Letter from the President
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Next Digital Decade Essays on the Future of the Internet
THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus NextDigitalDecade.com TechFreedom techfreedom.org Washington, D.C. This work was published by TechFreedom (TechFreedom.org), a non-profit public policy think tank based in Washington, D.C. TechFreedom’s mission is to unleash the progress of technology that improves the human condition and expands individual capacity to choose. We gratefully acknowledge the generous and unconditional support for this project provided by VeriSign, Inc. More information about this book is available at NextDigitalDecade.com ISBN 978-1-4357-6786-7 © 2010 by TechFreedom, Washington, D.C. This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Cover Designed by Jeff Fielding. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 3 TABLE OF CONTENTS Foreword 7 Berin Szoka 25 Years After .COM: Ten Questions 9 Berin Szoka Contributors 29 Part I: The Big Picture & New Frameworks CHAPTER 1: The Internet’s Impact on Culture & Society: Good or Bad? 49 Why We Must Resist the Temptation of Web 2.0 51 Andrew Keen The Case for Internet Optimism, Part 1: Saving the Net from Its Detractors 57 Adam Thierer CHAPTER 2: Is the Generative -
SIGOPS Annual Report 2012
SIGOPS Annual Report 2012 Fiscal Year July 2012-June 2013 Submitted by Jeanna Matthews, SIGOPS Chair Overview SIGOPS is a vibrant community of people with interests in “operatinG systems” in the broadest sense, includinG topics such as distributed computing, storaGe systems, security, concurrency, middleware, mobility, virtualization, networkinG, cloud computinG, datacenter software, and Internet services. We sponsor a number of top conferences, provide travel Grants to students, present yearly awards, disseminate information to members electronically, and collaborate with other SIGs on important programs for computing professionals. Officers It was the second year for officers: Jeanna Matthews (Clarkson University) as Chair, GeorGe Candea (EPFL) as Vice Chair, Dilma da Silva (Qualcomm) as Treasurer and Muli Ben-Yehuda (Technion) as Information Director. As has been typical, elected officers agreed to continue for a second and final two- year term beginning July 2013. Shan Lu (University of Wisconsin) will replace Muli Ben-Yehuda as Information Director as of AuGust 2013. Awards We have an excitinG new award to announce – the SIGOPS Dennis M. Ritchie Doctoral Dissertation Award. SIGOPS has lonG been lackinG a doctoral dissertation award, such as those offered by SIGCOMM, Eurosys, SIGPLAN, and SIGMOD. This new award fills this Gap and also honors the contributions to computer science that Dennis Ritchie made durinG his life. With this award, ACM SIGOPS will encouraGe the creativity that Ritchie embodied and provide a reminder of Ritchie's leGacy and what a difference a person can make in the field of software systems research. The award is funded by AT&T Research and Alcatel-Lucent Bell Labs, companies that both have a strong connection to AT&T Bell Laboratories where Dennis Ritchie did his seminal work. -
An Invitation to Model-Theoretic Galois Theory
AN INVITATION TO MODEL-THEORETIC GALOIS THEORY. ALICE MEDVEDEV AND RAMIN TAKLOO-BIGHASH Abstract. We carry out some of Galois’ work in the setting of an arbitrary first-order theory T . We replace the ambient algebraically closed field by a large model M of T , replace fields by definably closed subsets of M, assume that T codes finite sets, and obtain the fundamental duality of Galois theory matching subgroups of the Galois group of L over F with intermediate exten- sions F ≤ K ≤ L. This exposition of a special case of [11] has the advantage of requiring almost no background beyond familiarity with fields, polynomials, first-order formulae, and automorphisms. 1. Introduction. Two hundred years ago, Evariste´ Galois contemplated symmetry groups of so- lutions of polynomial equations, and Galois theory was born. Thirty years ago, Saharon Shelah found it necessary to work with theories that eliminate imaginar- ies; for an arbitrary theory, he constructed a canonical definitional expansion with this property in [16]. Poizat immediately recognized the importance of a theory already having this property in its native language; indeed, he defined “elimina- tion of imaginaries” in [11]. It immediately became clear (see [11]) that much of Galois theory can be developed for an arbitrary first-order theory that eliminates imaginaries. This model-theoretic version of Galois theory can be generalized be- yond finite or even infinite algebraic extensions, and this can in turn be useful in other algebraic settings such as the study of Galois groups of polynomial differential equations (already begun in [11]) and linear difference equations. On a less applied note, it is possible to bring further ideas into the model-theoretic setting, as is done in [10] for the relation between Galois cohomology and homogeneous spaces. -
