User Behavior Modeling with Large-Scale Graph Analysis Alex Beutel May 2016 CMU-CS-16-105

Total Page:16

File Type:pdf, Size:1020Kb

User Behavior Modeling with Large-Scale Graph Analysis Alex Beutel May 2016 CMU-CS-16-105 User Behavior Modeling with Large-Scale Graph Analysis Alex Beutel May 2016 CMU-CS-16-105 Computer Science Department School of Computer Science Carnegie Mellon University Pittsburgh, PA Thesis Committee: Christos Faloutsos, Co-Chair Alexander J. Smola, Co-Chair Geoffrey J. Gordon Philip S. Yu, University of Illinois at Chicago Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Copyright © 2016 Alex Beutel. This research was sponsored under the National Science Foundation Graduate Research Fellowship Program (Grant no. DGE- 1252522) and a Facebook Fellowship. This research was also supported by the National Science Foundation under grants num- bered IIS-1017415, CNS-1314632 and IIS-1408924, as well as the Army Research Laboratory under Cooperative Agreement Number W911NF-09-2-0053. I also would like to thank the CMU Parallel Data Laboratory OpenCloud for providing infrastructure for ex- periments; this research was funded, in part, by the NSF under award CCF-1019104, and the Gordon and Betty Moore Foundation, in the eScience project. Also, I would like to thank the Open Cloud Consortium (OCC) and the Open Science Data Cloud (OSDC) for the use of resources on the OCC-Y Hadoop cluster, which was donated to the OCC by Yahoo! The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. Keywords: behavior modeling, graph mining, scalable machine learning, fraud detection, recommendation systems, clustering, co-clustering, factorization, machine learning systems, distributed systems Dedicated to my family. Jess, Mom, Dad, Stephen, Grandma, Papa, Nanny and Pa—I love you. iv Abstract Can we model how fraudsters work to distinguish them from normal users? Can we predict not just which movie a person will like, but also why? How can we find when a student will become confused or where patients in a hospital system are getting infected? How can we effectively model large attributed graphs of complex interactions? In this dissertation we understand user behavior through modeling graphs. Online, users interact not just with each other in social networks, but also with the world around them—supporting politicians, watching movies, buying clothing, searching for restaurants and finding doctors. These interactions often include insightful contextual information as attributes, such as the time of the interaction and ratings or reviews about the interaction. The breadth of interactions and contextual information being stored presents a new frontier for graph modeling. To improve our modeling of user behavior, we focus on three broad chal- lenges: (1) modeling abnormal behavior, (2) modeling normal behavior and (3) scaling machine learning. To more effectively model and detect abnormal behavior, we model how fraudsters work, catching previously undetected fraud on Facebook, Twitter, and Tencent Weibo and improving classification accuracy by up to 68%. By designing flexible and interpretable models of normal behavior, we can predict why you will like a particular movie. Last, we scale modeling of large hypergraphs by designing machine learning systems that scale to hundreds of gigabytes of data, billions of parameters, and are 26 times faster than previous methods. This dissertation provides a foundation for making graph modeling useful for many other applications as well as offers new directions for designing more powerful and flexible models. vi Acknowledgements First and foremost, I want to thank my entire family for fostering my curiosity to get me to graduate school and then supporting me through it. Thank you Jess, for giving me such deep love and happiness for the past five years. Thank you Mom and Dad, for always encouraging me to do my best, not just in my work but as a person, for being my compass through graduate school, and for always being there, even in my difficult times. Thank you Stephen, for always being a much-needed grounding force in my life, consistently providing clarity when I was lost. Thank you Papa and Grandma—it is your unreasonable confidence in me and combination of intellectual idealism and real-world perceptiveness that has brought me here and helped me succeed. Nanny and Pa—I think about you often and deeply wish you were still here. Thank you to my many aunts, uncles, cousins, and Jess’s entire family, who have all been there for me at key points in graduate school. It cannot be overstated the role that my advisors had in my thesis, my time in graduate school, my career, and my life going forward. I want to thank Christos Faloutsos, for his patience and persistence with me as a young student, and his support throughout graduate school. He has taught me how to be an academic, and more broadly, how to simultaneously be a mentor, colleague and friend. Additionally, I want to thank Alex Smola, who