WWW 2013 22Nd International World Wide Web Conference

Total Page:16

File Type:pdf, Size:1020Kb

WWW 2013 22Nd International World Wide Web Conference WWW 2013 22nd International World Wide Web Conference General Chairs: Daniel Schwabe (PUC-Rio – Brazil) Virgílio Almeida (UFMG – Brazil) Hartmut Glaser (CGI.br – Brazil) Research Track: Ricardo Baeza-Yates (Yahoo! Labs – Spain & Chile) Sue Moon (KAIST – South Korea) Practice and Experience Track: Alejandro Jaimes (Yahoo! Labs – Spain) Haixun Wang (MSR – China) Developers Track: Denny Vrandečić (Wikimedia – Germany) Marcus Fontoura (Google – USA) Demos Track: Bernadette F. Lóscio (UFPE – Brazil) Irwin King (CUHK – Hong Kong) W3C Track: Marie-Claire Forgue (W3C Training, USA) Workshops Track: Alberto Laender (UFMG – Brazil) Les Carr (U. of Southampton – UK) Posters Track: Erik Wilde (EMC – USA) Fernanda Lima (UNB – Brazil) Tutorials Track: Bebo White (SLAC – USA) Maria Luiza M. Campos (UFRJ – Brazil) Industry Track: Marden S. Neubert (UOL – Brazil) Proceedings and Metadata Chair: Altigran Soares da Silva (UFAM - Brazil) Local Arrangements Committee: Chair – Hartmut Glaser Executive Secretary – Vagner Diniz PCO Liaison – Adriana Góes, Caroline D’Avo, and Renato Costa Conference Organization Assistant – Selma Morais International Relations – Caroline Burle Technology Liaison – Reinaldo Ferraz UX Designer / Web Developer – Yasodara Córdova, Ariadne Mello Internet infrastructure - Marcelo Gardini, Felipe Agnelli Barbosa Administration– Ana Paula Conte, Maria de Lourdes Carvalho, Beatriz Iossi, Carla Christiny de Mello Legal Issues – Kelli Angelini Press Relations and Social Network – Everton T. Rodrigues, S2Publicom and EntreNós PCO – SKL Eventos e Turismo Student Volunteers Coordination: Wagner Meira (UFMG) Yasodara Córdova (NIC.br) Sebastien Forget (Canada) John Miller (Australia) (International Volunteers) Program Committee Behavioral analysis and personalization Eugene Agichtein (Emory U), Yoelle Mareek (Yahoo! Labs) – Chairs Members Mikhail Ageev, NIVC MGU Peter Bailey, MSR Nicolas Belkin, Rutgers University Paul Bennet, MSR Edward Bortnikov, Yahoo! Peter Brusilovsky Georg Buscher Nick Craswell, MSR Fernando Diaz, Microsoft Research Andy Edmonds Henry Feild, Umass Antonio Gulli Qi Guo, Emory University Jeff Huang Rosie Jones Diane Kelly, UNC Gueorgi Kossinets Dmitry Lagun, Emory University Mounia Lalmas Ronny Lempel, Yahoo! Labs Andreas Paepcke, Stanford Dan Pelleg Matt Richardson, MSR Kerry Rodden Tetsuya Sakai Mark Smucker, University of Waterloo Jaime Teevan Andrew Tomkins, Google Ingmar Weber Ryen White, MSR Yisong Yue Zijian Zheng, MSR Dav Zimak Program Committee - Content analysis Claire Cardie (Cornell), Evgeniy Gabrilovich (Google) – Chairs Members Aris Anagnostopoulos, University of Roma Donald Metzler Azin Ashkan, University of Waterloo Prasenjit Mitra, PSU Michael Bendersky, Umass Bo Pang Misha Bilenko, MSR Dmitry Pechyony, Technion Michael Cafarella, Umich Fuchun Peng, Yahoo! Yunbo Cao, MSR John Prager, IBM Carlos Castillo, U. of Chile Kunal Punera, Utexas Deepayan Chakrabarti, CMU Kira Radinsky Brian Davison, Lehigh U. Filip Radlinski, Microsoft Doug Downey, Northwestern U. Vibhor Rastogi Gideon Dror, Sunita Sarawagi, IIT Bombay Hui Fang, U. Del Burr Settles, CMU Dennis Fetterly, MSR Stefan Siersdorfer, University of Hannover Shantanu Godbole, Julia Stoyanovich, Upenn Iryna Gurevych Gerd Stumme, Uni, Kassel Bo, June Hsu, MSR Idan Szpektor, Yahoo! Tapas Kanungo Partha Talukdar Nick Koudas, U. of Toronto Xuanhui Wang, Yahoo! Georgia Koutrika, HP Gerhard Weikum Zornitsa Kozareva, USC, ISI Elad Yom, Tov Oren Kurland, Technion Torsten Zesch, Tu Darmstadt Lillian Lee, Cornell Hongyuan Zha, GATech Chengkai Li, UTA Chengxiang Zhai, UIUC Hao Ma, MSR Dell Zhang, BBK Qiaozhu Mei, Umich Program Committee - Software infrastructure and their performance, scalability, and