With the dizzying pace of semiconductor technology development, CPU designers are squeezing previously unimaginable amounts of hardware onto a single chip. Over the next 15 years the authors can expect the number of transistors on a chip to increase by two orders of magnitude, to a billion transistors. The obvious...

    Provided By University of Washington

  • White Papers // Jan 2010

    Challenges to Physicians' Use of a Wireless Alert Pager

    Pagers, Personal Data Assistants (PDAs) and other devices that have wireless connectivity are becoming a popular method for delivering patient related information to medical decision makers. Although medical informatics research has emphasized the design, and implementation of pagers as event notification mechanisms, researchers have not paid as much attention to...

    Provided By University of Washington

  • White Papers // Mar 2009

    Exploring The Dynamics Of Music Piracy

    Recently sales of physical music media have declined along with music industry revenues - the reasons are complex and poorly understood. The authors present three models exploring claims made in the conversation over piracy and the music industry's future. The authors model stakeholder perspectives rather than the full industry to...

    Provided By University of Washington

  • White Papers // May 2009

    CloudViews: Communal Data Sharing in Public Clouds

    Web services are undergoing an exciting transition from in-house data centers to public clouds. Attracted by automatic scalability and extremely low compute, storage, and management costs, Web services are increasingly opting for public cloud deployment over traditional in-house datacenters. For example, Amazon's S3 provides storage and backup services for numerous...

    Provided By University of Washington

  • White Papers // Jan 2010

    A Conference Control Protocol for Highly Interactive Video-conferencing

    Video-conferencing is an efficient means for distributed collaboration especially for people separated by substantial distance. One can identify various paradigms of distributed multimedia collaboration. The interactive video-conference paradigm requires the highest degree of interactivity and scalability. A desirable paradigm for interactive videoconferences requires a number of media channels for video...

    Provided By University of Washington

  • White Papers // Jun 2010

    Bottom-Up Learning of Markov Network Structure

    The structure of a Markov network is typically learned using top-down search. At each step, the search specializes a feature by conjoining it to the variable or feature that most improves the score. This is inefficient, testing many feature variations with no support in the data, and highly prone to...

    Provided By University of Washington

  • White Papers // Oct 2008

    Scale-Free Network Structure Explains the City-Size Distribution

    Zipf's law is one of the most well-known empirical regularities of the city-size distribution and explaining it has long been the Holy Grail of urban economics. There is extensive research on the subject, where each city is treated equally in terms of transactions with other cities. Recent developments in network...

    Provided By University of Washington

  • White Papers // Jan 2010

    Learning Source Descriptions for Data Integration

    To build a data-integration system, the application designer must specify a mediated schema and supply the descriptions of data sources. A source description contains a source schema that describes the content of the source, and a map-ping between the corresponding elements of the source schema and the mediated schema. Manually...

    Provided By University of Washington

  • White Papers // May 2010

    ETTM: A Scalable Network Operating System

    In this paper, authors design, implement, and evaluate a new scalable and fault tolerant network operating system, called ETTM, for securely and efficiently managing network resources at a packet granularity. The aim is to provide network administrators a greater degree of control over network behavior at lower cost, and network...

    Provided By University of Washington

  • White Papers // Sep 2010

    Ready-for-Use: 3 Weeks of Parallelism and Concurrency in a Required Second-Year Data-Structures Course

    There is a big difference between believing an undergraduate curriculum ought to expose students to concurrency early and actually doing it - and doing it in a way that non-experts can teach and that fits within other curricular constraints. The author argue that a core data-structures course for second-year students...

    Provided By University of Washington

  • White Papers // Feb 2010

    Programming Idioms for Transactional Events

    Transactional Events (TE) are an extension of Concurrent ML (CML), a programming model for synchronous message-passing. Prior work has focused on TE's formal semantics and its implementation. This paper considers programming idioms, particularly those that vary unexpectedly from the corresponding CML idioms. First, the authors solve a subtle problem with...

    Provided By University of Washington

  • White Papers // May 2011

    Tunable Static Inference for Generic Universe Types

    Object ownership is useful for many applications, including program verification, thread synchronization, and memory management. However, the annotation overhead of ownership type systems hampers their widespread application. This paper addresses this issue by presenting a tunable static type inference for Generic Universe Types. In contrast to classical type systems, ownership...

    Provided By University of Washington

  • White Papers // Mar 2010

    Tunable Universe Type Inference

    Object ownership is useful for many applications such as program verification, thread synchronization, and memory management. However, even lightweight ownership type systems impose considerable annotation overhead, which hampers their widespread application. This paper addresses this issue by presenting a tunable static type inference for Universe types. In contrast to classical...

