Communications of the Acm
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Communications of the Acm
COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform. -
Benchmarks for IP Forwarding Tables
Reviewers James Abello Richard Cleve Vassos Hadzilacos Dimitris Achilioptas James Clippinger Jim Hafner Micah Adler Anne Condon Torben Hagerup Oswin Aichholzer Stephen Cook Armin Haken William Aiello Tom Cormen Shai Halevi Donald Aingworth Dan Dooly Eric Hansen Susanne Albers Oliver Duschka Refael Hassin Eric Allender Martin Dyer Johan Hastad Rajeev Alur Ran El-Yaniv Lisa Hellerstein Andris Ambainis David Eppstein Monika Henzinger Amihood Amir Jeff Erickson Tom Henzinger Artur Andrzejak Kousha Etessami Jeremy Horwitz Boris Aronov Will Evans Russell Impagliazzo Sanjeev Arora Guy Even Piotr Indyk Amotz Barnoy Ron Fagin Sandra Irani Yair Bartal Michalis Faloutsos Ken Jackson Julien Basch Martin Farach-Colton David Johnson Saugata Basu Uri Feige John Jozwiak Bob Beals Joan Feigenbaum Bala Kalyandasundaram Paul Beame Stefan Felsner Ming-Yang Kao Steve Bellantoni Faith Fich Haim Kaplan Micahel Ben-Or Andy Fingerhut Bruce Kapron Josh Benaloh Paul Fischer Michael Kaufmann Charles Bennett Lance Fortnow Michael Kearns Marshall Bern Steve Fortune Sanjeev Khanna Nikolaj Bjorner Alan Frieze Samir Khuller Johannes Blomer Anna Gal Joe Kilian Avrim Blum Naveen Garg Valerie King Dan Boneh Bernd Gartner Philip Klein Andrei Broder Rosario Gennaro Spyros Kontogiannis Nader Bshouty Ashish Goel Gilad Koren Adam Buchsbaum Michel Goemans Dexter Kozen Lynn Burroughs Leslie Goldberg Dina Kravets Ran Canetti Paul Goldberg S. Ravi Kumar Pei Cao Oded Goldreich Eyal Kushilevitz Moses Charikar John Gray Stephen Kwek Chandra Chekuri Dan Greene Larry Larmore Yi-Jen Chiang -
MODELING and ANALYSIS of MOBILE TELEPHONY PROTOCOLS by Chunyu Tang a DISSERTATION Submitted to the Faculty of the Stevens Instit
MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS by Chunyu Tang A DISSERTATION Submitted to the Faculty of the Stevens Institute of Technology in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Chunyu Tang, Candidate ADVISORY COMMITTEE David A. Naumann, Chairman Date Yingying Chen Date Daniel Duchamp Date Susanne Wetzel Date STEVENS INSTITUTE OF TECHNOLOGY Castle Point on Hudson Hoboken, NJ 07030 2013 c 2013, Chunyu Tang. All rights reserved. iii MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS ABSTRACT The GSM (2G), UMTS (3G), and LTE (4G) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. This poses serious challenges in ensuring authentication and other security properties. Analyzing the security of all possible interoperation scenarios by hand is, at best, tedious under- taking. Model checking techniques provide an effective way to automatically find vulnerabilities in or to prove the security properties of security protocols. Although the specifications address the interoperation cases between GSM and UMTS and the switching and mapping of established security context between LTE and previous technologies, there is not a comprehensive specification of which are the possible interoperation cases. Nor is there comprehensive specification of the procedures to establish security context (authentication and short-term keys) in the various interoperation scenarios. We systematically enumerate the cases, classifying them as allowed, disallowed, or uncertain with rationale based on detailed analysis of the specifications. We identify the authentication and key agreement procedure for each of the possible cases. We formally model the pure GSM, UMTS, LTE authentication protocols, as well as all the interoperation scenarios; we analyze their security, in the symbolic model of cryptography, using the tool ProVerif. -
Department of Computer Science