availability Torsten Suel (PI), Zhi-Li Zhang (UMinnesota) – Chairs Members Michele Colajanni, University of Modena Pablo Rodriguez, Telefonica Research Anja Feldmann, TU Berlin Sambit Sahu, IBM Research Daniel Figueiredo, COPPE/UFRJ Subhabrata Sen, AT&T Research Krishna Kant, Intel Corporation Alexander Shraer, Google Purushottam Kulkarni, IIT Bombay Ramesh Sitaraman, Department of Computer Science, John C.S. Lui, The Chinese University of Hong Kong University of Massachusetts, Amherst Grzegorz Malewicz, Facebook Malgorzata Steinder, IBM Research Martin May, Technicolor Sandeep Uttamchandani, Beng Chin Ooi, National University of Singapore Jacobus Vandermerwe, Giovanni Pacifici, IBM Research Maja Vukovic, IBM Research Michael Rabinovich, Case Western Reserve University Zhen Xiao, Peking University Program Committee - Web mining Tanya Berger-Wolf (UIC), Bing Liu (UIC), Kyuseok Shim (SNU) – Chairs Members Charu Aggarwal, IBM Sangkeun Lee, Department of Computer Science and Amr Ahmed, Yahoo! Labs Engineering, Korea University Roberto Bayardo, Google Hang Li, Huawei Noah’s Arc Lab Smriti Bhagat, Technicolor Xiaoli Li, Institute for Infocomm Research Yun Chi, NEC Laboratories America Huan Liu, Arizona State University Chin, Wan Chung, KAIST Tie, Yan Liu, Microsoft Research Asia Gao Cong, Nanyang Technological University Yue Lu, University of Illinois at Urbana, Champaign David Crandall, Indiana University Michael Lyu Mayur Datar, Google Inc. Dunja Mladenic, J. Stefan Institute Eduard Dragut Bamshad Mobasher, DePaul University Georges Dupret, Yahoo! Labs Arjun Mukherjee, University of Illinois--Chicago Tina Eliassi, Rad, Rutgers University Olfa Nasraoui, University of Louisville Martin Ester, Department of Computer Science, Simon Zaiqing Nie, Microsoft Research Asia Fraser University, Canada Alexandros Ntoulas, Zynga Christos Faloutsos, Carnegie Mellon University Srinivasan Parthasarathy, Department of Computer Ronen Feldman, Hebrew University Science and Engineering, The Ohio State University Michael Gamon, Microsoft Research Jian Pei, Simon Fraser University C. Lee Giles, Pennsylvania State University Mark Sandler, Google Aristides Gionis, Aalto University Dou Shen, Microsoft Adcenter Labs Dimitrios Gunopulos, UoA Myra Spiliopoulou, U. Magdeburg Jiawei Han, University of Illinois at Urbana, Champaign Jaideep Srivastava, University of Minnesota Wook, Shin Han, Kyungpook National University Lei Tang, @WalmartLabs Shawndra Hill, University of Pennsylvania Masashi Toyoda, University of Tokyo Nitin Jindal, Google Jianyong Wang, Tsinghua University Jaewoo Kang, Korea University Ke Wang, Simon Fraser University U Kang, Carnegie Mellon University Michael Wurst, TU Dortmund Sang, Wook Kim, Hanyang University Hui Xiong, Rutgers University Irwin King, The Chinese University of Hong Kong Hwanjo Yu, POSTECH Mayank Lahiri, University of Illinois at Chicago Jeffery Xu Yu, Dept. of Systems Engineering & Wai Lam, The Chinese University of Hong Kong Engineering Mngt, Chinese University of Hong Kong Hady Lauw, Singapore Management University Philip Yu, UIC Dongwon Lee, Penn State University Lei Zhang, University of Illinois at Chicago Program Committee internet monetization and incentives Vanja Josifovski (Google), David Pennock (MSR NYC) – Chairs Members Ramakrishna Akella, School of Engineering University Benjamin Lubin, Harvard of California, Santa Cruz Vahab Mirrokni, Google Research Sugato Basu, Google Research S. Muthukrishnan, Rutgers University Ye Chen, Microsoft Uri Nadav Ingemar Cox, University College London Hamid Nazerzadeh, USC Marshall School of Business Nikhil Devanur, Microsoft Research Mallesh Pai, University of Pennsylvania Marcus Fontoura, Google Inc Sandeep Pandey, Twitter Arpita Ghosh, Cornell University Michael Schapira, Yale University & U.C. Berkeley Gagan Goel, Google Research James G. Shanahan, Independent Consultant (San