Ron Fagin Speaks out on His Trajectory As a Database Theoretician
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Proceedings of the Rexx Symposium for Developers and Users
SLAC-R-95-464 CONF-9505198-- PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May 1-3,1995 Stanford, California Convened by STANFORD LINEAR ACCELERATOR CENTER STANFORD UNIVERSITY, STANFORD, CALIFORNIA 94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pam Taylor of The Workstation Group James Weissman Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. DISTRIBUTION OF THIS DOCUMENT IS UNLIMITED ;--. i*-„r> ->&• DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. DISCLAIMER Portions -
Z/OS Resilience Enhancements
17118: z/OS Resilience Enhancements Harry Yudenfriend IBM Fellow, Storage Development March 3, 2015 Insert Custom Session QR if Desired. Agenda • Review strategy for improving SAN resilience • Details of z/OS 1.13 Enhancements • Enhancements for 2014 Session 16896: IBM z13 and DS8870 I/O Innovations for z Systems for additional information on z/OS resilience enhancements. © 2015 IBM Corporation 3 SAN Resilience Strategy • Clients should consider exploiting technologies to improve SAN resilience – Quick detection of errors – First failure data capture – Automatically identify route cause and failing component – Minimize impact on production work by fencing the failing resources quickly – Prevent errors from impacting production work by identifying problem links © 2015 IBM Corporation 4 FICON Enterprise QoS • Tight timeouts for quicker recognition of lost frames and more responsive recovery • Differentiate between lost frames and congestion • Explicit notification of SAN fabric issues • End-to-End Data integrity checking transparent to applications and middleware • In-band instrumentation to enable – SAN health checks – Smart channel path selection – Work Load Management – Autonomic identification of faulty SAN components with Purge-Path-Extended – Capacity planning – Problem determination – Identification of Single Points of Failure – Real time configuration checking with reset event and self description • No partially updated records in the presence of a failure • Proactive identification of faulty links via Link Incident Reporting • Integrated management software for safe switching for z/OS and storage • High Integrity, High Security Fabric © 2015 IBM Corporation 5 System z Technology Summary • Pre-2013 Items a) IOS Recovery option: RECOVERY,LIMITED_RECTIME b) z/OS 1.13 I/O error thresholds and recovery aggregation c) z/OS message to identify failing link based on LESB data d) HCD Generation of CONFIGxx member with D M=CONFIG(xx) e) Purge Path Extended (LESB data to SYS1.LOGREC) f) zHPF Read Exchange Concise g) CMR time to differentiate between congestion vs. -
Securely Obfuscating Re-Encryption
Securely Obfuscating Re-Encryption Susan Hohenberger¤ Guy N. Rothblumy abhi shelatz Vinod Vaikuntanathanx December 1, 2008 Abstract We present a positive obfuscation result for a traditional cryptographic functionality. This posi- tive result stands in contrast to well-known impossibility results [3] for general obfuscation and recent impossibility and improbability [13] results for obfuscation of many cryptographic functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point func- tions, our obfuscation result applies to the signi¯cantly more complex and widely-used re-encryption functionality. This functionality takes a ciphertext for message m encrypted under Alice's public key and transforms it into a ciphertext for the same message m under Bob's public key. To overcome impossibility results and to make our results meaningful for cryptographic functionalities, our scheme satis¯es a de¯nition of obfuscation which incorporates more security-aware provisions. ¤Johns Hopkins University, [email protected]. Research partially performed at IBM Zurich Research Laboratory, Switzer- land. yMIT CSAIL, [email protected]. Research supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. zUniversity of Virginia, [email protected]. Research performed at IBM Zurich Research Laboratory, Switzerland. xMIT CSAIL, [email protected] 1 1 Introduction A recent line of research in theoretical cryptography aims to understand whether it is possible to obfuscate programs so that a program's code becomes unintelligible while its functionality remains unchanged. A general method for obfuscating programs would lead to the solution of many open problems in cryptography. Unfortunately, Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan and Yang [3] show that for many notions of obfuscation, a general program obfuscator does not exist|i.e., they exhibit a class of circuits which cannot be obfuscated. -
John Backus (1924–2007) Inventor of Science’S Most Widespread Programming Language, Fortran
