Department of Computer Science
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
MODELING and ANALYSIS of MOBILE TELEPHONY PROTOCOLS by Chunyu Tang a DISSERTATION Submitted to the Faculty of the Stevens Instit
MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS by Chunyu Tang A DISSERTATION Submitted to the Faculty of the Stevens Institute of Technology in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Chunyu Tang, Candidate ADVISORY COMMITTEE David A. Naumann, Chairman Date Yingying Chen Date Daniel Duchamp Date Susanne Wetzel Date STEVENS INSTITUTE OF TECHNOLOGY Castle Point on Hudson Hoboken, NJ 07030 2013 c 2013, Chunyu Tang. All rights reserved. iii MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS ABSTRACT The GSM (2G), UMTS (3G), and LTE (4G) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. This poses serious challenges in ensuring authentication and other security properties. Analyzing the security of all possible interoperation scenarios by hand is, at best, tedious under- taking. Model checking techniques provide an effective way to automatically find vulnerabilities in or to prove the security properties of security protocols. Although the specifications address the interoperation cases between GSM and UMTS and the switching and mapping of established security context between LTE and previous technologies, there is not a comprehensive specification of which are the possible interoperation cases. Nor is there comprehensive specification of the procedures to establish security context (authentication and short-term keys) in the various interoperation scenarios. We systematically enumerate the cases, classifying them as allowed, disallowed, or uncertain with rationale based on detailed analysis of the specifications. We identify the authentication and key agreement procedure for each of the possible cases. We formally model the pure GSM, UMTS, LTE authentication protocols, as well as all the interoperation scenarios; we analyze their security, in the symbolic model of cryptography, using the tool ProVerif. -
Legislators of Cyberspace: an Analysis of the Role Of
SHAPING CODE Jay P. Kesan* & Rajiv C. Shah** I. INTRODUCTION ............................................................................................................................ 4 II. THE CASE STUDIES: THE DEVELOPMENT OF CODE WITHIN INSTITUTIONS.............................. 13 A. World Wide Web......................................................................................................... 14 1. Libwww............................................................................................................ 14 2. NCSA Mosaic .................................................................................................. 16 B. Cookies ........................................................................................................................ 21 1. Netscape’s Cookies .......................................................................................... 21 2. The IETF’s Standard for Cookies .................................................................... 24 C. Platform for Internet Content Selection....................................................................... 28 D. Apache......................................................................................................................... 34 III. LEGISLATIVE BODIES: SOCIETAL INSTITUTIONS THAT DEVELOP CODE ................................. 37 A. Universities.................................................................................................................. 38 B. Firms........................................................................................................................... -
For Immediate Release
FOR IMMEDIATE RELEASE ACM - Association for Computing Machinery IEEE Computer Society Contacts: Virginia Gold Margo McCall 212-626-0505 714-816-2182 [email protected] [email protected] ACM, IEEE COMPUTER SOCIETY HONOR INNOVATOR OF HIGH-PERFORMANCE COMPUTER SYSTEMS DESIGNS University of Wisconsin’s Sohi Developed Advances Widely Adopted by Microprocessor Manufacturers to Increase the Power of Computing NEW YORK, MAY 4, 2011 -- ACM (the Association for Computing Machinery) and the IEEE Computer Society (IEEE-CS) will jointly present the Eckert-Mauchly Award to Gurindar S. (Guri) Sohi of the University of Wisconsin-Madison for pioneering widely used micro-architectural techniques in the design of high-performance microprocessors. These innovations increase the instruction-level parallelism, a measure of how many operations in a computer program can be performed simultaneously. They can be found in almost every commercial microprocessor used today in personal computers and high-end servers. The Eckert Mauchly Award http://awards.acm.org/eckert_mauchly www.computer.org/portal/web/awards/eckert is known as the computer architecture community’s most prestigious award. Sohi will receive the 2011 Eckert-Mauchly Award at the International Symposium on Computer Architecture (ISCA), held as part of the Federated Computing Research Conference (FCRC) http://www.acm.org/fcrc, June 7, 2011, in San Jose, CA. Early in his career, Sohi articulated a model for a dynamically scheduled processor supporting precise exceptions. This model has served as the basis for many commercial superscalar microprocessors that have been designed and built since the early 1990s. His group also proposed the idea of memory dependence prediction to further improve instruction-level parallelism, a technology that has been considered a key innovation in some recent microprocessors. -