Sreenivas Gollapudi, Microsoft Research Francisco) Ronen Gradwohl, Weizmann Institute of Science Jayavel Shanmugasundaram, Google Inc. Maria Grineva, Yandex Eric Sodomka, Brown University Ralf Herbrich, Facebook Jian, Tao Sun, Microsoft Research Asia Patrick Hummel Neel Sundaresan, eBay Research Labs Krishnamurthy Iyer, University of Pennsylvania Ankur Teredesai, University of Washington Shaili Jain, Yale University Siva Viswanathan, University of Maryland Patrick Jordan, Microsoft Haifeng Wang, Baidu Radu Jurca Jun Yan, Microsoft Research Asia Sebastien Lahaie M. Yenmez, Carnegie Mellon University Ying Li Georgios Zervas, Yale University Program Committee Search systems and applications Soumen Chakrabarti (IIT Mumbai), Wei-Ying Ma (MSR Asia) – Chairs Members Omar Alonso, Microsoft Chin Yew Lin, Microsoft Research Asia Jaime Arguello, University of North Carolina Ling Liu, Georgia Tech at Chapel Hill Tie Yan Liu, Microsoft Research Asia Ching Man Au Yeung, ASTRI Dmitri Loguinov, Texas A&M Shenghua Bao, IBM China Research Lab David Losada, University of Santiago de Compostela Behshad Behzadi, Google Inc. Massimo Melucci, University of Padua Gloria Bordogna, National Research Council Sung Hyon Myaeng, Kaist of Italy, CNR Jian Yun Nie, Universit de Montral Rui Cai, Microsoft Research, Asia Iadh Ounis, University of Glasgow Yi Chang, Yahoo! Labs Umut Ozertem, Microsoft Zheng Chen, Microsoft Research Asia Gabriella Pasi, Universit degli STudi di Milano Bicocca Hong Cheng, The Chinese University of Hong Kong Simone Paolo Ponzetto, University of Rome Tao Cheng, Microsoft Research Redmond Davood Rafiei, University of Alberta Xueqi Cheng, Institute of Computing Technology, Sriram Raghavan, IBM Research India CAS, P. R. China Stefan Rueger, Knowledge Media Institute Pablo De La Fuente, GRINBD. Universidad de Altigran S. Da Silva, Federal University of Amazonas Valladolid Ralf Schenkel, Saarland University Edleno Silva De Moura, Universidade Federal
Recommended publications
  • A Taxonomy of Accelerator Architectures and Their
    A taxonomy of accelerator C. Cas$caval S. Chatterjee architectures and their H. Franke K. J. Gildea programming models P. Pattnaik As the clock frequency of silicon chips is leveling off, the computer architecture community is looking for different solutions to continue application performance scaling. One such solution is the multicore approach, i.e., using multiple simple cores that enable higher performance than wide superscalar processors, provided that the workload can exploit the parallelism. Another emerging alternative is the use of customized designs (accelerators) at different levels within the system. These are specialized functional units integrated with the core, specialized cores, attached processors, or attached appliances. The design tradeoff is quite compelling because current processor chips have billions of transistors, but they cannot all be activated or switched at the same time at high frequencies. Specialized designs provide increased power efficiency but cannot be used as general-purpose compute engines. Therefore, architects trade area for power efficiency by placing in the design additional units that are known to be active at different times. The resulting system is a heterogeneous architecture, with the potential of specialized execution that accelerates different workloads. While designing and building such hardware systems is attractive, writing and porting software to a heterogeneous platform is even more challenging than parallelism for homogeneous multicore systems. In this paper, we propose a taxonomy that allows us to define classes of accelerators, with the goal of focusing on a small set of programming models for accelerators. We discuss several types of currently popular accelerators and identify challenges to exploiting such accelerators in current software stacks.
