Computer Science Department Stanford
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Tarjan Transcript Final with Timestamps
A.M. Turing Award Oral History Interview with Robert (Bob) Endre Tarjan by Roy Levin San Mateo, California July 12, 2017 Levin: My name is Roy Levin. Today is July 12th, 2017, and I’m in San Mateo, California at the home of Robert Tarjan, where I’ll be interviewing him for the ACM Turing Award Winners project. Good afternoon, Bob, and thanks for spending the time to talk to me today. Tarjan: You’re welcome. Levin: I’d like to start by talking about your early technical interests and where they came from. When do you first recall being interested in what we might call technical things? Tarjan: Well, the first thing I would say in that direction is my mom took me to the public library in Pomona, where I grew up, which opened up a huge world to me. I started reading science fiction books and stories. Originally, I wanted to be the first person on Mars, that was what I was thinking, and I got interested in astronomy, started reading a lot of science stuff. I got to junior high school and I had an amazing math teacher. His name was Mr. Wall. I had him two years, in the eighth and ninth grade. He was teaching the New Math to us before there was such a thing as “New Math.” He taught us Peano’s axioms and things like that. It was a wonderful thing for a kid like me who was really excited about science and mathematics and so on. The other thing that happened was I discovered Scientific American in the public library and started reading Martin Gardner’s columns on mathematical games and was completely fascinated. -
David Luckham Is the Keynote Speaker at Pen,” He Says
45-iAGEJul-Influ 14/7/04 4:02 pm Page 45 PERSPECTIVE INFLUENCER Man of events or the first year after David vision. As they do so, they will undoubt- Luckham’s book, The Power of Events, edly turn to Luckham’s book for a was published in 2002, it did what grounding in the design principles. F Power of Events most technical books do: disappeared The is based on years of into the academic ether. The publishers, research work at Stanford and two years he says, didn’t promote it at all, and its as CTO of a software start-up working in technical nature put it beyond the reach the field. The book is a technical mani- of most readers. festo for CEP – the ability of systems to As a result, it looked like the ‘event- recognise and respond to complex, inter- driven revolution’, of which the Stanford related events in real time. University Emeritus Professor is the lead- Luckham has spent 22 years as a ing and most passionate advocate, would Professor of Electrical Engineering at be postponed for a few years more. Stanford, and many years before that Stanford University But then, in mid-2003, two important doing ground-breaking work at Emeritus Professor David US technical journals gave the book Harvard, Stanford, UCLA and MIT. But highly positive reviews, and interest his presentations, and the first half of Luckham has spent began to grow. Sales began to rise, at first his book, at least, are in plain English, decades studying event slowly, then dramatically. Luckham star- full of clear examples of why CEP will processing. -
MODELING and ANALYSIS of MOBILE TELEPHONY PROTOCOLS by Chunyu Tang a DISSERTATION Submitted to the Faculty of the Stevens Instit
MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS by Chunyu Tang A DISSERTATION Submitted to the Faculty of the Stevens Institute of Technology in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Chunyu Tang, Candidate ADVISORY COMMITTEE David A. Naumann, Chairman Date Yingying Chen Date Daniel Duchamp Date Susanne Wetzel Date STEVENS INSTITUTE OF TECHNOLOGY Castle Point on Hudson Hoboken, NJ 07030 2013 c 2013, Chunyu Tang. All rights reserved. iii MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS ABSTRACT The GSM (2G), UMTS (3G), and LTE (4G) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. This poses serious challenges in ensuring authentication and other security properties. Analyzing the security of all possible interoperation scenarios by hand is, at best, tedious under- taking. Model checking techniques provide an effective way to automatically find vulnerabilities in or to prove the security properties of security protocols. Although the specifications address the interoperation cases between GSM and UMTS and the switching and mapping of established security context between LTE and previous technologies, there is not a comprehensive specification of which are the possible interoperation cases. Nor is there comprehensive specification of the procedures to establish security context (authentication and short-term keys) in the various interoperation scenarios. We systematically enumerate the cases, classifying them as allowed, disallowed, or uncertain with rationale based on detailed analysis of the specifications. We identify the authentication and key agreement procedure for each of the possible cases. We formally model the pure GSM, UMTS, LTE authentication protocols, as well as all the interoperation scenarios; we analyze their security, in the symbolic model of cryptography, using the tool ProVerif. -