has, since even before he came to CMU, pushed me and my research forward, making me learn new concepts and broaden my perspective. From technical insights to career opportunities, he repeatedly guided me down paths that I didn’t know were possible. I am forever grateful to you both. Additionally, I want to thank the rest of my committee: Geoff Gordon and Philip Yu. Thank you both for your comments, feedback and guidance that significantly shaped and focused this thesis. Graduate school has been an exciting experience primarily because of my friends. They have helped me through courses, been my collaborators, outlet for relaxation, and general source of support. Everyone in Christos’s database group has become like family. Vagelis Papalexakis—despite entering graduate school at the same time, you have been an academic big brother to me, both literally and figuratively. I want to thank Aditya Prakash, Danai Koutra, Leman Akoglu, Polo Chau, and U Kang for creating a welcoming environment, mentoring me as a young graduate student and continuing to be be there for me long after leaving CMU. I also want to thank Neil Shah, Jay-Yoon Lee, Rishi Chandy, Bryan Hooi, Hemank Lamba, Hyun Ah Song, Dhivya Eswaran and Kijung Shin for making the database group awesome, being fun to work with, hang out with, and everything in between. Beyond those in the database group, I have had many amazing collaborators without whom this dissertation would not have been possible—Abhimanu Kumar, Meng Jiang, Amr Ahmed, Chao-Yuan Wu, Kenton Murray, Partha Talukdar, and Stephan Günnemann. All of the work in this dissertation came from truly collaborative endeavors, and I feel lucky to have had such great friends to work with in these efforts. Additionally, I would like to thank Venkat Guruswami, Peng Cui, Eric Xing and Qirong Ho who also offered their valuable insights at key points in my research. vii Last, but certainly not least, I want to thank my friends from outside of my research life. Thank you Matteus Tanha, Anthony Brooks, David Naylor, Nico Feltman, David Wit- mer, Richard Wang, John Dickerson, Dougal Sutherland, Elie Krevat, Andrew O’Rourke and the many, many others that have made me love Pittsburgh and my time here. I also want to thank Marilyn Walgora and Deborah Cavlovich. You have both been essential in making my time at Carnegie Mellon go smoothly and pleasantly; I greatly appreciate all of your help and extra effort, far beyond what is reasonable. Marilyn— enjoy retirement! You deserve the break one thousand times over. One of the most exciting parts of my time in graduate school has been my summer internships. I have been extremely lucky to have had great mentors every summer. Thank you Wanhong Xu, Chris Palow, Lars Bakstrom, Markus Weimer, Vijay Narayanan, Ed Chi, and Zhiyuan Cheng for providing such wonderful environments for research, and for grounding my work back at Carnegie Mellon. In particular, I want to thank Wanhong Xu, who in my first summer as an intern at Facebook, got me started working on fraud detection, and for which his intuition on the problem provided the foundation for much of the rest of my fraud detection research in graduate school. Additionally, I want to thank Ed Chi, both for making my time at Google interesting, and also for his selfless support during my job search. Additionally, I want to thank Tina Eliassi-Rad, who has been indispensable in her guidance and support throughout my job search, and also always makes conferences far more fun. I also do not want to forget how I got to graduate school. Thank you to my many friends and colleagues at Duke University who helped me get into graduate school and continued to be sources of support throughout graduate school. In particular, I want thank Pankaj Agarwal and Thomas Mølhave for making me fall in love with research and continuing to be mentors long after I left Duke. Additionally, I want to thank all of my childhood, high school and college friends who have kept me tied to the real world and worked to keep me grounded despite my esoteric explorations. You all know who you are. This is a bittersweet end to a consequential period of my life. Thank you all for making it so. viii Contents I Introduction and Background1 1 Introduction3 1.1 Overview and Contributions..........................4 1.1.1 Modeling Abnormal Behavior.....................4 1.1.2 Modeling Normal Behavior.......................6 1.1.3 Scalable Machine Learning.......................8 1.2 Overarching Thesis Statements......................... 10 2 Preliminaries and Background 11 2.1 Graph Structure.................................. 11 2.2 Mathematical data structures.......................... 13 2.3 Model Structure.................................. 14 2.3.1 Factorization............................... 14 2.3.2 Clustering................................. 15 2.4 Learning...................................... 17 II Modeling Abnormal Behavior 19 II.1 Related Work..................................