    [Show full text]
  • Online Visualization of Geospatial Stream Data Using the Worldwide Telescope
    Online Visualization of Geospatial Stream Data using the WorldWide Telescope Mohamed Ali#, Badrish Chandramouli*, Jonathan Fay*, Curtis Wong*, Steven Drucker*, Balan Sethu Raman# #Microsoft SQL Server, One Microsoft Way, Redmond WA 98052 {mali, sethur}@microsoft.com *Microsoft Research, One Microsoft Way, Redmond WA 98052 {badrishc, jfay, curtis.wong, sdrucker}@microsoft.com ABSTRACT execution query pipeline. StreamInsight has been used in the past This demo presents the ongoing effort to meld the stream query to process geospatial data, e.g., in traffic monitoring [4, 5]. processing capabilities of Microsoft StreamInsight with the On the other hand, the WorldWide Telescope (WWT) [9] enables visualization capabilities of the WorldWide Telescope. This effort a computer to function as a virtual telescope, bringing together provides visualization opportunities to manage, analyze, and imagery from the various ground and space-based telescopes in process real-time information that is of spatio-temporal nature. the world. WWT enables a wide range of user experiences, from The demo scenario is based on detecting, tracking and predicting narrated guided tours from astronomers and educators featuring interesting patterns over historical logs and real-time feeds of interesting places in the sky, to the ability to explore the features earthquake data. of planets. One interesting feature of WWT is its use as a 3-D model of earth, enabling its use as an earth viewer. 1. INTRODUCTION Real-time stream data acquisition has been widely used in This demo presents the ongoing work at Microsoft Research and numerous applications such as network monitoring, Microsoft SQL Server groups to meld the value of stream query telecommunications data management, security, manufacturing, processing of StreamInsight with the unique visualization and sensor networks.
    [Show full text]
  • Taeho Jung 1/5
    Taeho Jung 1/5 Contact Department of Computer Science and Engineering Phone: (773) 431-3225 Information University of Notre Dame Email: [email protected] Notre Dame, IN 46556 USA Website: sites.nd.edu/taeho-jung Research Cybersecurity, big data security, user privacy, privacy-preserving computation, accountability Interests Working University of Notre Dame, Department of Computer Science and Engineering, Notre Dame, IN Experience Assistant Professor Aug. 2017 - Present Illinois Institute of Technology, Department of Computer Science, Chicago, IL Teaching Assistant Aug. 2011 - May. 2017 • CS330 | Discrete Structures: Spring'15, Spring'14, Fall'13, Spring'13, Fall'12 • CS430 | Introduction to Algorithms: Spring'17, Fall'16, Spring'16, Fall'15, Fall'14 • CS331, CS485, CS561, CS595: Spring'12, Fall'11 Research Assistant Aug. 2011 - May. 2017 • Studied information security and user privacy implications in big data life cycle. Adjunct Instructor May. 2016 - July 2016 • CS330 | Discrete Structures Instructor Evaluation 5.0/5.0, Course Evaluation 4.75/5.0 Education Illinois Institute of Technology, Chicago, IL USA Ph.D. Candidate, Computer Science. 2017 • Dissertation: \Ensuring Security and Privacy in Big Data Sharing, Trading, and Computing" • Adviser: Dr. Xiang-Yang Li and Dr. Peng-Jun Wan Tsinghua University, Beijing, China B.E., Computer Software, 2011 • Thesis: \Design and Implementation of Anonymous Access Control Protocol for Cloud Envi- ronment | AnonyABE" • Thesis score tied at 2nd place out of 26 students. • Adviser: Dr. Zhiguo Wan Honors and Runner up for Best Paper Award, BigCom 2015 Awards Teaching Assistant of the Year, Department of C.S., Illinois Tech. 2015 • Nominated by Prof. Edward M. Reingold and Prof.