i cl i ck ! MAGAZINE click MAGAZINE 2014, VOLUME II FIVE DECADES AS A DEPARTMENT. THOUSANDS OF REMARKABLE GRADUATES. 50COUNTLESS INNOVATIONS. Department of Computer Science click! Magazine is produced twice yearly for the friends of got your CS swag? CS @ ILLINOIS to showcase the innovations of our faculty and Commemorative 50-10 Anniversary students, the accomplishments of our alumni, and to inspire our t-shirts are available! partners and peers in the field of computer science. Department Head: Editorial Board: Rob A. Rutenbar Tom Moone Colin Robertson Associate Department Heads: Rob A. Rutenbar shop now! my.cs.illinois.edu/buy Gerald DeJong Michelle Wellens Jeff Erickson David Forsyth Writers: David Cunningham CS Alumni Advisory Board: Elizabeth Innes Alex R. Bratton (BS CE ’93) Mike Koon Ira R. Cohen (BS CS ’81) Rick Kubetz Vilas S. Dhar (BS CS ’04, BS LAS BioE ’04) Leanne Lucas William M. Dunn (BS CS ‘86, MS ‘87) Tom Moone Mary Jane Irwin (MS CS ’75, PhD ’77) Michelle Rice Jennifer A. Mozen (MS CS ’97) Colin Robertson Daniel L. Peterson (BS CS ’05) Laura Schmitt Peter L. Tannenwald (BS LAS Math & CS ’85) Michelle Wellens Jill C. Zmaczinsky (BS CS ’00) Design: Contact us: SURFACE 51 [email protected] 217-333-3426 Machines take me by surprise with great frequency. Alan Turing 2 CS @ ILLINOIS Department of Computer Science College of Engineering, College of Liberal Arts & Sciences University of Illinois at Urbana-Champaign shop now! my.cs.illinois.edu/buy click i MAGAZINE 2014, VOLUME II 2 Letter from the Head 4 ALUMNI NEWS 4 Alumni -
Lipics-ISAAC-2020-42.Pdf (0.5
Multiparty Selection Ke Chen Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Adrian Dumitrescu Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Abstract Given a sequence A of n numbers and an integer (target) parameter 1 ≤ i ≤ n, the (exact) selection problem is that of finding the i-th smallest element in A. An element is said to be (i, j)-mediocre if it is neither among the top i nor among the bottom j elements of S. The approximate selection problem is that of finding an (i, j)-mediocre element for some given i, j; as such, this variant allows the algorithm to return any element in a prescribed range. In the first part, we revisit the selection problem in the two-party model introduced by Andrew Yao (1979) and then extend our study of exact selection to the multiparty model. In the second part, we deduce some communication complexity benefits that arise in approximate selection. In particular, we present a deterministic protocol for finding an approximate median among k players. 2012 ACM Subject Classification Theory of computation Keywords and phrases approximate selection, mediocre element, comparison algorithm, i-th order statistic, tournaments, quantiles, communication complexity Digital Object Identifier 10.4230/LIPIcs.ISAAC.2020.42 1 Introduction Given a sequence A of n numbers and an integer (selection) parameter 1 ≤ i ≤ n, the selection problem asks to find the i-th smallest element in A. If the n elements are distinct, the i-th smallest is larger than i − 1 elements of A and smaller than the other n − i elements of A. -
Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today. -
The Changing Shape of the Computing World
Outside the Box — The Changing Shape of the Computing World Steve Cunningham Computer Science California State University Stanislaus Turlock, CA 95382 [email protected] http://www.cs.csustan.edu/~rsc Something happened to computing while many of us were busy practicing or teaching our craft, and computing is not quite the same thing we learned. We can ignore this change and others will take our place and teach about it, but they will not have the context and the skill to understand the technology behind it and to carry it forward to the success it should have. And if others carry that torch, computer science will be stunted because we didn't recognize and respond to the opportunity. What happened? Simply this—that Xerox and Apple and, yes, Microsoft opened up the box labeled “CAUTION: Computer Inside” and let the user into the computing picture. Users responded hesitantly but increasingly eagerly and now expect the computer to work for them instead of their working for the computer. Every application now in wide use, and any system that supports a general market, has evolved to meet that expectation. Any computing education that does not pay attention to the user’s role in computing is missing the most vibrant and exciting part of computing today. As it says at the top of this page, you are reading an editorial, not an academic paper. As an editorial, this note represents my personal passion and commitment to the user communication part of computing that the “official” computing establishment has long discounted, and I appreciate John Impagliazzo’s offer of this forum to make my case that computer science is missing the boat in not understanding the need to reshape computer science education to fill this void. -