Recommended publications
  • How to Study Mathematics – the Manual for Warsaw University 1St Year Students in the Interwar Period
    TECHNICAL TRANSACTIONS CZASOPISMO TECHNICZNE FUNDAMENTAL SCIENCES NAUKI PODSTAWOWE 2-NP/2015 KALINA BARTNICKA* HOW TO STUDY MATHEMATICS – THE MANUAL FOR WARSAW UNIVERSITY 1ST YEAR STUDENTS IN THE INTERWAR PERIOD JAK STUDIOWAĆ MATEMATYKĘ – PORADNIK DLA STUDENTÓW PIERWSZEGO ROKU Z OKRESU MIĘDZYWOJENNEGO Abstract In 1926 and in 1930, members of Mathematics and Physics Students’ Club of the Warsaw University published the guidance for the first year students. These texts would help the freshers in constraction of the plans and course of theirs studies in the situation of so called “free study”. Keywords: Warsaw University, Interwar period, “Free study”, Study of Mathematics, Freshers, Students’ clubs, Guidance for students Streszczenie W 1926 r. i w 1930 r. Koło Naukowe Matematyków i Fizyków Studentów Uniwersytetu War- szawskiego opublikowało poradnik dla studentów pierwszego roku matematyki. Są to teksty, które pomagały pierwszoroczniakom w racjonalnym skonstruowaniu planu i toku ich studiów w warunkach tzw. „wolnego stadium”. Słowa kluczowe: Uniwersytet Warszawski, okres międzywojenny, „wolne stadium”, studio­ wanie matematyki, pierwszoroczniacy, studenckie koła naukowe, poradnik dla studentów DOI: 10.4467/2353737XCT.15.203.4408 * L. & A. Birkenmajetr Institute of History of Science, Polish Academy of Sciences, Warsaw, Poland; [email protected] 14 This paper is focused primarily on the departure from the “free study” in university learning in Poland after it regained its independence in 1918. The idea of the “free study” had been strongly cherished by professors and staff of the Philosophy Department of Warsaw University even though the majority of students (including the students of mathematics and physics) were not interested in pursuing an academic career. The concept of free study left to the students the decision about the choice of subjects they wished to study and about the plan of their work.
    [Show full text]
  • Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives
    Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives THÈSE NO 5415 (2012) PRÉSENTÉE LE 27 AOÛT 2012 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pouyan SEPEHRDAD acceptée sur proposition du jury: Prof. E. Telatar, président du jury Prof. S. Vaudenay, directeur de thèse Prof. A. Canteaut, rapporteur Prof. A. Lenstra, rapporteur Prof. W. Meier, rapporteur Suisse 2012 To my two angels of God, my mother and father whom without their help, devotion, affection, love and support not only this dissertation could not be accomplished, but I was not able to put my feet one step forward towards improvement. Abstract Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks, we need lightweight and ultra-lightweight algorithms. Hence, cryptographers often search for a fair trade-off between security and usability depending on the application. Contrary to public key primitives, which are often based on some hard problems, security in symmetric key is often based on some heuristic assumptions. Often, the researchers in this area argue that the security is based on the confidence level the community has in their design. Consequently, everyday symmetric protocols appear in the literature and stay secure until someone breaks them.