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • Denying Extremists a Powerful Tool Hany Farid ’88 Has Developed a Means to Root out Terrorist Propaganda Online
    ALUMNI GAZETTE Denying Extremists a Powerful Tool Hany Farid ’88 has developed a means to root out terrorist propaganda online. But will companies like Google and Facebook use it? By David Silverberg be a “no-brainer” for social media outlets. Farid is not alone in his criticism of so- But so far, the project has faced resistance cial media companies. Last August, a pan- Hany Farid ’88 wants to clean up the In- from the leaders of Facebook, Twitter, and el in the British Parliament issued a report ternet. The chair of Dartmouth’s comput- other outlets who argue that identifying ex- charging that Facebook, Twitter, and er science department, he’s a leader in the tremist content is more difficult, presenting Google are not doing enough to prevent field of digital forensics. In the past several more gray areas, than child pornography. their networks from becoming recruitment years, he has played a lead role in creating In a February 2016 blog post, Twitter laid tools for extremist groups. programs to identify and root out two of out its official position: “As many experts Steve Burgess, president of the digital fo- the worst online scourges: child pornogra- and other companies have noted, there is rensics firm Burgess Consulting and Foren- phy and extremist political content. no ‘magic algorithm’ for identifying terror- sics, admires Farid’s dedication to projects “Digital forensics is an exciting field, es- ist content on the Internet, so global online that, according to Burgess, aren’t common pecially since you can have an impact on platforms are forced to make challenging in the field.
    [Show full text]
  • Microsoft .NET Gadgeteer a New Way to Create Electronic Devices
    Microsoft .NET Gadgeteer A new way to create electronic devices Nicolas Villar Microsoft Research Cambridge, UK What is .NET Gadgeteer? • .NET Gadgeteer is a new toolkit for quickly constructing, programming and shaping new small computing devices (gadgets) • Takes you from concept to working device quickly and easily Driving principle behind .NET Gadgeteer • Low threshold • Simple gadgets should be very simple to build • High ceiling • It should also be possible to build sophisticated and complex devices The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer Some background • We originally built Gadgeteer as a tool for ourselves (in Microsoft Research) to make it easier to prototype new kinds of devices • We believe the ability to prototype effectively is key to successful innovation Some background • Gadgeteer has proven to be of interest to other researchers – but also hobbyists and educators • With the help of colleagues from all across Microsoft, we are working on getting Gadgeteer out of the lab and into the hands of others Some background • Nicolas Villar, James Scott, Steve Hodges Microsoft Research Cambridge • Kerry Hammil Microsoft Research Redmond • Colin Miller Developer Division, Microsoft Corporation • Scarlet Schwiderski-Grosche‎, Stewart Tansley‎ Microsoft Research Connections • The Garage @ Microsoft First key component of .NET Gadgeteer Quick example: Building a digital camera Some existing hardware modules Mainboard: Core processing unit Mainboard
    [Show full text]
  • Build Reliable Cloud Networks with Sonic and ONE
    Build Reliable Cloud Networks with SONiC and ONE Wei Bai 白巍 Microsoft Research Asia OCP China Technology Day, Shenzhen, China 1 54 100K+ 130+ $15B+ REGIONS WORLDWIDE MILES OF FIBER AND SUBSEA CABLE EDGE SITES Investments Two Open Source Cornerstones for High Reliability Networking OS: SONiC Network Verification: ONE 3 Networking OS: SONiC 4 A Solution to Unblock Hardware Innovation Monitoring, Management, Deployment Tools, Cutting Edge SDN SONiC SONiC SONiC SONiC Switch Abstraction Interface (SAI) Merchant Silicon Switch Abstraction Interface (SAI) NetworkNetwork ApplicationsApplicationsNetwork Applications Simple, consistent, and stable Hello network application stack Switch Abstraction Interface Help consume the underlying complex, heterogeneous частный 你好 नमते Bonjour hardware easily and faster https://github.com/opencomputeproject/SAI 6 SONiC High-Level Architecture Switch State Service (SWSS) • APP DB: persist App objects • SAI DB: persist SAI objects • Orchestration Agent: translation between apps and SAI objects, resolution of dependency and conflict • SyncD: sync SAI objects between software and hardware Key Goal: Evolve components independently 8 SONiC Containerization 9 SONiC Containerization • Components developed in different environments • Source code may not be available • Enables choices on a per- component basis 10 SONiC – Powering Microsoft At Cloud Scale Tier 3 - Regional Spine T3-1 T3-2 T3-3 T3-4 … … … Tier 2 - Spine T2-1-1 T2-1-2 T2-1-8 T2-4-1 T2-4-2 T2-4-4 Features and Roadmap Current: BGP, ECMP, ECN, WRED, LAG, SNMP,
