Manuel Blum's CV
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
1 Lenore Blum, Matemática Computacional, Algoritmos, Lógica, Geometría Algebraica
MATEMATICOS ACTUALES Lenore Blum, Matemática computacional, Algoritmos, Lógica, Geometría algebraica. Debemos dejar claro desde el comienzo de esta biografía de Lenore Blum que Blum es su apellido de casada, que solo tomó después de casarse con Manuel Blum, que también era matemático. Sin embargo, para evitar confusiones, nos referiremos a ella como Blum a lo largo de este artículo. Los padres de Lenore eran Irving y Rose y, además de una hermana, Harriet, que era dos años menor que Lenore, ella era parte de una extensa familia judía con varias tías y tíos. Su madre Rose era maestra de ciencias de secundaria en Nueva York. Lenore asistió a una escuela pública en la ciudad de Nueva York hasta que tuvo nueve años cuando su familia se mudó a América del Sur. Su padre Irving trabajaba en el negocio de importación/exportación y él y su esposa se instalaron en Venezuela con Lenore y Harriet. Durante su primer año en Caracas, Lenore no asistió a la escuela, sin embargo su madre le enseñó. Básicamente, la familia era demasiado pobre para poder pagar las tasas escolares. Al cabo de un año, Rose ocupó un puesto docente en la Escuela Americana E. Campo Alegre, en Caracas, y esto proporcionó suficiente dinero para permitir que Lenore asistiera a la escuela secundaria y luego a la escuela secundaria en Caracas. Mientras estaba en Caracas, conoció a Manuel Blum, quien también era de una familia judía. Manuel salió de Caracas mientras Lenore todavía estaba allí en la escuela y se fue a los Estados Unidos donde ingresó como estudiante en el Instituto de Tecnología de Massachusetts. -
The Association for Women in Mathematics: How and Why It Was
Mathematical Communities t’s 2011 and the Association for Women in Mathematics The Association (AWM) is celebrating 40 years of supporting and II promoting female students, teachers, and researchers. It’s a joyous occasion filled with good food, warm for Women conversation, and great mathematics—four plenary lectures and eighteen special sessions. There’s even a song for the conference, titled ‘‘((3 + 1) 9 3 + 1) 9 3 + 1 Anniversary in Mathematics: How of the AWM’’ and sung (robustly!) to the tune of ‘‘This Land is Your Land’’ [ICERM 2011]. The spirit of community and and Why It Was the beautiful mathematics on display during ‘‘40 Years and Counting: AWM’s Celebration of Women in Mathematics’’ are truly a triumph for the organization and for women in Founded, and Why mathematics. It’s Still Needed in the 21st Century SARAH J. GREENWALD,ANNE M. LEGGETT, AND JILL E. THOMLEY This column is a forum for discussion of mathematical communities throughout the world, and through all time. Our definition of ‘‘mathematical community’’ is Participants from the Special Session in Number Theory at the broadest: ‘‘schools’’ of mathematics, circles of AWM’s 40th Anniversary Celebration. Back row: Cristina Ballantine, Melanie Matchett Wood, Jackie Anderson, Alina correspondence, mathematical societies, student Bucur, Ekin Ozman, Adriana Salerno, Laura Hall-Seelig, Li-Mei organizations, extra-curricular educational activities Lim, Michelle Manes, Kristin Lauter; Middle row: Brooke Feigon, Jessica Libertini-Mikhaylov, Jen Balakrishnan, Renate (math camps, math museums, math clubs), and more. Scheidler; Front row: Lola Thompson, Hatice Sahinoglu, Bianca Viray, Alice Silverberg, Nadia Heninger. (Photo Cour- What we say about the communities is just as tesy of Kiran Kedlaya.) unrestricted. -
HHMC 2017 (2017 Workshop on Hybrid Human-Machine Computing)
CRonEM CRonEM HHMC 2017 (2017 Workshop on Hybrid Human-Machine Computing) 20 & 21 September 2017 Treetops, Wates House, University of Surrey Guildford, Surrey, UK Programme INTRODUCTION KEYNOTE 1 The 2017 Workshop on Hybrid Human-Machine Computing (HHMC 2017) is 2-day workshop, to be held Title: Password Generation, an Example of Human Computation at the University of Surrey, Guildford, UK, on 20 and 21 September, 2017. It is a workshop co-funded by Abstract: University of Surrey’s Institute for Advanced Studies (IAS), a number of other organizations and related research projects. A password schema is an algorithm for humans - working in their heads - without paper and pencil - to transform challenges (typically website names) into responses (passwords). When we talk about “computing” we often mean computers do something (for humans), but due to the more and more blurred boundary between humans and computers, this old paradigm of “computing” has To start this talk, the speaker will ask for 2 or 3 volunteers, whisper instructions in their ears, then have them changed drastically, e.g., in human computation humans do all or part of the computing (for machines), transform audience-proposed challenges (like AMAZON and FACEBOOK) into passwords. in computer-supported cooperative work (CSCW) humans are working together with assistance from The passwords will look random. The audience will be challenged to guess properties of the passwords but computers to conduct cooperative work, in social computing and computer-mediated communication even the simple schema the speaker whispered to the volunteers will produce passwords that look random. people’s social behaviors are intermingled with computer systems so computing happens with humans and These passwords can be easily made so strong that they pass virtually all password tests, like passwordmeter. -