Department of Computer Science
i cl i ck ! MAGAZINE click MAGAZINE 2014, VOLUME II FIVE DECADES AS A DEPARTMENT. THOUSANDS OF REMARKABLE GRADUATES. 50COUNTLESS INNOVATIONS. Department of Computer Science click! Magazine is produced twice yearly for the friends of got your CS swag? CS @ ILLINOIS to showcase the innovations of our faculty and Commemorative 50-10 Anniversary students, the accomplishments of our alumni, and to inspire our t-shirts are available! partners and peers in the field of computer science. Department Head: Editorial Board: Rob A. Rutenbar Tom Moone Colin Robertson Associate Department Heads: Rob A. Rutenbar shop now! my.cs.illinois.edu/buy Gerald DeJong Michelle Wellens Jeff Erickson David Forsyth Writers: David Cunningham CS Alumni Advisory Board: Elizabeth Innes Alex R. Bratton (BS CE ’93) Mike Koon Ira R. Cohen (BS CS ’81) Rick Kubetz Vilas S. Dhar (BS CS ’04, BS LAS BioE ’04) Leanne Lucas William M. Dunn (BS CS ‘86, MS ‘87) Tom Moone Mary Jane Irwin (MS CS ’75, PhD ’77) Michelle Rice Jennifer A. Mozen (MS CS ’97) Colin Robertson Daniel L. Peterson (BS CS ’05) Laura Schmitt Peter L. Tannenwald (BS LAS Math & CS ’85) Michelle Wellens Jill C. Zmaczinsky (BS CS ’00) Design: Contact us: SURFACE 51 [email protected] 217-333-3426 Machines take me by surprise with great frequency. Alan Turing 2 CS @ ILLINOIS Department of Computer Science College of Engineering, College of Liberal Arts & Sciences University of Illinois at Urbana-Champaign shop now! my.cs.illinois.edu/buy click i MAGAZINE 2014, VOLUME II 2 Letter from the Head 4 ALUMNI NEWS 4 Alumni -
Reducibility
Reducibility t REDUCIBILITY AMONG COMBINATORIAL PROBLEMS Richard M. Karp University of California at Berkeley Abstract: A large class of computational problems involve the determination of properties of graphs, digraphs, integers, arrays of integers, finite families of finite sets, boolean formulas and elements of other countable domains. Through simple encodings from such domains into the set of words over a finite alphabet these problems can be converted into language recognition problems, and we can inquire into their computational complexity. It is reasonable to consider such a problem satisfactorily solved when an algorithm for its solution is found which terminates within a . number of steps bounded by a polynomial in the length of the input. We show that a large number of classic unsolved problems of cover- ing. matching, packing, routing, assignment and sequencing are equivalent, in the sense that either each of them possesses a polynomial-bounded algorithm or none of them does. 1. INTRODUCTION All the general methods presently known for computing the chromatic number of a graph, deciding whether a graph has a Hamilton circuit. or solving a system of linear inequalities in which the variables are constrained to be 0 or 1, require a combinatorial search for which the worst case time requirement grows exponentially with the length of the input. In this paper we give theorems which strongly suggest, but do not imply, that these problems, as well as many others, will remain intractable perpetually. t This research was partially supported by National Science Founda- tion Grant GJ-474. 85 R. E. Miller et al. (eds.), Complexity of Computer Computations © Plenum Press, New York 1972 86 RICHARD M. -
Lipics-ISAAC-2020-42.Pdf (0.5
Multiparty Selection Ke Chen Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Adrian Dumitrescu Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Abstract Given a sequence A of n numbers and an integer (target) parameter 1 ≤ i ≤ n, the (exact) selection problem is that of finding the i-th smallest element in A. An element is said to be (i, j)-mediocre if it is neither among the top i nor among the bottom j elements of S. The approximate selection problem is that of finding an (i, j)-mediocre element for some given i, j; as such, this variant allows the algorithm to return any element in a prescribed range. In the first part, we revisit the selection problem in the two-party model introduced by Andrew Yao (1979) and then extend our study of exact selection to the multiparty model. In the second part, we deduce some communication complexity benefits that arise in approximate selection. In particular, we present a deterministic protocol for finding an approximate median among k players. 2012 ACM Subject Classification Theory of computation Keywords and phrases approximate selection, mediocre element, comparison algorithm, i-th order statistic, tournaments, quantiles, communication complexity Digital Object Identifier 10.4230/LIPIcs.ISAAC.2020.42 1 Introduction Given a sequence A of n numbers and an integer (selection) parameter 1 ≤ i ≤ n, the selection problem asks to find the i-th smallest element in A. If the n elements are distinct, the i-th smallest is larger than i − 1 elements of A and smaller than the other n − i elements of A. -