    Provided By University of Washington

  • White Papers // Dec 2010

    DuctileScala: Combined Static and Dynamic Feedback for Scala

    Programmers receive feedback about program correctness in several ways. The most common static feedback is type-checking: if a program type-checks successfully, then all program executions are guaranteed to be free of certain classes of errors. Dynamic feedback is obtained by running a program and observing the output of a single...

    Provided By University of Washington

  • White Papers // Jan 2012

    Type-Directed Completion of Partial Expressions

    Modern programming frameworks provide enormous libraries arranged in complex structures, so much so that a large part of modern programming is searching for APIs that "Surely exist" somewhere in an unfamiliar part of the framework. The authors present a novel way of phrasing a search for an unknown API: the...

    Provided By University of Washington

  • White Papers // Aug 2011

    User Centered Design and Evaluation of an Eye Movement-Based Biometric Authentication System

    Biometric authentication systems offer advantages over knowledge-based and token-based systems because the authors do not require users to remember anything or carry a physical object. However, usability and acceptability issues have often been neglected in favor of optimizing technical performance. They present on the design and development of a novel...

    Provided By University of Washington

  • White Papers // Mar 2012

    User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

    Modern client platforms, such as iOS, Android, Windows Phone, Windows 8, and web browsers, run each application in an isolated environment with limited privileges. A pressing open problem in such systems is how to allow users to grant applications access to user-owned resources, e.g., to privacy- and cost-sensitive devices like...

    Provided By University of Washington

  • White Papers // Aug 2009

    Rhizoma: A Runtime for Self-Deploying, Self-Managing Overlays

    The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing resource availability, and differing application requirements create a complex optimization problem. Most existing cloud applications are managed externally, and this separation can lead to increased response time to...

    Provided By University of Washington

  • White Papers // Aug 2010

    Model-Based Testing Without a Model: Assessing Portability in the Seattle Testbed

    Despite widespread OS, network, and hardware heterogeneity, there has been a lack of research into quantifying and improving portability of a programming environment. The authors have constructed a distributed testbed called Seattle built on a platform-independent programming API that is implemented on different operating systems and architectures. Their goal is...

    Provided By University of Washington

  • White Papers // Jun 2011

    DeSEO: Combating Search-Result Poisoning

    The authors perform an in-depth study of SEO attacks that spread malware by poisoning search results for popular queries. Such attacks, although recent, appear to be both widespread and effective. They compromise legitimate Web sites and generate a large number of fake pages targeting trendy keywords. They first dissect one...

    Provided By University of Washington

  • White Papers // Sep 2009

    Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks

    Planning a complex software modification task imposes a high cognitive burden on developers, who must juggle navigating the software, understanding what they see with respect to their task, and deciding how their task should be performed given what they have discovered. Pragmatic reuse tasks, where source code is reused in...

    Provided By University of Washington

  • White Papers // Aug 2011

    New Directions for Self-Destructing Data Systems

    This paper seeks to advance the state of the art in practical self-destructing data systems that secure sensitive data from disclosure in the highly mobile, social-networked, cloud-computing world. The authors' work facilitates the automatic, timed, and simultaneous destruction of all copies of a self-destructing data object (such as a message...

    Provided By University of Washington

  • White Papers // May 2009

    Symbol by Symbol Doppler Rate Estimation for Highly Mobile Underwater OFDM

    The authors propose an OFDM-receiver capable of estimating and correcting, on a symbol-by-symbol basis, the subcarrier dependent Doppler shifting due to the movement of source and receiver in an underwater acoustic network. They propose two methods of estimation: one of which is based upon the marginal maximum likelihood principle, and...

    Provided By University of Washington

  • White Papers // May 2009

    On Feature Based Automatic Classification of Single and Multitone Signals

    The authors consider the problem of feature based automatic classification of single and multitone signals. Their objective is to extend existing blind demodulation techniques to multitone waveforms such as MIL-STD-188-110B (Appendix B) and OFDM, developing a capability to identify signal types based on short data records, and maintaining robustness to...

    Provided By University of Washington

  • White Papers // Mar 2011

    A Software Radio-Based UHF RFID Reader for PHY/MAC Experimentation

    The authors present the design and evaluation of a flexible UHF RFID reader that enables new PHY/MAC designs to be prototyped and evaluated. Their reader is built using the USRP software radio platform in conjunction with software they developed in the open-source GNU Radio framework. They believe it is the...

    Provided By University of Washington

  • White Papers // Mar 2011

    Dewdrop: An Energy-Aware Runtime for Computational RFID

    Computational RFID (CRFID) tags embed sensing and computation into the physical world. The operation of the tags is limited by the RF energy that can be harvested from a nearby power source. The authors present a CRFID runtime, Dewdrop that makes effective use of the harvested energy. Dewdrop treats iterative...

    Provided By University of Washington