    [Show full text]
  • Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
    Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) Jean-Philippe Aumasson1⋆, Jorge Nakahara Jr.2⋆⋆, and Pouyan Sepehrdad2 1 FHNW, Windisch, Switzerland 2 EPFL, Lausanne, Switzerland [email protected], {jorge.nakahara,pouyan.sepehrdad}@epfl.ch Abstract. MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to se- cure multimedia broadcasting, including recent applications like HDTV and mobile TV. It is the only cipher specified in the 2007 Japanese ARIB standard for conditional access systems. This paper presents a theoretical break of MULTI2 (not relevant in practice), with shortcut key recovery attacks for any number of rounds. We also describe equivalent keys and linear attacks on reduced versions with up 20 rounds (out of 32), improv- ing on the previous 12-round attack by Matsui and Yamagishi. Practical attacks are presented on up to 16 rounds. Keywords: ISDB, ARIB, MULTI2, block cipher, linear cryptanalysis, conditional access 1 Introduction MULTI2 is a block cipher developed by Hitachi in 1988 for general-purpose applications, but which has mainly been used for securing multimedia content. It was registered in ISO/IEC 99793 [8] in 1994, and is patented in the U.S. [13, 14] and in Japan [7]. MULTI2 is the only cipher specified in the 2007 Japanese standard ARIB for conditional access systems [2]. ARIB is the basic standard of the recent ISDB (for Integrated Services Digital Broadcasting), Japan’s standard for digital television and digital radio (see http://www.dibeg.org/) Since 1995, MULTI2 is the cipher used by satellite and terrestrial broadcast- ers in Japan [16, 18] for protecting audio and video streams, including HDTV, mobile and interactive TV.
    [Show full text]
  • Kazimierz Kuratowski (Warsaw)
    Kazimierz Kuratowski (Warsaw) THE PAST AND THE PRESENT OF THE POLISH SCHOOL OF MATHEMATICS I am concentrating in this article on two main subjects. Firstly: I am trying to answer the question what brought about such an “explosion” of mathematics in a country in whose scientific tradition there was hardly any mathematics and which happened at the time when after an over-one-century-long foreign rule the nation was trying hard to reconstruct its now independent country, ravaged by the First World War. Secondly: was this explosion a short-lived enthusiasm or, on the contrary, the Polish school of .mathematics struck roots so deeply that it was sub­ sequently able to survive the cataclysm of the Second World War and rebuild in the new circumastances — in People’s Poland — the internationally re­ cognized edifice of Polish mathematics? There will be in this article no mathematical theorems, no definitions or geometrical constructions. I shall be trying to use the language which can be understood without mathematical qualifications. It is therefore my hope that this text will be intelligible not only to mathematicians.1 1. PRECURSORS OF THE POLISH SCHOOL OF MATHEMATICS It was the years 1918—1920 when the Polish School of Mathematics was emerging. Before describing this period and the subsequent years one should, I think, review, be it only summarily, the contemporary state of Polish mathematics. I am going to mention those of its representatives the majority of whom had in fact been active in the 19th century but who also worked in the 20th century and so could influence the formation of the School of Mathematics being thus its precursors as it were.
    [Show full text]
  • Neptune Township Tax List Book: 1 Block/Lot: 101/1
    NEPTUNE TOWNSHIP TAX LIST BOOK: 1 BLOCK/LOT: 101/1 NEW JERSEY PROPERTY TAX SYSTEM LEGEND QUALIFICATION BUILDING DESCRIPTION REAL PROPERTY EXEMPT PROPERTY LIMITED EXEMPTIONS CODE EXPLANATION Format: Stories-Structure-Style-Garage CLASS CODES CLASS CODES CODE EXPLANATION S Sector Number Prefix STORIES D Dutch Colonial TAXABLE PROPERTY W Ward Number Prefix S Prefix S with no. of stories E English Tudor C Condo Unit No. Prefix F Cape Cod LOT Lot only is owned STRUCTURE L Colonial 1 Vacant Land 15A Public School Property E Fire Suppression System BLDG Building only is owned AL Aluminum Siding M Mobile Home 2 Residential 15B Other School Property F Fallout Shelter HM Hackensack Meadow Lands B Brick R Rancher 3A Farm (Regular) 15C Public Property P Pollution Control X Exmpt. Port. of Taxable Property CB Concrete Block S Split Level 3B Farm (Qualified) 15D Church & Charit. Property W Water Supply Control HL Highlands F Frame T Twin 4A Commercial 15E Cemeteries & Graveyards G Commercial Indust. Exempt. FP Flood Plain M Metal W Row Home 4B Industrial 15F Other Exempt. I Dwelling Exemption M Mobile Home RC Reinforced Concrete X Duplex 4C Apartment J Dwelling Abatement PL Pine Lands S Stucco Z Raised Rancher K New Dwelling/Conversion Z Coastal Zone SS Structural Steel O Other RAILROAD PROPERTY DEDUCTIONS Exemption L Wet Lands ST Stone 2 Bi-Level CODE EXPLANATION L New Dwelling/Conversion B Billboard W Wood 3 Tri-Level 5A Railroad Class I Abatement T Cell Tower 5B Railroad Class II N Mulitiple Dwelling Exemption QFARM Qualified Farmland STYLE GARAGE S Senior Citizen O Multiple Dwelling Abatement A Commercial AG Attached Garage PERSONAL PROPERTY V Veteran U Urban Enterprise Zone Abate.