Live Nation Entertainment, Inc. (Exact Name of Registrant As Specified in Its Charter)
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of The Securities Exchange Act of 1934 Date of Report (Date of Earliest Event Reported): June 6, 2018 Live Nation Entertainment, Inc. (Exact name of registrant as specified in its charter) Delaware 001-32601 20-3247759 (State or other jurisdiction (Commission File No.) (I.R.S. Employer of incorporation) Identification No.) 9348 Civic Center Drive Beverly Hills, California 90210 (Address of principal executive offices) (Zip Code) (310) 867-7000 Registrant’s telephone number, including area code: Not Applicable (Former name or former address, if changed since last report.) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: ¨ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ¨ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ¨ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ¨ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter). Emerging growth company ¨ If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for ¨ complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act. -
Lipics-ISAAC-2020-42.Pdf (0.5
Multiparty Selection Ke Chen Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Adrian Dumitrescu Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Abstract Given a sequence A of n numbers and an integer (target) parameter 1 ≤ i ≤ n, the (exact) selection problem is that of finding the i-th smallest element in A. An element is said to be (i, j)-mediocre if it is neither among the top i nor among the bottom j elements of S. The approximate selection problem is that of finding an (i, j)-mediocre element for some given i, j; as such, this variant allows the algorithm to return any element in a prescribed range. In the first part, we revisit the selection problem in the two-party model introduced by Andrew Yao (1979) and then extend our study of exact selection to the multiparty model. In the second part, we deduce some communication complexity benefits that arise in approximate selection. In particular, we present a deterministic protocol for finding an approximate median among k players. 2012 ACM Subject Classification Theory of computation Keywords and phrases approximate selection, mediocre element, comparison algorithm, i-th order statistic, tournaments, quantiles, communication complexity Digital Object Identifier 10.4230/LIPIcs.ISAAC.2020.42 1 Introduction Given a sequence A of n numbers and an integer (selection) parameter 1 ≤ i ≤ n, the selection problem asks to find the i-th smallest element in A. If the n elements are distinct, the i-th smallest is larger than i − 1 elements of A and smaller than the other n − i elements of A. -
SIGARCH FY'06 Annual Report July 2005- June 2006 Submitted By
SIGARCH FY’06 Annual Report July 2005- June 2006 Submitted by: Norm Jouppi, SIGARCH Chair Overview The primary mission of SIGARCH continues to be the forum where researchers and practitioners of computer architecture can exchange ideas. SIGARCH sponsors or cosponsors the premier conferences in the field as well as a number of workshops. It publishes a quarterly newsletter and the proceedings of several conferences. It is financially strong with a fund balance of over one million dollars. The SIGARCH bylaws are available online at http://www.acm.org/sigs/bylaws/arch_bylaws.html Officers and Directors The most recent SIGARCH election was held in the spring of 2003. Norm Jouppi of HP currently serves as SIGARCH Chair, with Margaret Martonosi of Princeton as Vice Chair and Matt Farrens of UC Davis as Secretary/Treasurer. SIGARCH has a four member Board of Directors, which currently consist of Alan Berenbaum, Joel Emer, Bill Dally, and Mark Hill. Alan Berenbaum also serves as Past Chair. In addition to these elected positions, Doug DeGroot serves as the Editor of the SIGARCH newsletter Computer Architecture News, and Doug Burger serves as Information Director, providing SIGARCH information online. The current slate of officers and directors has unanimously agreed to accept the optional 2-year term extension, as approved by the ACM SIG Governing Board Executive Committee. This means the term of the current officers and directors will expire in June 2007. Awards The Eckert-Mauchly Award, cosponsored by the IEEE Computer Society, is the most prestigious award in computer architecture. SIGARCH endows its half of the award, which is presented annually at the Awards Banquet of ISCA. -
NCSA Access Magazine