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space Adam Smith Shuang Song Abhradeep Thakurta Boston University Google Research, Brain Team Google Research, Brain Team [email protected] [email protected] [email protected] Abstract We revisit the problem of counting the number of distinct elements F0(D) in a data stream D, over a domain [u]. We propose an ("; δ)-differentially private algorithm that approximates F0(D) within a factor of (1 ± γ), and with additive error of p O( ln(1/δ)="), using space O(ln(ln(u)/γ)/γ2). We improve on the prior work at least quadratically and up to exponentially, in terms of both space and additive p error. Our additive error guarantee is optimal up to a factor of O( ln(1/δ)), n ln(u) 1 o and the space bound is optimal up to a factor of O min ln γ ; γ2 . We assume the existence of an ideal uniform random hash function, and ignore the space required to store it. We later relax this requirement by assuming pseudo- random functions and appealing to a computational variant of differential privacy, SIM-CDP. Our algorithm is built on top of the celebrated Flajolet-Martin (FM) sketch. We show that FM-sketch is differentially private as is, as long as there are p ≈ ln(1/δ)=(εγ) distinct elements in the data set. Along the way, we prove a structural result showing that the maximum of k i.i.d. random variables is statisti- cally close (in the sense of "-differential privacy) to the maximum of (k + 1) i.i.d. -
About Technews About SIG Newsletters
PRINT AND ONLINE ADVERTISING OPPORTUNITIES About TechNews About SIG Newsletters TechNews is an email digest of computing and technology ACM’s 37 Special Interest Groups (SIGs) represent news gathered from leading sources; distributed Monday, the major disciplines of the dynamic computing fi eld. Wednesday, and Friday to a circulation of over 105,000 ACM’s SIGs are invested in advancing the skills of their subscribers. Its concise summaries are perfect for busy members, keeping them abreast of emerging trends and professionals who need and want to keep up with the driving innovation across a broad spectrum of computing latest industry developments. disciplines. TechNews is regularly cited as one of ACM’s most valued As a member benefit, many ACM SIGs provide its members benefits and is one of the best ways to communicate with with a print or online newsletter covering news and events ACM members. within the realm of their fields. Circulation SIGACCESS: ACM SIGACCESS Newsletter* SIGACT: SIGACT News Listserv 105,000 SIGAda: Ada Letters SIGAI: AI Matters* Online Advertising Opportunities SIGAPP: Applied Computing Review* Right-hand sidebar position SIGBED: SIGBED Review* Size Dimensions Rates SIGBio: ACM SIGBio Record* Top Banner 468 x 60 IMU $6500/Month* SIGCAS: Computers & Society Newsletter* Skyscraper 160 x 600 IMU $6000/Month* SIGCOMM: Computer Communication Review* Square Ad 160 x 160 IMU $2500/Month* SIGCSE: SIGCSE Bulletin* SIGDOC: Communication Design Quarterly* * 12 Transmissions SIGecom: ACM SIGecom Exchanges* Maximum File Size: -
Prizes and Awards Session
PRIZES AND AWARDS SESSION Wednesday, July 12, 2021 9:00 AM EDT 2021 SIAM Annual Meeting July 19 – 23, 2021 Held in Virtual Format 1 Table of Contents AWM-SIAM Sonia Kovalevsky Lecture ................................................................................................... 3 George B. Dantzig Prize ............................................................................................................................. 5 George Pólya Prize for Mathematical Exposition .................................................................................... 7 George Pólya Prize in Applied Combinatorics ......................................................................................... 8 I.E. Block Community Lecture .................................................................................................................. 9 John von Neumann Prize ......................................................................................................................... 11 Lagrange Prize in Continuous Optimization .......................................................................................... 13 Ralph E. Kleinman Prize .......................................................................................................................... 15 SIAM Prize for Distinguished Service to the Profession ....................................................................... 17 SIAM Student Paper Prizes .................................................................................................................... -