NEWS & VIEWS NATURE|Vol 446|26 April 2007 OBITUARY John Backus (1924–2007) Inventor of science’s most widespread programming language, Fortran. John Backus, who died on 17 March, was developed elsewhere around the same time, a pioneer in the early development of however, Speedcoding produced programs IBM/AP computer programming languages, and was that were uneconomically slow. subsequently a leading researcher in so- Backus proposed to his manager the called functional programming. He spent his development of a system he called the entire career with IBM. Formula Translator — later contracted to Backus was born on 3 December 1924 in Fortran — in autumn 1953 for the model Philadelphia, and was raised in Wilmington, 704 computer, which was soon to be Delaware. His father had been trained as a launched. The unique feature of Fortran was chemist, but changed careers to become a that it would produce programs that were partner in a brokerage house, and the family 90% as good as those written by a human became wealthy and socially prominent. As a programmer. Backus got the go-ahead, and child, Backus enjoyed mechanical tinkering was allocated a team of ten programmers and loved his chemistry set, but showed for six months. Designing a translator that little scholastic interest or aptitude. He was produced efficient programs turned out to be sent to The Hill School, an exclusive private a huge challenge, and, by the time the system high school in Pottstown, Pennsylvania. was launched in April 1957, six months had His academic performance was so poor that become three years. -
The Gödel Prize 2020 - Call for Nominatonn
The Gödel Prize 2020 - Call for Nominatonn Deadline: February 15, 2020 The Gödel Prize for outntanding papern in the area of theoretial iomputer niienie in nponnored jointly by the European Annoiiaton for Theoretial Computer Siienie (EATCS) and the Annoiiaton for Computng Maihinery, Speiial Innterent Group on Algorithmn and Computaton Theory (AC M SInGACT) The award in prenented annually, with the prenentaton taaing plaie alternately at the Innternatonal Colloquium on Automata, Languagen, and Programming (InCALP) and the AC M Symponium on Theory of Computng (STOC) The 28th Gödel Prize will be awarded at the 47th Innternatonal Colloquium on Automata, Languagen, and Programming to be held during 8-12 July, 2020 in Beijing The Prize in named in honour of Kurt Gödel in reiogniton of hin major iontributonn to mathematial logii and of hin interent, diniovered in a leter he wrote to John von Neumann nhortly before von Neumann’n death, in what han beiome the famoun “P vernun NP” quenton The Prize iniluden an award of USD 5,000 Award Committee: The 2020 Award Commitee ionnintn of Samnon Abramnay (Univernity of Oxford), Anuj Dawar (Chair, Univernity of Cambridge), Joan Feigenbaum (Yale Univernity), Robert Krauthgamer (Weizmann Innnttute), Daniel Spielman (Yale Univernity) and David Zuiaerman (Univernity of Texan, Auntn) Eligibility: The 2020 Prize rulen are given below and they nupernede any diferent interpretaton of the generii rule to be found on webniten of both SInGACT and EATCS Any renearih paper or nerien of papern by a ningle author or by -
Speaker Bios
SPEAKER BIOS Speaker: Nilanjan Banerjee, Associate Professor, Computer Science & Electrical Engineering, UMBC Topic: Internet of Things/Cyber-Physical Systems Nilanjan Banerjee is an Associate Professor at University of Maryland, Baltimore County. He is an expert in mobile and sensor systems with focus on designing end-to-end cyber-physical systems with applications to physical rehabilitation, physiological monitoring, and home energy management systems. He holds a Ph.D. and a M.S. in Computer Science from the University of Massachusetts Amherst and a BTech. (Hons.) from Indian Institute of Technology, Kharagpur. Speaker: Keith Bowman, Dean, College of Engineering & Information Technology (COEIT), UMBC Topics: Welcoming Remarks and Farewell and Wrap Keith J. Bowman has begun his tenure as the new dean of UMBC’s College of Engineering and Information Technology (COEIT). He joined UMBC on August 1, 2017, from San Francisco State University in California, where he served as dean of the College of Science and Engineering since 2015. Bowman holds a Ph.D. in materials science from the University of Michigan, and B.S. and M.S. degrees in materials science from Case Western Reserve University. Prior to his role at SFSU, he held various positions at the Illinois Institute of Technology and Purdue University. At the Illinois Institute of Technology, he was the Duchossois Leadership Professor and chair of mechanical, materials, and aerospace engineering. In Purdue University’s School of Materials Engineering, he served as a professor and head of the school. He also held visiting professorships at the Technical University of Darmstadt in Germany and at the University of New South Wales in Australia. -
Obfuscating Compute-And-Compare Programs Under LWE