Biology Workbench 2 Biology Workbench Unravels the Human Genome 5 Enhancing Structural Biology Research through MDScope 6 New Features Enhance Alpha Shapes oftware NEW TECHNOLOGY CALVIN: A Collaborative Environment for 10 Design in Virtual Reality @AT: : User Support with an Interactive Web-Based System 12 GI CRAY Origin2000 Installed 13 netWorkPlace: Enlarging the Scope of Your Next Work Place 14 Adding Video to the Net: Video+ Mosaic= Vosaic 16 NC it Web Update 1 19 Partnership Illinois 20 CyberEducation Takes to the Road 21 Illinois's First Community Networks Conference 22 hell Oil Joins NCSA's Industrial Program 22 23 24 cover images CALVIN courtesy Ja on Leiah, EVL/UIC· Biology Workbench, court y hankar Subramaniam, C A; Vo ai , ourtesy Roy Campbell, UIUC access retro pective, in id cov r De ign d by Meadow abelko, C A Fran Bond, editor of access from 1989- 1996, retired this pa t ummer. It has everything a molecular or structural biologist wants: databases, analysis tools, and the computational power of a supercomputer. To use it, researchers only need access to the Internet. Listening to an exasperated Curt Jamison This should be good news. Research by Holly Korab describe the four to eight hours he used on everything from the common cold to to spend juggling DNA data between cancer is heavily dependent on sequence three different software packages on three structure-function studies. Sequence refers different computers, it is easy to under to the string of DNA that specifies the stand the love-hate relationship many order of amino acids defining a protein. -
COT 5407:Introduction to Algorithms Author and Copyright: Giri Narasimhan Florida International University Lecture 1: August 28, 2007
COT 5407:Introduction to Algorithms Author and Copyright: Giri Narasimhan Florida International University Lecture 1: August 28, 2007. 1 Introduction The field of algorithms is the bedrock on which all of computer science rests. Would you jump into a business project without understanding what is in store for you, without know- ing what business strategies are needed, without understanding the nature of the market, and without evaluating the competition and the availability of skilled available workforce? In the same way, you should not undertake writing a program without thinking out a strat- egy (algorithm), without theoretically evaluating its performance (algorithm analysis), and without knowing what resources you will need and you have available. While there are broad principles of algorithm design, one of the the best ways to learn how to be an expert at designing good algorithms is to do an extensive survey of “case studies”. It provides you with a storehouse of strategies that have been useful for solving other problems. When posed with a new problem, the first step is to “model” your problem appropriately and cast it as a problem (or a variant) that has been previously studied or that can be easily solved. Often the problem is rather complex. In such cases, it is necessary to use general problem-solving techniques that one usually employs in modular programming. This involves breaking down the problem into smaller and easier subproblems. For each subproblem, it helps to start with a skeleton solution which is then refined and elaborated upon in a stepwise manner. Once a strategy or algorithm has been designed, it is important to think about several issues: why is it correct? does is solve all instances of the problem? is it the best possible strategy given the resource limitations and constraints? if not, what are the limits or bounds on the amount of resources used? are improved solutions possible? 2 History of Algorithms It is important for you to know the giants of the field, and the shoulders on which we all stand in order to see far. -
Bit Barrier: Secure Multiparty Computation with a Static Adversary
Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary Varsha Dani Valerie King Mahnush Mohavedi University of New Mexico University of Victoria University of New Mexico Jared Saia University of New Mexico Abstract We describe scalable algorithms for secure multiparty computation (SMPC). We assume a synchronous message passing communication model, but unlike most related work, we do not assume the existence of a broadcast channel. Our main result holds for the case where there are n players, of which a 1=3 − fraction are controlled by an adversary, for any positive constant.p We describe a SMPC algorithm forp this model that requires each player to send ~ n+m ~ n+m O( n + n) messages and perform O( n + n) computations to compute any function f, where m is the size of a circuit to compute f. We also consider a model where all players are selfish but rational. In this model, we describe a Nash equilibrium protocol that solve SMPC ~ n+m ~ n+m and requires each player to send O( n ) messages and perform O( n ) computations. These results significantly improve over past results for SMPC which require each player to send a number of bits and perform a number of computations that is θ(nm). 1 Introduction In 1982, Andrew Yao posed a problem that has significantly impacted the weltanschauung of computer security research [22]. Two millionaires want to determine who is wealthiest; however, neither wants to reveal any additional information about their wealth. Can we design a protocol to allow both millionaires to determine who is wealthiest? This problem is an example of the celebrated secure multiparty computation (SMPC) problem. -
SIGARCH Annual Report July 2009 - June 2010