COT 5407:Introduction to Algorithms Author and Copyright: Giri Narasimhan Florida International University Lecture 1: August 28, 2007
COT 5407:Introduction to Algorithms Author and Copyright: Giri Narasimhan Florida International University Lecture 1: August 28, 2007. 1 Introduction The field of algorithms is the bedrock on which all of computer science rests. Would you jump into a business project without understanding what is in store for you, without know- ing what business strategies are needed, without understanding the nature of the market, and without evaluating the competition and the availability of skilled available workforce? In the same way, you should not undertake writing a program without thinking out a strat- egy (algorithm), without theoretically evaluating its performance (algorithm analysis), and without knowing what resources you will need and you have available. While there are broad principles of algorithm design, one of the the best ways to learn how to be an expert at designing good algorithms is to do an extensive survey of “case studies”. It provides you with a storehouse of strategies that have been useful for solving other problems. When posed with a new problem, the first step is to “model” your problem appropriately and cast it as a problem (or a variant) that has been previously studied or that can be easily solved. Often the problem is rather complex. In such cases, it is necessary to use general problem-solving techniques that one usually employs in modular programming. This involves breaking down the problem into smaller and easier subproblems. For each subproblem, it helps to start with a skeleton solution which is then refined and elaborated upon in a stepwise manner. Once a strategy or algorithm has been designed, it is important to think about several issues: why is it correct? does is solve all instances of the problem? is it the best possible strategy given the resource limitations and constraints? if not, what are the limits or bounds on the amount of resources used? are improved solutions possible? 2 History of Algorithms It is important for you to know the giants of the field, and the shoulders on which we all stand in order to see far. -
Jacob O. Wobbrock, Ph.D. Curriculum Vitae Professor, the Information School [email protected] by Courtesy, Paul G
20-Sept-2021 1 of 29 Jacob O. Wobbrock, Ph.D. Curriculum Vitae Professor, The Information School [email protected] By Courtesy, Paul G. Allen School of Computer Science & Engineering Homepage Director, ACE Lab Google Scholar Founding Co-Director, CREATE Center University of Washington Box 352840 Seattle, WA, USA 98195-2840 BIOGRAPHY______________________________________________________________________________________________ Jacob O. Wobbrock is a Professor of human-computer interaction (HCI) in The Information School, and, by courtesy, in the Paul G. Allen School of Computer Science & Engineering at the University of Washington, which U.S. News ranked the 8th best global university for 2021. Prof. Wobbrock’s work seeks to scientifically understand people’s experiences of computers and information, and to improve those experiences by inventing new interactive technologies, especially for people with disabilities. His specific research topics include input & interaction techniques, human performance measurement & modeling, HCI research & design methods, mobile computing, and accessible computing. Prof. Wobbrock has co-authored ~200 publications and 19 patents, receiving 25 paper awards, including 7 best papers and 8 honorable mentions from ACM CHI, the flagship conference in HCI. For his work in accessible computing, he received the 2017 SIGCHI Social Impact Award and the 2019 SIGACCESS ASSETS Paper Impact Award. He was named the #1 Most Influential Scholar in HCI by the citation-ranking system AMiner in 2018 and 2021, and was runner-up in 2020. He was also inducted into the prestigious CHI Academy in 2019. His work has been covered in The New York Times, The Washington Post, The Huffington Post, USA Today, and other outlets. He is the recipient of an NSF CAREER award and 7 other National Science Foundation grants. -
Meredith Ringel Morris [email protected], [email protected] Google Scholar Page
