Search
Results
-
-
SUBER: An RL Environment with Simulated Human Behavior for Recommender Systems
(2024)Conference Paper -
-
-
A Formal Treatment of End-to-End Encrypted Cloud Storage
(2024)Lecture Notes in Computer ScienceUsers increasingly store their data in the cloud, thereby benefiting from easy access, sharing, and redundancy. To additionally guarantee security of the outsourced data even against a server compromise, some service providers have started to offer end-to-end encrypted (E2EE) cloud storage. With this cryptographic protection, only legitimate owners can read or modify the data. However, recent attacks on the largest E2EE providers have ...Conference Paper -
Towards Learning Abductive Reasoning using VSA Distributed Representations
(2024)Conference Paper -
An Electroencephalography Study on Cognitive Load in Visual and Textual Programming
(2024)ICER 2024 - ACM Conference on International Computing Education ResearchThis paper presents a comparative study of Algot, a visual programming language designed to bridge the syntax-semantics gap via liveness and programming by demonstration, and the textual programming language Python. We conducted an experimental, within-subjects study with 24 undergraduate computer science students who performed recursion-based tasks in each language while their cognitive load was measured using an electroencephalogram and ...Conference Paper -
Principles for Internet Congestion Management
(2024)ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferenceGiven the technical flaws with - -and the increasing non-observance of - -the TCP-friendliness paradigm, we must rethink how the Internet should manage bandwidth allocation. We explore this question from first principles, but remain within the constraints of the Internet's current architecture and commercial arrangements. We propose a new framework, Recursive Congestion Shares (RCS), that provides bandwidth allocations independent of which ...Conference Paper -
Cascade: CPU Fuzzing via Intricate Program Generation
(2024)Generating interesting test cases for CPU fuzzing is akin to generating programs that exercise unusual states inside the CPU. The performance of CPU fuzzing is heavily influenced by the quality of these programs and by the overhead of bug detection. Our analysis of existing state-of-the-art CPU fuzzers shows that they generate programs that are either overly simple or execute a small fraction of their instructions due to invalid control ...Conference Paper