Information & computer science publications
-
Co-Location-Resistant Clouds
We consider the problem of designing multi-tenant public infrastructure clouds resistant to cross-VM attacks without relying on single-tenancy or on assumptions about the cloud's servers.
-
Inconsistency Monitoring in a Large Scientific Knowledge Base
We describe our approach for inconsistency monitoring in a large biology KB.
-
Control Systems Security from the Front Lines
As part of this special issue on control systems for the energy sector, guest editors Sean Peisert and Jonathan Margulies put together a roundtable discussion so readers can learn about…
-
Rosemary: A Robust, Secure, and High-Performance Network Operating System
We demonstrate how simple and common failures in a network application may lead to loss of the control layer, and in effect, loss of network control. To address these concerns…
-
Entity Centric Feature Pooling for Complex Event Detection
In this paper, we propose an entity centric region of interest detection and visual-semantic pooling scheme for complex event detection in YouTube-like videos.
-
Question Generation from a Knowledge Base
We present a technique for responding to natural language questions, by suggesting a series of questions that the system can actually answer. We also show that the suggested questions are…
-
Outsourcing Private Ram Computation
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that the client's work is small and essentially independent…
-
Smten with Satisfiability-Based Research
We present Smten, a high-level language for orchestrating and constructing satisfiability-based search queries. We show that applications developed using Smten require significantly fewer lines of code and less developer effort…
-
Adaptive Interest Modeling Improves Content Services at the Network Edge
How to get the relevant content to the right user quickly, in the midst of network disruptions and resource constraints, is a key research challenge.
-
Risks and Myths of Cloud Computing and Cloud Storage
Considering existing and new types of risks inherent in cloud services.
-
A Computational Photography Shootout: Wavefront Coding Vs. Lattice Focal Imaging
We systematically compared the optical performance of two computational photography (CP) approaches used to extend the depth of field of an imaging system: wavefront coding and lattice focal lens imaging.
-
Mechanized Support for Assurance Case Argumentation
We propose simple ways in which an assurance case, formalized in a mechanized verification system to support the first purpose, can be adapted to serve the second.