Meredith Ringel Morris [email protected], [email protected] http://merrie.info, Google Scholar page OVERVIEW I am an internationally-recognized expert in Human Computer Interaction (HCI), focusing on the design, development, and evaluation of collaborative, social, and accessible technologies, including working at the boundary of HCI and AI to develop responsible AI-based technologies that enhance the capabilities of all people. I am seeking opportunities to do world-changing research and/or lead a high-impact team at the intersection of HCI and AI, drawing on my unique expertise in collaborative and accessible computing to invent the next generation of inclusive technologies. Areas of expertise: gesture interfaces, collaborative technologies, social media, social search, Q&A systems, information retrieval, crowdsourcing, accessible and assistive technologies, digital inclusion, universal design, human-centered AI, responsible AI EDUCATION 2006 Ph.D. in Computer Science, Stanford University 2003 M.S. in Computer Science, Stanford University 2001 Sc.B. in Computer Science, Brown University (Magna Cum Laude) PROFESSIONAL EXPERIENCE 2021 - present Google Research Director and Principal Scientist, People + AI Research 2006 - 2021 Microsoft Research Sr. Principal Researcher and Research Manager • Founder and Research Manager of the Ability group (2018 – 2020) • Redmond Lab Leadership Team member (2020 - 2021) • Research Area Manager for Interaction, Accessibility, and Mixed Reality (2020 – 2021) 2001 – 2006 Stanford University Department -
Bit Barrier: Secure Multiparty Computation with a Static Adversary
Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary Varsha Dani Valerie King Mahnush Mohavedi University of New Mexico University of Victoria University of New Mexico Jared Saia University of New Mexico Abstract We describe scalable algorithms for secure multiparty computation (SMPC). We assume a synchronous message passing communication model, but unlike most related work, we do not assume the existence of a broadcast channel. Our main result holds for the case where there are n players, of which a 1=3 − fraction are controlled by an adversary, for any positive constant.p We describe a SMPC algorithm forp this model that requires each player to send ~ n+m ~ n+m O( n + n) messages and perform O( n + n) computations to compute any function f, where m is the size of a circuit to compute f. We also consider a model where all players are selfish but rational. In this model, we describe a Nash equilibrium protocol that solve SMPC ~ n+m ~ n+m and requires each player to send O( n ) messages and perform O( n ) computations. These results significantly improve over past results for SMPC which require each player to send a number of bits and perform a number of computations that is θ(nm). 1 Introduction In 1982, Andrew Yao posed a problem that has significantly impacted the weltanschauung of computer security research [22]. Two millionaires want to determine who is wealthiest; however, neither wants to reveal any additional information about their wealth. Can we design a protocol to allow both millionaires to determine who is wealthiest? This problem is an example of the celebrated secure multiparty computation (SMPC) problem. -
Dina Goldin · Scott A. Smolka · Peter Wegner (Eds.) Dina Goldin Scott A
Dina Goldin · Scott A. Smolka · Peter Wegner (Eds.) Dina Goldin Scott A. Smolka Peter Wegner (Eds.) Interactive Computation The New Paradigm With 84 Figures 123 Editors Dina Goldin Scott A. Smolka Brown University State University of New York at Stony Brook Computer Science Department Department of Computer Science Providence, RI 02912 Stony Brook, NY 11794-4400 USA USA [email protected] [email protected] Peter Wegner Brown University Computer Science Department Providence, RI 02912 USA [email protected] Cover illustration: M.C. Escher’s „Whirlpools“ © 2006 The M.C. Escher Company-Holland. All rights reserved. www.mcescher.com Library of Congress Control Number: 2006932390 ACM Computing Classification (1998): F, D.1, H.1, H.5.2 ISBN-10 3-540-34666-X Springer Berlin Heidelberg New York ISBN-13 978-3-540-34666-1 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broad- casting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2006 The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant pro- tective laws and regulations and therefore free for general use.