A Closer Look at the Sorption Behavior of Nonionic Surfactants in Marine Sediment
A closer look at the sorption behavior of nonionic surfactants in marine sediment Steven Droge Droge, S. / A closer look at the sorption behavior of nonionic surfactants in marine sediment. PhD thesis, 2008, Institute for Risk Assessment Sciences (IRAS), Utrecht University, The Netherlands ISBN 978-90-393-4774-4 Printed by Ridderprint Cover picture: The Great Wave off Kanagawa by Hokusai (ca. 1830-32) Design by Martijn Dorresteijn A closer look at the sorption behavior of nonionic surfactants in marine sediment Een nadere beschouwing van het sorptiegedrag van niet-ionogene oppervlakte-aktieve stoffen in marien sediment (met een samenvatting in het Nederlands) Proefschrift ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr. J. C. Stoof, ingevolge het besluit van het college voor promoties in het openbaar te verdedigen op dinsdag 25 maart 2008 des middags te 4.15 uur door Stefanus Theodorus Johannes Droge geboren op 19 februari 1978 te Alkmaar Promotor: Prof.dr. W. Seinen Co-promotor: Dr. J. L. M. Hermens The research described in this thesis was financially supported by ERASM (Environmental Risk Assessment and Management), a joint platform of the European detergent and surfactants producers [A.I.S.E (Association Internationale de la Savonnerie, de la Détergence et des Produits d’Entretien) and CESIO (Comité Européen des Agents Surface et de leurs Intermédiaires Organiques)] CONTENTS Chapter 1 1 General Introduction Chapter 2 25 Analysis of Freely Dissolved Alcohol Ethoxylate Homologues -
The Computational Attitude in Music Theory
The Computational Attitude in Music Theory Eamonn Bell Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Eamonn Bell All rights reserved ABSTRACT The Computational Attitude in Music Theory Eamonn Bell Music studies’s turn to computation during the twentieth century has engendered particular habits of thought about music, habits that remain in operation long after the music scholar has stepped away from the computer. The computational attitude is a way of thinking about music that is learned at the computer but can be applied away from it. It may be manifest in actual computer use, or in invocations of computationalism, a theory of mind whose influence on twentieth-century music theory is palpable. It may also be manifest in more informal discussions about music, which make liberal use of computational metaphors. In Chapter 1, I describe this attitude, the stakes for considering the computer as one of its instruments, and the kinds of historical sources and methodologies we might draw on to chart its ascendance. The remainder of this dissertation considers distinct and varied cases from the mid-twentieth century in which computers or computationalist musical ideas were used to pursue new musical objects, to quantify and classify musical scores as data, and to instantiate a generally music-structuralist mode of analysis. I present an account of the decades-long effort to prepare an exhaustive and accurate catalog of the all-interval twelve-tone series (Chapter 2). This problem was first posed in the 1920s but was not solved until 1959, when the composer Hanns Jelinek collaborated with the computer engineer Heinz Zemanek to jointly develop and run a computer program. -
Purely Functional Data Structures
Purely Functional Data Structures Chris Okasaki September 1996 CMU-CS-96-177 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Thesis Committee: Peter Lee, Chair Robert Harper Daniel Sleator Robert Tarjan, Princeton University Copyright c 1996 Chris Okasaki This research was sponsored by the Advanced Research Projects Agency (ARPA) under Contract No. F19628- 95-C-0050. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of ARPA or the U.S. Government. Keywords: functional programming, data structures, lazy evaluation, amortization For Maria Abstract When a C programmer needs an efficient data structure for a particular prob- lem, he or she can often simply look one up in any of a number of good text- books or handbooks. Unfortunately, programmers in functional languages such as Standard ML or Haskell do not have this luxury. Although some data struc- tures designed for imperative languages such as C can be quite easily adapted to a functional setting, most cannot, usually because they depend in crucial ways on as- signments, which are disallowed, or at least discouraged, in functional languages. To address this imbalance, we describe several techniques for designing functional data structures, and numerous original data structures based on these techniques, including multiple variations of lists, queues, double-ended queues, and heaps, many supporting more exotic features such as random access or efficient catena- tion. In addition, we expose the fundamental role of lazy evaluation in amortized functional data structures. -
Parallel Programming by Transformation