58th Annual IEEE Symposium on Foundations of Computer Science Obfuscating Compute-and-Compare Programs under LWE Daniel Wichs Giorgos Zirdelis Northeastern University Northeastern University [email protected] [email protected] Abstract—We show how to obfuscate a large and expres- that the obfuscated program can be simulated given black- sive class of programs, which we call compute-and-compare box access to the program’s functionality. Unfortunately, programs, under the learning-with-errors (LWE) assumption. they showed that general purpose VBB obfuscation is un- Each such program CC[f,y] is parametrized by an arbitrary polynomial-time computable function f along with a target achievable. This leaves open two possibilities: (1) achieving value y and we define CC[f,y](x) to output 1 if f(x)=y weaker security notions of obfuscation for general programs, and 0 otherwise. In other words, the program performs an and (2) achieving virtual black box obfuscation for restricted arbitrary computation f and then compares its output against classes of programs. y a target . Our obfuscator satisfies distributional virtual-black- Along the first direction, Barak et al. proposed a weaker box security, which guarantees that the obfuscated program does not reveal any partial information about the function f security notion called indistinguishability obfuscation (iO) or the target value y, as long as they are chosen from some which guarantees that the obfuscations of two functionally distribution where y has sufficient pseudo-entropy given f. equivalent programs are indistinguishable. In a breakthrough We also extend our result to multi-bit compute-and-compare result, Garg, Gentry, Halevi, Raykova, Sahai and Waters MBCC[f,y,z](x) z programs which output a message if [GGH+13b] showed how to iO-obfuscate all polynomial- f(x)=y. -
October 1983 Table of Contents
Fairfield Meeting (October 28-29)- Page 614 San Luis Obispo Meeting (November 11-12)-Page 622 Evanston Meeting (November 11-12)-Page 630 Notices of the American Mathematical Society October 1983, Issue 228 Volume 30, Number 6, Pages 569- 712 Providence, Rhode Island USA ISSN 0002-9920 Calendar of AMS Meetings THIS CALENDAR lists all meetings which have been approved by the Council prior to the date this issue of the Notices was sent to press. The summer and annual meetings are joint meetings of the Mathematical Association of America and the Ameri· can Mathematical Society. The meeting dates which fall rather far in the future are subject to change; this is particularly true of meetings to which no numbers have yet been assigned. Programs of the meetings will appear in the issues indicated below. First and second announcements of the meetings will have appeared in earlier issues. ABSTRACTS OF PAPERS presented at a meeting of the Society are published in the journal Abstracts of papers presented to the American Mathematical Society in the issue corresponding to that of the Notices which contains the program of the meet· ing. Abstracts should be submitted on special forms which are available in many departments of mathematics and from the office of the Society in Providence. Abstracts of papers to be presented at the meeting must be received at the headquarters of the Society in Providence, Rhode Island, on or before the deadline given below for the meeting. Note that the deadline for ab· stracts submitted for consideration for presentation at special sessions is usually three weeks earlier than that specified below. -
Exploring Differential Obliviousness∗
Exploring Differential Obliviousness∗ Amos Beimely Kobbi Nissimz Mohammad Zaherix October 4, 2019 Abstract In a recent paper, Chan et al. [SODA ’19] proposed a relaxation of the notion of (full) memory obliv- iousness, which was introduced by Goldreich and Ostrovsky [J. ACM ’96] and extensively researched by cryptographers. The new notion, differential obliviousness, requires that any two neighboring inputs exhibit similar memory access patterns, where the similarity requirement is that of differential privacy. Chan et al. demonstrated that differential obliviousness allows achieving improved efficiency for several algorithmic tasks, including sorting, merging of sorted lists, and range query data structures. In this work, we continue the exploration of differential obliviousness, focusing on algorithms that do not necessarily examine all their input. This choice is motivated by the fact that the existence of loga- rithmic overhead ORAM protocols implies that differential obliviousness can yield at most a logarithmic improvement in efficiency for computations that need to examine all their input. In particular, we explore property testing, where we show that differential obliviousness yields an almost linear improvement in overhead in the dense graph model, and at most quadratic improvement in the bounded degree model. We also explore tasks where a non-oblivious algorithm would need to explore different portions of the input, where the latter would depend on the input itself, and where we show that such a behavior can be maintained under differential obliviousness, but not under full obliviousness. Our examples suggest that there would be benefits in further exploring which class of computational tasks are amenable to differential obliviousness. arXiv:1905.01373v2 [cs.CR] 2 Oct 2019 ∗Work supported by NSF grant No. -