    [Show full text]
  • Evaluation of Edge Caching/Offloading for Dynamic
    Evaluation of Edge Caching/Offloading for Dynamic Content Delivery Chun Yuan Yu Chen Zheng Zhang Microsoft Research Asia Microsoft Research Asia Microsoft Research Asia 3F Sigma Center, #49 Zhichun Road 3F Sigma Center, #49 Zhichun Road 3F Sigma Center, #49 Zhichun Road Beijing 100080, China Beijing 100080, China Beijing 100080, China 86-10-62617711 86-10-62617711 86-10-62617711 [email protected] [email protected] [email protected] ABSTRACT caching, we still lack the insight on what will be the best As dynamic content becomes increasingly dominant, it becomes offloading and caching strategies and their design/deployment an important research topic as how the edge resources such as tradeoffs. client-side proxies, which are otherwise underutilized for such In this paper, using a representative e-commerce benchmark, we content, can be put into use. However, it is unclear what will be have extensively studied many partitioning strategies. We found the best strategy and the design/deployment tradeoffs lie therein. that offloading and caching at edge proxy servers achieves In this paper, using one representative e-commerce benchmark, significant advantages without pulling database out near the client. we report our experience of an extensive investigation of different Our results show that, under typical user browsing patterns and offloading and caching options. Our results point out that, while network conditions, 2~3 folds of latency reduction can be great benefits can be reached in general, advanced offloading achieved. Furthermore, over 70% server requests are filtered at strategies can be overly complex and even counter-productive. In the proxies, resulting significant server load reduction.
    [Show full text]
  • A Large-Scale Study of Web Password Habits
    WWW 2007 / Track: Security, Privacy, Reliability, and Ethics Session: Passwords and Phishing A Large-Scale Study of Web Password Habits Dinei Florencioˆ and Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA [email protected], [email protected] ABSTRACT to gain the secret. However, challenge response systems are We report the results of a large scale study of password use generally regarded as being more time consuming than pass- and password re-use habits. The study involved half a mil- word entry and do not seem widely deployed. One time lion users over a three month period. A client component passwords have also not seen broad acceptance. The dif- on users' machines recorded a variety of password strength, ¯culty for users of remembering many passwords is obvi- usage and frequency metrics. This allows us to measure ous. Various Password Management systems o®er to assist or estimate such quantities as the average number of pass- users by having a single sign-on using a master password words and average number of accounts each user has, how [7, 13]. Again, the use of these systems does not appear many passwords she types per day, how often passwords are widespread. For a majority of users, it appears that their shared among sites, and how often they are forgotten. We growing herd of password accounts is maintained using a get extremely detailed data on password strength, the types small collection of passwords. For a user with, e.g. 30 pass- and lengths of passwords chosen, and how they vary by site.
    [Show full text]
  • Winter 2006-2007
    UNIVERSITY OF NEBRASKA–LINCOLN COLLEGE OF JOURNALISM AND MASS COMMUNICATIONS ALUMNI MAGAZINE WINTER 2006-2007 Q&A With Steve Pederson Pages 44–51 Photo courtesy Lincoln Journal Star M E D I A Wesley G. Pippert ‘JUST POLITICS’ The nation has been reminded in recent days of the quality of There had been jokes that Ford had played football too long President Gerald R. Ford’s life and the easy, comfortable rela- without a helmet, making light of his presumed lack of wit — tionship he had with members of the press corps. even though he finished in the top third of his class both at In many ways, this relationship was another demonstration Michigan and the Yale law school. So during the speech Ford of Ford’s general friendliness with everyone. And it seems to me tried to put on an old helmet he had worn — but it wouldn’t fit. that it also was the result of his having worked on a frequent, “Heads tend to swell in Washington,” he said, a remark that daily basis with reporters during a quarter of a century in brought down the house. Congress. It was something of a surprise, then, when in 1974 Ford In times past, reporters gathered on the floor of the Senate a vetoed a bill that would have strengthened the 1966 Freedom of few minutes before the start of the session for what was called Information Act. (FOIA gives any citizen the right to gain access “dugout chatter,” a time when the majority leader would answer to government documents, with certain exceptions such as questions.