Universidade do Minho Escola de Engenharia Davide Rua Carneiro An agent-based architecture for online Universidade do Minho dispute resolutionEscola services de Engenharia Parallel Programming by Transformation Rui Carlos Ara´ujoGon¸calves The MAP Doctoral Program in Computer Science The MAP-i Doctoral Program of the of the Universities of Minho, Aveiro and Porto Universities of Minho, Aveiro and Porto universidade de aveiro Universidade do Minho Supervisors: Professor Jo~aoLu´ısFerreira Sobral A thesisProfessor submitted Don Batory at the University of Minho for the degree of Doctor of Philosophy in Informatics (PhD) underApril 2015the supervision of Paulo Jorge Freitas de Oliveira Novais and José Carlos Ferreira Maia Neves July 2013 Acknowledgments Several people contributed to this journey that now is about to end. Among my family, friends, professors, etc., it is impossible to list all who helped me over the years. Nevertheless, I want to highlight some people that had a key role in the success of this journey. I would like to thank Professor Jo~aoLu´ısSobral, for bringing me into this world, for pushing me into pursuing a PhD, and for the comments and directions provided. I would like thank Professor Don Batory, for everything he taught me over these years, and for being always available to discuss my work and to share his expertise with me. I will be forever grateful for all the guidance and insights he provided me, which were essential to the conclusion of this work. I would like to thank the people I had the opportunity to work with at the University of Texas at Austin, in particular Professor Robert van de Geijn, Bryan Marker, and Taylor Rich´e,for the important contributions they gave to this work. -
Origins of the American Association for Artificial Intelligence
AI Magazine Volume 26 Number 4 (2006)(2005) (© AAAI) 25th Anniversary Issue The Origins of the American Association for Artificial Intelligence (AAAI) Raj Reddy ■ This article provides a historical background on how AAAI came into existence. It provides a ratio- nale for why we needed our own society. It pro- vides a list of the founding members of the com- munity that came together to establish AAAI. Starting a new society comes with a whole range of issues and problems: What will it be called? How will it be financed? Who will run the society? What kind of activities will it engage in? and so on. This article provides a brief description of the consider- ations that went into making the final choices. It also provides a description of the historic first AAAI conference and the people that made it happen. The Background and the Context hile the 1950s and 1960s were an ac- tive period for research in AI, there Wwere no organized mechanisms for the members of the community to get together and share ideas and accomplishments. By the early 1960s there were several active research groups in AI, including those at Carnegie Mel- lon University (CMU), the Massachusetts Insti- tute of Technology (MIT), Stanford University, Stanford Research Institute (later SRI Interna- tional), and a little later the University of Southern California Information Sciences Insti- tute (USC-ISI). My own involvement in AI began in 1963, when I joined Stanford as a graduate student working with John McCarthy. After completing my Ph.D. in 1966, I joined the faculty at Stan- ford as an assistant professor and stayed there until 1969 when I left to join Allen Newell and Herb Simon at Carnegie Mellon University Raj Reddy. -
A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay It was my first trip to the US. It had not yet sunk in that I had been chosen by ACM India as one of two Ph.D. students from India to attend the big ACM Turing Centenary Celebration in San Francisco until I saw the familiar face of Stephen Cook enter a room in the hotel a short distance from mine; later, Moshe Vardi recognized me from his trip to IITB during FSTTCS, 2011. I recognized Nitin Saurabh from IMSc Chennai, the other student chosen by ACM-India; 11 ACM SIG©s had sponsored students and there were about 75 from all over the world. Registration started at 8am on 15th June, along with breakfast. Collecting my ©Student Scholar© badge and stuffing in some food, I entered a large hall with several hundred seats, a brightly lit podium with a large screen in the middle flanked by two others. The program began with a video giving a brief biography of Alan Turing from his boyhood to the dynamic young man who was to change the world forever. There were inaugural speeches by John White, CEO of ACM, and Vint Cerf, the 2004 Turing Award winner and incoming ACM President. The MC for the event, Paul Saffo, took over and the panel discussions and speeches commenced. A live Twitter feed made it possible for people in the audience and elsewhere to post questions/comments which were actually taken up in the discussions. Of the many sessions that took place in the next two days, I will describe three that I found most interesting.