Tarjan Transcript Final with Timestamps
A.M. Turing Award Oral History Interview with Robert (Bob) Endre Tarjan by Roy Levin San Mateo, California July 12, 2017 Levin: My name is Roy Levin. Today is July 12th, 2017, and I’m in San Mateo, California at the home of Robert Tarjan, where I’ll be interviewing him for the ACM Turing Award Winners project. Good afternoon, Bob, and thanks for spending the time to talk to me today. Tarjan: You’re welcome. Levin: I’d like to start by talking about your early technical interests and where they came from. When do you first recall being interested in what we might call technical things? Tarjan: Well, the first thing I would say in that direction is my mom took me to the public library in Pomona, where I grew up, which opened up a huge world to me. I started reading science fiction books and stories. Originally, I wanted to be the first person on Mars, that was what I was thinking, and I got interested in astronomy, started reading a lot of science stuff. I got to junior high school and I had an amazing math teacher. His name was Mr. Wall. I had him two years, in the eighth and ninth grade. He was teaching the New Math to us before there was such a thing as “New Math.” He taught us Peano’s axioms and things like that. It was a wonderful thing for a kid like me who was really excited about science and mathematics and so on. The other thing that happened was I discovered Scientific American in the public library and started reading Martin Gardner’s columns on mathematical games and was completely fascinated. -
ACM Bytecast Episode Title: Luis Von Ahn
Podcast Title: ACM Bytecast Episode Title: Luis Von Ahn Welcome to the ACM Bytecast podcast, where researchers, practitioners, and innovators share about their experiences, lessons, and future visions in the field of computing research. In this episode, host Rashmi Mohan welcomes Luis Von Ahn—founder of Duolingo, the most popular foreign language learning app. The conversation starts off with a quick look at Luis’s background, what he does, and what drew him into this field as a whole. Luis’s mother began his interest in computers at 8 years old and he’s never looked back since. While he started off his training in the field of computer science, he has now started 3 businesses, one of which is Duolingo. Rashmi taps into the history on Luis’s first two businesses before jumping into Duolingo. Learn about the creation of CAPTCHA and re-CAPTCHA. While one of these is a challenge-response test to help computers determine whether the user on websites was human or not, the other protects website from spam. The cru- cial foundation for Luis’s businesses were simply real world problems that he sought to help fix. Luis integrated these real issues in the industry and worked on them from the academic world. Being used across countless websites today, Luis’s work proved pivotal. Rashmi asks Luis about his perspective on integrating academia and business more—don’t miss out on his thoughts! Rashmi shifts the conversation to learning the details involved in the transition from academia to actually running a business and the learning curve associated with this. -
Computational Learning Theory: New Models and Algorithms
Computational Learning Theory: New Models and Algorithms by Robert Hal Sloan S.M. EECS, Massachusetts Institute of Technology (1986) B.S. Mathematics, Yale University (1983) Submitted to the Department- of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 1989 @ Robert Hal Sloan, 1989. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author Department of Electrical Engineering and Computer Science May 23, 1989 Certified by Ronald L. Rivest Professor of Computer Science Thesis Supervisor Accepted by Arthur C. Smith Chairman, Departmental Committee on Graduate Students Abstract In the past several years, there has been a surge of interest in computational learning theory-the formal (as opposed to empirical) study of learning algorithms. One major cause for this interest was the model of probably approximately correct learning, or pac learning, introduced by Valiant in 1984. This thesis begins by presenting a new learning algorithm for a particular problem within that model: learning submodules of the free Z-module Zk. We prove that this algorithm achieves probable approximate correctness, and indeed, that it is within a log log factor of optimal in a related, but more stringent model of learning, on-line mistake bounded learning. We then proceed to examine the influence of noisy data on pac learning algorithms in general. Previously it has been shown that it is possible to tolerate large amounts of random classification noise, but only a very small amount of a very malicious sort of noise. -