    [Show full text]
  • Confidentiality and Tamper--Resistance of Embedded Databases Yanli Guo
    Confidentiality and Tamper--Resistance of Embedded Databases Yanli Guo To cite this version: Yanli Guo. Confidentiality and Tamper--Resistance of Embedded Databases. Databases [cs.DB]. Université de Versailles Saint Quentin en Yvelines, 2011. English. tel-01179190 HAL Id: tel-01179190 https://hal.archives-ouvertes.fr/tel-01179190 Submitted on 21 Jul 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE DE VERSAILLES SAINT-QUENTIN-EN-YVELINES Ecole Doctorale Sciences et Technologies de Versailles - STV Laboratoire PRiSM UMR CNRS 8144 THESE DE DOCTORAT DE L’UNIVERSITE DE VERSAILLES SAINT–QUENTIN–EN–YVELINES présentée par : Yanli GUO Pour obtenir le grade de Docteur de l’Université de Versailles Saint-Quentin-en-Yvelines CONFIDENTIALITE ET INTEGRITE DE BASES DE DONNEES EMBARQUEES (Confidentiality and Tamper-Resistance of Embedded Databases) Soutenue le 6 décembre 2011 ________ Rapporteurs : Didier DONSEZ, Professeur, Université Joseph Fourier, Grenoble PatriCk VALDURIEZ, Directeur de recherche, INRIA, Sophia Antipolis Examinateurs : NiColas
    [Show full text]
  • DVB); Content Protection and Copy Management (DVB-CPCM); Part 4: CPCM System Specification
    ETSI TS 102 825-4 V1.2.2 (2013-12) Technical Specification Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 4: CPCM System Specification 2 ETSI TS 102 825-4 V1.2.2 (2013-12) Reference RTS/JTC-DVB-334-4 Keywords broadcast, digital, DVB, TV ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Low-End Rental Housing the Forgotten Story in L O
    N E W M A N LOW-END RENTAL HOUSING THE FORGOTTEN STORY IN L O W BALTIMORE’S HOUSING BOOM - E N D R E N T A L Sandra J. Newman H O U S I N G THE URBAN INSTITUTE 2100 M Street N.W. Washington, D.C. 20037 Tel: (202) 261-5687 Fax: (202) 467-5775 Web: www.urban.org FUNDED BY THE ABELL FOUNDATION LOW-END RENTAL HOUSING THE FORGOTTEN STORY IN BALTIMORE’S HOUSING BOOM Sandra J. Newman FUNDED BY THE ABELL FOUNDATION Copyright © August 2005. The Urban Institute. All rights re- served. Except for short quotes, no part of this book may be reproduced or used in any form or by any means, electronic or mechanical, including photocopying, recording, or by informa- tion storage or retrieval system, without written permission from the Urban Institute. The Urban Institute is a nonprofit, nonpartisan policy research and educational organization that examines the social, economic, and governance problems facing the nation. The views expressed are those of the author and should not be attributed to the Urban Institute, its trustees, or its funders. CONTENTS Acknowledgments . v Executive Summary . vii The Status of Low-End Rental Housing. 5 Baltimore City Renters . 6 Vacancy Rates and Abandonment . 8 Rents . 10 Affordability. 12 Housing Quality . 14 Neighborhood Quality. 19 Rental Housing Owners. 20 Federally Assisted Housing . 22 What All These Numbers Tell Us . 25 What Should Be Done? . 26 Addressing the Affordability Problem . 26 Addressing the Combined Problems of Affordability and Inadequacy with Project-Based Vouchers . 29 Addressing the Inadequacy Problem .