SIGPLAN FY '05 Annual Report
SIGPLAN FY '05 Annual Report July 2004—June 2005 Submitted by Jack W. Davidson, SIGPLAN Chair This year ACM SIGPLAN has continued its active sponsorship of many conferences and workshops as well as its two newsletters. SIGPLAN's present financial situation is strong, and our fund balance grew in FY 2005 after three consec- utive years of losses. Our fund balance comfortably exceeds the required minimum. Our conferences overall incurred financial gains, including OOPSLA, our largest conference, which had incurred a significant financial loss for each of the three preceding years. We were more selective with funding worthwhile projects such as student travel, funding these at about one half the level of recent years. A good resource for monitoring our activities is our web page, found at http://www.acm.org/sigplan/. 1. Conferences We sponsored seven annual conferences last year, GPCE (with SIGSOFT), ICFP, LCTES (with SIGBED), OOP- SLA, PLDI, POPL (with SIGACT), and PPDP. We also sponsored PPoPP and ISMM, which are held approxi- mately biannually. Of these conferences, PLDI, POPL and PPoPP appear in the Citeseer top 15 of more than 1200 Computer Science publication venues, based on their citation rates. We sponsored numerous workshops, including AADEBUG, BUGS, CUFP, Erlang, FOOL, Haskell, IVME, MSP, PLAN-X, Scheme, TLDI, and PEPM. Financial results for our conferences were positive. Conference attendance has been holding steady, with a dramatic increase in student participation. Conferences continue to receive far more submissions than we can accept, and our major conferences continue to be extremely selective. We have separate steering committees for all of our conferences. -
Hardness of Non-Interactive Differential Privacy from One-Way
Hardness of Non-Interactive Differential Privacy from One-Way Functions Lucas Kowalczyk* Tal Malkin† Jonathan Ullman‡ Daniel Wichs§ May 30, 2018 Abstract A central challenge in differential privacy is to design computationally efficient non-interactive algorithms that can answer large numbers of statistical queries on a sensitive dataset. That is, we would like to design a differentially private algorithm that takes a dataset D Xn consisting of 2 some small number of elements n from some large data universe X, and efficiently outputs a summary that allows a user to efficiently obtain an answer to any query in some large family Q. Ignoring computational constraints, this problem can be solved even when X and Q are exponentially large and n is just a small polynomial; however, all algorithms with remotely similar guarantees run in exponential time. There have been several results showing that, under the strong assumption of indistinguishability obfuscation (iO), no efficient differentially private algorithm exists when X and Q can be exponentially large. However, there are no strong separations between information-theoretic and computationally efficient differentially private algorithms under any standard complexity assumption. In this work we show that, if one-way functions exist, there is no general purpose differen- tially private algorithm that works when X and Q are exponentially large, and n is an arbitrary polynomial. In fact, we show that this result holds even if X is just subexponentially large (assuming only polynomially-hard one-way functions). This result solves an open problem posed by Vadhan in his recent survey [Vad16]. *Columbia University Department of Computer Science. -
Communication Complexity (For Algorithm Designers)
Full text available at: http://dx.doi.org/10.1561/0400000076 Communication Complexity (for Algorithm Designers) Tim Roughgarden Stanford University, USA [email protected] Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000076 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is T. Roughgarden. Communication Complexity (for Algorithm Designers). Foundations and Trends R in Theoretical Computer Science, vol. 11, nos. 3-4, pp. 217–404, 2015. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-115-3 c 2016 T. Roughgarden All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Cen- ter, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged. -
2021 ACM Awards Call for Nominations