Luis Von Ahn - Episode 14 Transcript
ACM ByteCast Luis von Ahn - Episode 14 Transcript Rashmi Mohan: This is ACM ByteCast, a podcast series from the Association for Computing Machinery, the world's largest educational and scientific computing society. We talk to researchers, practitioners, and innovators who are at the intersection of computing research and practice. They share their experiences, the lessons they've learned, and their own visions for the future of computing. I am your host, Rashmi Mohan. Rashmi Mohan: If you want to boost your brain power, improve your memory, or enhance your multitasking skills, then you're often recommended to learn a foreign language. For many of us, that option has become a reality, thanks to our next guest and his creation. Luis von Ahn is a serial entrepreneur and Founder and CEO of Duolingo. An accomplished researcher and consulting professor of Computer Science at Carnegie Mellon University, he straddles both worlds seamlessly. He's a winner of numerous awards, including the prestigious Lemelson-MIT Prize and the MacArthur Fellowship often known as The Genius Grant. Louis, welcome to ACM ByteCast. Luis von Ahn: Thank you. Thank you for having me. Rashmi Mohan: Wonderful. I'd love to lead with a simple question that I ask all of my guests. If you could please introduce yourself and talk about what you currently do, and also give us some insight into what drew you into the field of computer science. Luis von Ahn: Sure. So my name is Luis. I am currently the CEO and co-founder of a company called Duolingo. Duolingo is a language learning platform. -
Single-To-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge Marc Fischlin Felix Rohrbach Cryptoplexity, Technische Universität Darmstadt, Germany www.cryptoplexity.de [email protected] [email protected] Abstract. Non-interactive zero-knowledge proofs or arguments allow a prover to show validity of a statement without further interaction. For non-trivial statements such protocols require a setup assumption in form of a common random or reference string (CRS). Generally, the CRS can only be used for one statement (single-theorem zero-knowledge) such that a fresh CRS would need to be generated for each proof. Fortunately, Feige, Lapidot and Shamir (FOCS 1990) presented a transformation for any non-interactive zero-knowledge proof system that allows the CRS to be reused any polynomial number of times (multi-theorem zero-knowledge). This FLS transformation, however, is only known to work for either computational zero-knowledge or requires a structured, non-uniform common reference string. In this paper we present FLS-like transformations that work for non-interactive statistical zero-knowledge arguments in the common random string model. They allow to go from single-theorem to multi-theorem zero-knowledge and also preserve soundness, for both properties in the adaptive and non-adaptive case. Our first transformation is based on the general assumption that one-way permutations exist, while our second transformation uses lattice-based assumptions. Additionally, we define different possible soundness notions for non-interactive arguments and discuss their relationships. Keywords. Non-interactive arguments, statistical zero-knowledge, soundness, transformation, one-way permutation, lattices, dual-mode commitments 1 Introduction In a non-interactive proof for a language L the prover P shows validity of some theorem x ∈ L via a proof π based on a common string crs chosen by some external setup procedure. -
1 Introduction