SIGARCH Annual Report July 2009 - June 2010 Overview The primary mission of SIGARCH continues to be the forum where researchers and practitioners of computer architecture can exchange ideas. SIGARCH sponsors or cosponsors the premier conferences in the field as well as a number of workshops. It publishes a quarterly newsletter and the proceedings of several conferences. It is financially strong with a fund balance of over two million dollars. The SIGARCH bylaws are available online at http://www.acm.org/sigs/bylaws/arch_bylaws.html. Officers and Directors During the past fiscal year Doug Burger served as SIGARCH Chair, David Wood served as Vice Chair, and Kevin Skadron served as Secretary/Treasurer. Margaret Martonosi , Krste Asanovic, Bill Dally, and Sarita Adve served on the board of directors, and Norm Jouppi also served as Past Chair. In addition to these elected positions, Doug DeGroot continues to serve as the Editor of the SIGARCH newsletter Computer Architecture News, and Nathan Binkert was appointed as the new SIGARCH Information Director, providing SIGARCH information online. Rob Schreiber serves as SIGARCH’s liaison on the SC conference steering committee. The Eckert-Mauchly Award, cosponsored by the IEEE Computer Society, is the most prestigious award in computer architecture. SIGARCH endows its half of the award, which is presented annually at the Awards Banquet of ISCA. Bill Dally of NVidia and Stanford University received the award in 2010, "For outstanding contributions to the architecture of interconnection networks and parallel computers.” Last year, SIGARCH petitioned ACM to increase the ACM share of the award to $10,000, using an endowment taken from the SIGARCH fund balance, which ACM has approved. -
2013 Avis Founder/ CEO Gail Goodman
Founder Founder/ CEO Co-Founder Former CEO Founder & CEO Robin Chase Gail Goodman Helen Greiner Linda Hall Keller Sue Washer IPO: 2011 Nasdaq IPO: 2007 Nasdaq IPO: 2005 Nasdaq Acquired 2006 CVS IPO: 2014 Nasdaq Sold: 2013 Avis Sold: 2015 Endurance WOMEN CAPITAL CONNECTIONS Springboard Enterprises accelerates the growth of entrepreneurial companies led by women through access to essential resources and a global community of experts. Springboard Enterprises is a 501(c)3 organization acting globally to accelerate women entrepreneurs’ access to human, financial, and capital resources. Our signature programs, sector- and geography- specific accelerators for market-ready companies, are powered by an active and world class network of investors, advisors, and entrepreneurs. We place great emphasis on collaboration with organizations in the private and public sectors to deliver measurable results. 2 Proven Track Record 15+Years Billions in Tens of Thousands 642 84% $7.4B 14 of Companies Raised Capital Capital Raised IPOs Revenues Jobs Created 14 IPOs Including… 3 Decade-long history in Canada “Laser-like Focus on Women Entrepreneurs” "A few might wonder if there is demand or a need for a group with a laser-like focus on helping women entrepreneurs. There is and it is called Springboard.“ - John Backus, New Atlantic Ventures 5 High-Touch * Market Ready * Results Recruit Market-ready Tech, Fashion Tech, Media, Health & Bio Companies Key Features Corporate and Investor Presentation Virtual Pre-screen Sessions Online + Offline: Impact-focused plus strategic virtual connections Companies Assigned Personal Advisory Plan Review by Team Expert Network Selective: We over deliver on value for ~30-40 companies/year Underserved Market: In Person Orientation In-person interview and Assessment Sessions Targeting funding gap for women-led companies & the Select ~10 Companies engagement of women leaders 6 Not a “One Size Fits All” Approach The Dolphin Tank®: Pitch sessions for aspiring, idea-stage and early-stage entrepreneurs seeking actionable feedback and connections. -
Who Owns 3D Scans of Historic Sites? Three-Dimensional Scanning Can Be Used to Protect Or Rebuild Historic Structures, but Who Owns That Digital Data?
news Society | DOI:10.1145/3290410 Esther Shein Who Owns 3D Scans of Historic Sites? Three-dimensional scanning can be used to protect or rebuild historic structures, but who owns that digital data? IGH ATOP THE Thomas Jeffer- son Memorial in Washing- ton, D.C., is a layer of biofilm covering the dome, darken- ing and discoloring it. Bio- Hfilm is “a colony of microscopic organ- isms that adheres to stone surfaces,” according to the U.S. National Park Ser- vice, which needed to get a handle on its magnitude to get an accurate cost estimate for the work to remove it. Enter CyArk, a non-profit organi- zation that uses three-dimensional (3D) laser scanning and photogram- metry to digitally record and archive some of the world’s most significant cultural artifacts and structures. CyArk spent a week covering “every inch” of the dome, processed the data, and returned a set of engineer- ing drawings to the Park Service “to quantify down to the square inch how much biofilm is on the monument,’’ says CEO John Ristevski. “This is an example of where data is being used to solve a problem,” to help preserve a historical structure, he says. Ristevski says the Park Service was not charged for the data, and the work CyArk did was funded by individual Capturing photogrammetric data for the digital reconstruction of a badly damaged temple in donors in the San Francisco Bay Area, the ancient city of Bagan, in central Myanmar. where the company is located. CyArk is one of several organiza- data to build extremely precise 3D to use them to raise awareness of their tions using 3D scanning to help pro- models, says Yves Ubelmann, an ar- historical sites,’’ he says.