Turing Award The A. M. Turing Award is ACM's oldest and most prestigious award. It is presented annually to an individual or a group of individuals who have made lasting contributions of a technical nature to the computing community. The long-term influence of a candidate’s work is taken into consideration, but there should be a singular outstanding and trend-setting technical achievement that constitutes the claim of the award. The award is presented each June at the ACM Awards Banquet and is accompanied by a prize of $1,000,000 plus travel expenses to the banquet. Financial support for the award is provided by Google Inc. ACM Prize in Computing The ACM Prize in Computing recognizes an early to mid-career fundamental and innovative contribution in computing theory or practice that through, its impact, and broad implications, exemplifies the greatest achievements of the discipline. The candidate’s contribution should be relatively recent (typically within the last decade), but enough time should have passed to evaluate impact. While there are no specific requirements as to age or time since last degree requirements, the candidate typically would be approaching mid-career. The Prize carries a prize of $250,000. Financial support for the award is provided by Infosys Ltd. ACM Frances E. Allen Award for Outstanding Mentoring The Frances E. Allen Award for Outstanding Mentoring will be presented for the first time in 2021. This award will recognize individuals who have exemplified excellence and/or innovation in mentoring with particular attention to individuals who have shown outstanding leadership in promoting diversity, equity, and inclusion in computing. -
An Axiomatic Approach to Block Rewards
An Axiomatic Approach to Block Rewards Xi Chen Christos Papadimitriou Tim Roughgarden [email protected] [email protected] [email protected] Columbia University Columbia University Columbia University New York, NY 10027 New York, NY 10027 New York, NY 10027 ABSTRACT of view and the methodology of Economic Theory, the science of Proof-of-work blockchains reward each miner for one completed incentives. block by an amount that is, in expectation, proportional to the Flaws in the incentives of a blockchain protocol can manifest number of hashes the miner contributed to the mining of the block. themselves at multiple timescales. For longest-chain proof-of-work Is this proportional allocation rule optimal? And in what sense? And blockchains like Bitcoin, the most well-studied incentive-based what other rules are possible? In particular, what are the desirable attacks, such as selfish mining [4, 5, 10] and transaction sniping [3], properties that any łgoodž allocation rule should satisfy? To answer concern miners reasoning strategically over multiple block creation these questions, we embark on an axiomatic theory of incentives in epochs. For example, in selfish mining, a miner relinquishes revenue proof-of-work blockchains at the time scale of a single block. We in the short term to achieve greater revenue (in expectation) in the consider desirable properties of allocation rules including: symme- long run via a type of forking attack. try; budget balance (weak or strong); sybil-proofness; and various This paper studies incentive issues and potential deviations from grades of collusion-proofness. We show that Bitcoin’s proportional intended miner behavior at the most basic time scale, that of a allocation rule is the unique allocation rule satisfying a certain single block creation epoch. -
On a Generalization of the Hadwiger-Nelson Problem
On a generalization of the Hadwiger-Nelson problem Mohammad Bardestani, Keivan Mallahi-Karai October 15, 2018 Abstract For a field F and a quadratic form Q defined on an n-dimensional vector space V over F , let QGQ, called the quadratic graph associated to Q, be the graph with the vertex set V where vertices u; w 2 V form an edge if and only if Q(v − w) = 1. Quadratic graphs can be viewed as natural generalizations of the unit-distance graph featuring in the famous Hadwiger-Nelson problem. In the present paper, we will prove that for a local field F of characteristic zero, the Borel chromatic number of QGQ is infinite if and only if Q represents zero non-trivially over F . The proof employs a recent spectral bound for the Borel chromatic number of Cayley graphs, combined with an analysis of certain oscillatory integrals over local fields. As an application, we will also answer a variant of question 525 proposed in the 22nd British Combinatorics Conference 2009 [6]. 1 Introduction The celebrated Hadwiger-Nelson problem asks for the minimum number of colors required to color n R such that no two points at distance one from each other have the same color. Recall that the chromatic number of a graph G, denoted by χ(G), is the least cardinal c such that the vertices of G can be partitioned into c sets (called color classes) such that no color class contains an edge in G. Hence, the Hadwiger-Nelson problem is the question of finding χ(Gn), where Gn is the graph with vertex set n V (Gn) = R , where the adjacency of vertices x; y 2 V (Gn) is defined by the equation Q(x − y) = 1; 2 2 n here, Q(x1; : : : ; xn) = x1 + ··· + xn is the canonical positive-definite quadratic form on R .