The Gödel Prize 2019 - Call for Nominations Deadline: February 15, 2019
The Gödel Prize 2019 - Call for Nominations Deadline: February 15, 2019 The Gödel Prize for outstanding papers in the area of theoretical computer science is sponsored jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery, Special Interest Group on Algorithms and Computation Theory (ACM SIGACT). The award is presented annually, with the presentation taking place alternately at the International Colloquium on Automata, Languages, and Programming (ICALP) and the ACM Symposium on Theory of Computing (STOC). The 27th Gödel Prize will be awarded at 51st Annual ACM Symposium on the Theory of Computing to be held during June 23-26, 2019 in Phoenix, AZ. The Prize is named in honor of Kurt Gödel in recognition of his major contributions to mathematical logic and of his interest, discovered in a letter he wrote to John von Neumann shortly before von Neumann’s death, in what has become the famous “P versus NP” question. The Prize includes an award of USD 5,000. Award Committee: The 2019 Award Committee consists of Anuj Dawar (Cambridge University), Robert Krauthgamer (Weizmann Institute), Joan Feigenbaum (Yale University), Giuseppe Persiano (Università di Salerno), Omer Reingold (Chair, Stanford University) and Daniel Spielman (Yale University). Eligibility: The 2019 Prize rules are given below and they supersede any different interpretation of the generic rule to be found on websites of both SIGACT and EATCS. Any research paper or series of papers by a single author or by a team of authors is deemed eligible if: - The main results were not published (in either preliminary or final form) in a journal or conference proceedings before January 1st, 2006. -
2 9215FQ14 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources
2 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources 21-22 Legal 23-25 Marketing 26 Personal Names (Individuals) 27 Predecessor Companies 28-29 Products & Services 30-89 Public Relations 90 Research 91-97 April 10, 2007 9215FQ14 3 Facilities & Buildings Q. When did IBM first open its offices in my town? A. While it is not possible for us to provide such information for each and every office facility throughout the world, the following listing provides the date IBM offices were established in more than 300 U.S. and international locations: Adelaide, Australia 1914 Akron, Ohio 1917 Albany, New York 1919 Albuquerque, New Mexico 1940 Alexandria, Egypt 1934 Algiers, Algeria 1932 Altoona, Pennsylvania 1915 Amsterdam, Netherlands 1914 Anchorage, Alaska 1947 Ankara, Turkey 1935 Asheville, North Carolina 1946 Asuncion, Paraguay 1941 Athens, Greece 1935 Atlanta, Georgia 1914 Aurora, Illinois 1946 Austin, Texas 1937 Baghdad, Iraq 1947 Baltimore, Maryland 1915 Bangor, Maine 1946 Barcelona, Spain 1923 Barranquilla, Colombia 1946 Baton Rouge, Louisiana 1938 Beaumont, Texas 1946 Belgrade, Yugoslavia 1926 Belo Horizonte, Brazil 1934 Bergen, Norway 1946 Berlin, Germany 1914 (prior to) Bethlehem, Pennsylvania 1938 Beyrouth, Lebanon 1947 Bilbao, Spain 1946 Birmingham, Alabama 1919 Birmingham, England 1930 Bogota, Colombia 1931 Boise, Idaho 1948 Bordeaux, France 1932 Boston, Massachusetts 1914 Brantford, Ontario 1947 Bremen, Germany 1938 9215FQ14 4 Bridgeport, Connecticut 1919 Brisbane, Australia -
Modern Database Systems: Newsql, Nosql and Modernized Classic Systems
NetApp 7th Annual University Day NetApp HQ, Sunnyvale, CA, USA 17 February 2014 Modern Database Systems: NewSQL, NoSQL and Modernized Classic Systems C. Mohan IBM Fellow and Former IBM India Chief Scientist IBM Almaden Research Center, San Jose, CA 95120, USA [email protected] http://bit.ly/CMohan Talk Version of Tutorial Presented First at 39th International Conference on Very Large Data Bases (VLDB) Riva del Garda, Italy, 29 August 2013 Links to Revised Tutorial Slides and Bibliography at http://bit.ly/CMnMDS Background + Warnings § My personal opinions, NOT necessarily IBM’s positions/opinions § Lots of hype on NoSQL (lesser on NewSQL) in industry, academia & VC world – this Kool-Aid has intoxicated many J § Been a details oriented, hard core DB person for > 3 decades – I go beyond hype, am not easily swayed by the latest fashion! § Not a relational bigot – most of my results on systems topics have applied to all sorts of persistent, distributed information systems § Have dissected many IBM and non-IBM systems’ internals (including pre- and post-relational ones) § Don’t claim to have all the answers or make definitive assertions § Aim: not exhaustive survey of modern systems or details of too many specific systems – broad brush analysis of good (sensible) and bad (nonsenSQL) of NoSQL/NewSQL, warn of pitfalls – time to pause and introspect. Give a few systems’ interesting details. § NOT against NoSQL but unhappy with choices on internals, design justifications (“anything goes”), and not learning enough from the past C. Mohan, MDS Tutorial,