Logic Activities in Europ e y Yuri Gurevich Intro duction During Fall thanks to ONR I had an opp ortunity to visit a fair numb er of West Eu rop ean centers of logic research I tried to learn more ab out logic investigations and appli cations in Europ e with the hop e that my exp erience may b e useful to American researchers This rep ort is concerned only with logic activities related to computer science and Europ e here means usually Western Europ e one can learn only so much in one semester The idea of such a visit may seem ridiculous to some The mo dern world is quickly growing into a global village There is plenty of communication b etween Europ e and the US Many Europ ean researchers visit the US and many American researchers visit Europ e Neither Americans nor Europ eans make secret of their logic research Quite the opp osite is true They advertise their research From ESPRIT rep orts the Bulletin of Europ ean Asso ciation for Theoretical Computer Science the Newsletter of Europ ean Asso ciation for Computer Science Logics publications of Europ ean Foundation for Logic Language and Information publications of particular Europ ean universities etc one can get a go o d idea of what is going on in Europ e and who is doing what Some Europ ean colleagues asked me jokingly if I was on a reconnaissance mission Well sometimes a cow wants to suckle more than the calf wants to suck a Hebrew proverb It is amazing however how dierent computer science is esp ecially theoretical com puter science in Europ e and the US American theoretical -
Adaptive Garbled RAM from Laconic Oblivious Transfer
Adaptive Garbled RAM from Laconic Oblivious Transfer Sanjam Garg?1, Rafail Ostrovsky??2, and Akshayaram Srinivasan1 1 University of California, Berkeley fsanjamg,[email protected] 2 UCLA [email protected] Abstract. We give a construction of an adaptive garbled RAM scheme. In the adaptive setting, a client first garbles a \large" persistent database which is stored on a server. Next, the client can provide garbling of mul- tiple adaptively and adversarially chosen RAM programs that execute and modify the stored database arbitrarily. The garbled database and the garbled program should reveal nothing more than the running time and the output of the computation. Furthermore, the sizes of the garbled database and the garbled program grow only linearly in the size of the database and the running time of the executed program respectively (up to poly logarithmic factors). The security of our construction is based on the assumption that laconic oblivious transfer (Cho et al., CRYPTO 2017) exists. Previously, such adaptive garbled RAM constructions were only known using indistinguishability obfuscation or in random oracle model. As an additional application, we note that this work yields the first constant round secure computation protocol for persistent RAM pro- grams in the malicious setting from standard assumptions. Prior works did not support persistence in the malicious setting. 1 Introduction Over the years, garbling methods [Yao86,LP09,AIK04,BHR12b,App17] have been extremely influential and have engendered an enormous number of applications ? Research supported in part from DARPA/ARL SAFEWARE Award W911NF15C0210, AFOSR Award FA9550-15-1-0274, AFOSR YIP Award, DARPA and SPAWAR under contract N66001-15-C-4065, a Hellman Award and research grants by the Okawa Foundation, Visa Inc., and Center for Long-Term Cybersecurity (CLTC, UC Berkeley). -
Accelerating Legacy String Kernels Via Bounded Automata Learning
Accelerating Legacy String Kernels via Bounded Automata Learning Kevin Angstadt Jean-Baptiste Jeannin Westley Weimer University of Michigan University of Michigan University of Michigan Computer Science and Engineering Aerospace Engineering Computer Science and Engineering Ann Arbor, MI, USA Ann Arbor, MI, USA Ann Arbor, MI, USA [email protected] [email protected] [email protected] Abstract CCS Concepts. • Computer systems organization → Re- The adoption of hardware accelerators, such as FPGAs, into configurable computing; • Theory of computation → Reg- general-purpose computation pipelines continues to rise, ular languages; • Software and its engineering → Soft- but programming models for these devices lag far behind ware design techniques. their CPU counterparts. Legacy programs must often be Keywords. automata learning, automata processing, legacy rewritten at very low levels of abstraction, requiring inti- programs mate knowledge of the target accelerator architecture. While techniques such as high-level synthesis can help port some ACM Reference Format: Kevin Angstadt, Jean-Baptiste Jeannin, and Westley Weimer. 2020. legacy software, many programs perform poorly without Accelerating Legacy String Kernels via Bounded Automata Learn- manual, architecture-specific optimization. ing. In Proceedings of the Twenty-Fifth International Conference on We propose an approach that combines dynamic and static Architectural Support for Programming Languages and Operating analyses to learn a model of functional behavior for off-the- Systems (ASPLOS ’20), March 16–20, 2020, Lausanne, Switzerland. shelf legacy code and synthesize a hardware description from ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3373376. this model. We develop a framework that transforms Boolean 3378503 string kernels into hardware descriptions using techniques from both learning theory and software verification. -
The Future of the Internet and How to Stop It the Harvard Community Has
The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.