    [Show full text]
  • CRYPTREC Report 2008 暗号技術監視委員会報告書
    CRYPTREC Report 2008 平成21年3月 独立行政法人情報通信研究機構 独立行政法人情報処理推進機構 「暗号技術監視委員会報告」 目次 はじめに ······················································· 1 本報告書の利用にあたって ······································· 2 委員会構成 ····················································· 3 委員名簿 ······················································· 4 第 1 章 活動の目的 ··················································· 7 1.1 電子政府システムの安全性確保 ··································· 7 1.2 暗号技術監視委員会············································· 8 1.3 電子政府推奨暗号リスト········································· 9 1.4 活動の方針····················································· 9 第 2 章 電子政府推奨暗号リスト改訂について ·························· 11 2.1 改訂の背景 ··················································· 11 2.2 改訂の目的 ··················································· 11 2.3 電子政府推奨暗号リストの改訂に関する骨子······················ 11 2.3.1 現リストの構成の見直し ·································· 12 2.3.2 暗号技術公募の基本方針 ·································· 14 2.3.3 2009 年度公募カテゴリ ···································· 14 2.3.4 今後のスケジュール ······································ 15 2.4 電子政府推奨暗号リスト改訂のための暗号技術公募(2009 年度) ····· 15 2.4.1 公募の概要 ·············································· 16 2.4.2 2009 年度公募カテゴリ ···································· 16 2.4.3 提出書類 ················································ 17 2.4.4 評価スケジュール(予定) ·································· 17 2.4.5 評価項目 ················································ 18 2.4.6 応募暗号説明会の開催 ···································· 19 2.4.7 ワークショップの開催 ···································· 19 2.5
    [Show full text]
  • Szkoły Matematyczne W Międzywojennej Polsce I Ich Związki Z Nauką Światową
    Retrieved from https://czasopisma.uni.lodz.pl/pnh [10.08.2021] PRZEGLĄD NAUK HISTORYCZNYCH 2016, R. XV, NR 2 http://dx.doi.org/10.18778/1644-857X.15.02.07 Małgorzata Przeniosło UNIWERSYTET JANA KOCHANOWSKIEGO W KIELCACH* Szkoły matematyczne w międzywojennej Polsce i ich związki z nauką światową Streszczenie. W okresie międzywojennym polscy matematycy stworzyli dwie prężne szkoły matematyczne – w Warszawie i we Lwowie. W Warszawie twórcami byli: Wacław Sierpiński, Zygmunt Janiszewski, Stefan Mazurkiewicz, a we Lwowie – Hugo Steinhaus i Stefan Banach. Mimo nieistnienia przez wiele lat państwa polskiego i związanych z tym niekorzystnych warunków do rozwoju rodzimej nauki obie szkoły szybko zanotowały znaczące osiągnięcia. Źródłem tego sukcesu było zarówno wpisanie się szkół w nowe trendy w uprawianiu matematyki i założenie odpowiadających im specjalistycznych czasopism – „Fundamenta Mathematicae” oraz „Studia Mathematica”, jak i mnogość zagranicznych podróży naukowych. Oba czasopisma odniosły międzynarodowy sukces i szybko zostały uznane przez obcokrajowców jako odpowiednie forum do prezentacji własnych badań. „Fundamenta Mathematicae” stały się jednym z najważniejszych na świecie periodyków poświęconych teoriiPNH mnogości, „Studia Mathematica” – analizie funkcjonalnej. Czasopisma budowały renomę polskiej szkoły matematycznej, a wraz z jej wzrostem coraz więcej jej przedstawicieli było zapraszanych przez zagraniczne ośrodki naukowe, zarówno na krótkie pobyty, jak i całe cykle wykładów. Coraz więcej zagranicznych uczonych, zarówno znanych profesorów, jak i stypendystów, przyjeżdżało też do Warszawy i Lwowa, by współpracować z tamtejszymi matematykami, wygłaszać wykłady czy uczestniczyć w konferencjach. Słowa kluczowe: historia nauki w II Rzeczypospolitej, matematycy, szkoły matematyczne. dwudziestoleciu międzywojennym polska matematyka zdobyła światowe uznanie, którego nie miała nigdy wcze- W śniej. Stało się to głównie za sprawą dwóch szkół nauko- * Wydział Pedagogiczny i Artystyczny, Instytut Edukacji Szkolnej, Zakład Podstaw Dydaktyki.