    [Show full text]
  • Matrox Imaging Library (MIL) 9.0 Update 58
    ------------------------------------------------------------------------------- Matrox Imaging Library (MIL) 9.0 Update 58. Release Notes (Whatsnew) September 2012 (c) Copyright Matrox Electronic Systems Ltd., 1992-2012. ------------------------------------------------------------------------------- For more information and what's new in processing, display, drivers, Linux, ActiveMIL, and all MIL 9 updates, consult their respective readme files. Main table of contents Section 1 : What's new in Mil 9.0 Update 58 Section 2 : What's new in MIL 9.0 Release 2. Section 3 : What's new in MIL 9.0. Section 4 : Differences between MIL Lite 8.0 and 7.5 Section 5 : Differences between MIL Lite 7.5 and 7.1 Section 6 : Differences between MIL Lite 7.1 and 7.0 ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Section 1: What's new in MIL 9.0 Update 58. Table of Contents for Section 1 1. Overview. 2. Mseq API function definition 2.1 MseqAlloc 2.2 MseqControl 2.3 MseqDefine 2.4 MseqFeed 2.5 MseqFree 2.6 MseqGetHookInfo 2.7 MseqHookFunction 2.8 MseqInquire 2.9 MseqProcess 3. Examples 4. Operating system information 1. Overview. The main goal for MIL 9.0 Update 58 is to add a new module called Mseq, which offers a user-friendly interface for H.264 compression. 2. Mseq API function definition 2.1 MseqAlloc - Synopsis: Allocate a sequence context. - Syntax: MIL_ID MseqAlloc( MIL_ID SystemID, MIL_INT64 SequenceType, MIL_INT64 Operation, MIL_UINT32 OutputFormat, MIL_INT64 InitFlag, MIL_ID* ContextSeqIdPtr) - Parameters: * SystemID: Specifies the identifier of the system on which to allocate the sequence context. This parameter must be given a valid system identifier. * SequenceType: Specifies the type of sequence to allocate: Values: M_DEFAULT - Specifies the sequence as a context in which the related operation should be performed.
    [Show full text]
  • An FPGA-Accelerated Embedded Convolutional Neural Network
    Master Thesis Report ZynqNet: An FPGA-Accelerated Embedded Convolutional Neural Network (edit) (edit) 1000ch 1000ch FPGA 1000ch Network Analysis Network Analysis 2x512 > 1024 2x512 > 1024 David Gschwend [email protected] SqueezeNet v1.1 b2a ext7 conv10 2x416 > SqueezeNet SqueezeNet v1.1 b2a ext7 conv10 2x416 > SqueezeNet arXiv:2005.06892v1 [cs.CV] 14 May 2020 Supervisors: Emanuel Schmid Felix Eberli Professor: Prof. Dr. Anton Gunzinger August 2016, ETH Zürich, Department of Information Technology and Electrical Engineering Abstract Image Understanding is becoming a vital feature in ever more applications ranging from medical diagnostics to autonomous vehicles. Many applications demand for embedded solutions that integrate into existing systems with tight real-time and power constraints. Convolutional Neural Networks (CNNs) presently achieve record-breaking accuracies in all image understanding benchmarks, but have a very high computational complexity. Embedded CNNs thus call for small and efficient, yet very powerful computing platforms. This master thesis explores the potential of FPGA-based CNN acceleration and demonstrates a fully functional proof-of-concept CNN implementation on a Zynq System-on-Chip. The ZynqNet Embedded CNN is designed for image classification on ImageNet and consists of ZynqNet CNN, an optimized and customized CNN topology, and the ZynqNet FPGA Accelerator, an FPGA-based architecture for its evaluation. ZynqNet CNN is a highly efficient CNN topology. Detailed analysis and optimization of prior topologies using the custom-designed Netscope CNN Analyzer have enabled a CNN with 84.5 % top-5 accuracy at a computational complexity of only 530 million multiply- accumulate operations. The topology is highly regular and consists exclusively of convolu- tional layers, ReLU nonlinearities and one global pooling layer.
    [Show full text]