|
Last Updated |
Adversarial Learning: Mind Games with the Opponent
|
|
Machine learning algorithms have created the sensation of working with experts in an endless list of fields--advertisers, detectives, doctors, chess masters, soccer players, loan creditors, salespeople, entertainment critics, drivers, and even matchmakers. Machines with intelligence have dazzled
-
Murat Kantarcioglu and Bowei Xi and Yan Zhou
|
Aug 7 2017 |
Internet Voting: Will We Cast Our Next Votes Online?
|
|
This simple question is at the crux of many discussions of Internet voting. In short, online banking has checks and balances, visibility, liability, and recourse. If an unauthorized banking transaction occurs, you can see it in your statement. The bank is responsible for losses, and has the ability to reverse an erroneous transaction. And, above all, you and your bank both know that the transaction was on your account, and where to return the money!
-
Jeremy Epstein
|
Sep 15 2016 |
Thinking in Sync: The Bulk-Synchronous Parallel Approach to Large-Scale Computing
|
|
The bulk-synchronous parallel (BSP) paradigm provides an abstract model that separates the concerns of hardware architects and software designers, thereby bridging the two. Leslie Valiant, winner of the 2010 ACM Turing Award, presented BSP as such a bridging model [1].
-
Rob H. Bisseling and Albert-Jan N. Yzelman
|
Apr 10 2016 |
Enhancing Anonymity: Cryptographic and Statistical Approaches for Shredding Our Digital Dossiers
|
|
Never one to shy away from mixing humor with politics, fashion designer Kenneth Cole years ago ran an iconic ad that glibly declared, “You are on a video camera an average of ten times a day. Are you dressed for it?” While the statistic has been rendered a vast understatement, the sentiment still rings true: we all leave traces of ourselves when we interact in the world, and are generally oblivious to how often and how they will be spliced, recombined, processed, and shared.
-
Jeremy Clark
|
Dec 15 2014 |
Mobile Health Applications: Designing with the User in Mind
|
|
Our lives are being changed by the increasing presence of smartphones. In fact, a recent survey found that more than half of US mobile subscribers now own one. As a result of this growth, numerous mobile health (mHealth) applications are becoming ingrained in our everyday lives. These applications focus on a variety of issues, ranging from medication reminders to wellness.
-
Madhu Reddy
|
Aug 29 2014 |
Autonomous Virtual and Artificial Characters: Realistic Inhabitants of Artificial Worlds
|
|
Virtual characters, also known as virtual actors, have become very popular in the last 15 years, mainly through 3D movies and games. In movies, they now have very realistic physical and emotional characteristics, including their facial expressions, hair, clothes, and motions.
-
Nadia Magnenat-Thalmann and Daniel Thalmann
|
Feb 12 2014 |
The Nonequispaced FFT: An Indispensable Algorithm for Applied Science
|
|
Fast Fourier transforms (FFTs) are one of the "10 algorithms with the greatest influence on the development and practice of science and engineering in the 20th century" [1]. This is because the FFT is applied in almost every area of modern science, including fields as diverse as acoustics, astronomy, computational biology, fluid dynamics, medicine, physics, and digital signal processing.
-
Daniel Potts
|
Apr 9 2013 |
The Critical Need for Computational Intelligence in Human Genetics
|
|
An important goal of human genetics is to identify which genes and which specific DNA sequence variations (polymorphisms) play an important role in determining susceptibility to common diseases such as cancer, essential hypertension, and schizophrenia.
-
Jason H. Moore
|
Feb 6 2013 |
Adversarial Information Retrieval: The Manipulation of Web Content
|
|
Adversarial information retrieval has become a very active research area in the last few years. As the name indicates, adversarial information retrieval research differs from traditional information retrieval in that the content providers may have an adversarial relationship with the entity (usually a search engine) that consumes their content.
-
Dennis Fetterly
|
Jul 10 2007 |
Managing the Unmanageable: Putting Cryptography to Work for Digital Rights
|
|
The advantages of digital content distribution (DCD) include rapid dissemination on a global scale, cost-effectiveness, unparalleled production capabilities, and highly flexible pricing. However, the ease and convenience of storing and transmitting data in digital form is a double-edged sword.
-
Aggelos Kiayias
|
Jun 15 2007 |
Game Theory and the Design of Electronic Markets
|
|
Game theory is the study of decision making among multiple agents (human or software). In a game, the decisions of all agents jointly determine the outcome. An auction is a classic example of a game: the bids of all participants determine the winner and the winning price. This essay illustrates some of the features and bugs in the design of electronic consumer auctions.
-
Amy Greenwald
|
Aug 24 2006 |
Brain Machine Interfaces: Mind over Matter
|
|
Our brains use our bodies to interact with the external world. However, emerging technology is poised to challenge this state of affairs and create direct brain machine interfaces (BMIs) to open up a digital channel between the brain and the physical world.
-
José C. Principe
|
Mar 11 2005 |
|
|
|
Archived |
Open Source: The Dark Horse of Software?
|
|
In 1983, Richard Stallman created a Unix-like operating system called GNU (a recursive acronym for “GNU is Not Unix”) and released it under a license that provided certain rights for use and redistribution - an open-source license. Eight years later, a graduate student at the University of Helsinki, Linus Torvalds, created another Unix-like operating system, Linux, which he also made available for free.
-
Phillip A. Laplante
|
Feb 6 2013 |
Overlay Networks: Networking on Top of the Network
|
|
During the last six years, overlay networks have become one of the most prominent tools for Internet research and development. Overlays permit designers to implement their own routing and packet management algorithms on top of the Internet.
-
David G. Andersen
|
Feb 5 2013 |