Search
Now showing items 11-20 of 111
Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches
(2005-10-10)
Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low ...
MPEG-2 in a Stream Programming Language
(2005-10-22)
Image and video codecs are prevalent in multimedia applications, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncommon however that developers create ...
Towards Realizing the Performance and Availability Benefits of a Global Overlay Network
(2005-11-01)
Prior analyses of the benefits of routing overlays are based onplatforms consisting of nodes located primarily in North America, onthe academic Internet, and at the edge of the network. This paper isthe first global study ...
Towards the Prevention of Dyslexia
(2005-10-18)
Previous studies have shown that dyslexic individuals who supplement windowed reading practice with intensive small-scale hand-eye coordination tasks exhibit marked improvement in their reading skills. Here we examine ...
Learning to Trade with Insider Information
(2005-10-07)
This paper introduces algorithms for learning how to trade usinginsider (superior) information in Kyle's model of financial markets.Prior results in finance theory relied on the insider having perfectknowledge of the ...
Asymptotics of Gaussian Regularized Least-Squares
(2005-10-20)
We consider regularized least-squares (RLS) with a Gaussian kernel. Weprove that if we let the Gaussian bandwidth $\sigma \rightarrow\infty$ while letting the regularization parameter $\lambda\rightarrow 0$, the RLS solution ...
Automatic Software Upgrades for Distributed Systems
(2005-10-06)
Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...
Knowledge Flow Analysis for Security Protocols
(2005-10-19)
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...
Regulating financial conglomerates
(CFAP, Cambridge Judge Business School, University of Cambridge, 2005)
We investigate the optimal regulation of financial conglomerates which combine a bank and a non-bank financial institution. The conglomerate’s risk-taking incentives depend upon the level of market discipline it faces, ...
Aggregate liquidity shortages, idiosyncracic liquidity smoothing and banking regulation
(CFAP, Cambridge Judge Business School, University of Cambridge, 2005)
This paper develops a model of banking fragility driven by aggregate liquidity shortages. Inefficiencies arise because liquidity smoothing across banks breaks down when there is such a shortage, causing unnecessary and ...