    [Show full text]
  • This Is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. Van Oorschot, and S. Vanstone, CRC Press, 1996. F
    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the following specific permissions for the electronic version of this book: Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specific permission above, the standard copyright notice from CRC Press applies to this electronic version: Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press for such copying. c 1997 by CRC Press, Inc. Chapter 15 Patents and Standards Contents in Brief 15.1 Introduction :::::::::::::::::::::::::::::635 15.2 Patents on cryptographic techniques ::::::::::::::::635 15.3 Cryptographic standards ::::::::::::::::::::::645 15.4 Notes and further references ::::::::::::::::::::657 15.1 Introduction This chapter discusses two topics which have signi®cant impact on the use of cryptogra- phy in practice: patents and standards.
    [Show full text]
  • Szkoły Matematyczne W Międzywojennej Polsce I Ich Związki Z Nauką Światową
    Retrieved from https://czasopisma.uni.lodz.pl/pnh [01.10.2021] PRZEGLĄD NAUK HISTORYCZNYCH 2016, R. XV, NR 2 http://dx.doi.org/10.18778/1644-857X.15.02.07 Małgorzata Przeniosło UNIWERSYTET JANA KOCHANOWSKIEGO W KIELCACH* Szkoły matematyczne w międzywojennej Polsce i ich związki z nauką światową Streszczenie. W okresie międzywojennym polscy matematycy stworzyli dwie prężne szkoły matematyczne – w Warszawie i we Lwowie. W Warszawie twórcami byli: Wacław Sierpiński, Zygmunt Janiszewski, Stefan Mazurkiewicz, a we Lwowie – Hugo Steinhaus i Stefan Banach. Mimo nieistnienia przez wiele lat państwa polskiego i związanych z tym niekorzystnych warunków do rozwoju rodzimej nauki obie szkoły szybko zanotowały znaczące osiągnięcia. Źródłem tego sukcesu było zarówno wpisanie się szkół w nowe trendy w uprawianiu matematyki i założenie odpowiadających im specjalistycznych czasopism – „Fundamenta Mathematicae” oraz „Studia Mathematica”, jak i mnogość zagranicznych podróży naukowych. Oba czasopisma odniosły międzynarodowy sukces i szybko zostały uznane przez obcokrajowców jako odpowiednie forum do prezentacji własnych badań. „Fundamenta Mathematicae” stały się jednym z najważniejszych na świecie periodyków poświęconych teoriiPNH mnogości, „Studia Mathematica” – analizie funkcjonalnej. Czasopisma budowały renomę polskiej szkoły matematycznej, a wraz z jej wzrostem coraz więcej jej przedstawicieli było zapraszanych przez zagraniczne ośrodki naukowe, zarówno na krótkie pobyty, jak i całe cykle wykładów. Coraz więcej zagranicznych uczonych, zarówno znanych profesorów, jak i stypendystów, przyjeżdżało też do Warszawy i Lwowa, by współpracować z tamtejszymi matematykami, wygłaszać wykłady czy uczestniczyć w konferencjach. Słowa kluczowe: historia nauki w II Rzeczypospolitej, matematycy, szkoły matematyczne. dwudziestoleciu międzywojennym polska matematyka zdobyła światowe uznanie, którego nie miała nigdy wcze- W śniej. Stało się to głównie za sprawą dwóch szkół nauko- * Wydział Pedagogiczny i Artystyczny, Instytut Edukacji Szkolnej, Zakład Podstaw Dydaktyki.
    [Show full text]