Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Building Decision Tree Classifier On Private Data, Wenliang Du, Zhijun Zhan Jan 2002

Building Decision Tree Classifier On Private Data, Wenliang Du, Zhijun Zhan

Electrical Engineering and Computer Science - All Scholarship

This paper studies how to build a decision tree classifier under the following scenario: a database is vertically partitioned into two pieces, with one piece owned by Alice and the other piece owned by Bob. Alice and Bob want to build a decision tree classifier based on such a database, but due to the privacy constraints, neither of them wants to disclose their private pieces to the other party or to any third party. We present a protocol that allows Alice and Bob to conduct such a classifier building without having to compromise their privacy. Our protocol uses an untrusted …


A Practical Approach To Solve Secure Multi-Party Computation Problems, Wenliang Du, Zhijun Zhan Jan 2002

A Practical Approach To Solve Secure Multi-Party Computation Problems, Wenliang Du, Zhijun Zhan

Electrical Engineering and Computer Science - All Scholarship

Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a computation. Each party needs to contribute its private input to this computation, but no party should disclose its private inputs to the other parties, or to any third party. With the proliferation of the Internet, SMC problems becomes more and more important. So far no practical solution has emerged, largely because SMC studies have been focusing on zero information disclosure, an ideal security model that is expensive to achieve. Aiming at developing practical solutions to SMC problems, we propose a new …


Distributed And Multiprocessor Scheduling, Steven J. Chapin, Jon B, Weissman Jan 2002

Distributed And Multiprocessor Scheduling, Steven J. Chapin, Jon B, Weissman

Electrical Engineering and Computer Science - All Scholarship

This chapter discusses CPU scheduling in parallel and distributed systems. CPU scheduling is part of a broader class of resource allocation problems, and is probably the most carefully studied such problem. The main motivation for multiprocessor scheduling is the desire for increased speed in the execution of a workload. Parts of the workload, called tasks, can be spread across several processors and thus be executed more quickly than on a single processor. In this chapter, we will examine techniques for providing this facility. The scheduling problem for multiprocessor systems can be generally stated as \How can we execute a set …


Integration Of Naradabrokering And Audio/Video Conferencing As A Web Service, Hasan Bulut, Geoffrey C. Fox, Shrideep Pallickara, Ahmet Uyar, Wenjun Wu Jan 2002

Integration Of Naradabrokering And Audio/Video Conferencing As A Web Service, Hasan Bulut, Geoffrey C. Fox, Shrideep Pallickara, Ahmet Uyar, Wenjun Wu

Electrical Engineering and Computer Science - All Scholarship

Audio/Video Conferencing Systems need communication channels between their clients in order to transport RTP packets from one client to another. In this paper we investigate audio/video conferencing as a Web Service and the deployment of publish/subscribe systems in the context of audio/video conferencing systems. In this paper we use our research system NaradaBrokering, which supports both peer-to-peer and publish/subscribe paradigms, as a test bed to investigate these ideas. We also present results from our research system.


A Survey Of Various Frequency Domain Integral Equations For The Analysis Of Scattering From Three-Dimensional Dielectric Objects, Baek Ho Jung, T. K. Sarkar, Y.-S. Chung Jan 2002

A Survey Of Various Frequency Domain Integral Equations For The Analysis Of Scattering From Three-Dimensional Dielectric Objects, Baek Ho Jung, T. K. Sarkar, Y.-S. Chung

Electrical Engineering and Computer Science - All Scholarship

In this paper, we present four different formulations for the analysis of electromagnetic scattering from arbitrarily shaped three-dimensional (3-D) homogeneous dielectric body in the frequency domain. The four integral equations treated here are the electric field integral equation (EFIE), the magnetic field integral equation (MFIE), the combined field integral equation (CFIE), and the PMCHW (Poggio, Miller, Chang, Harrington, and Wu) formulation. For the CFIE case, we propose eight separate formulations with different combinations of expansion and testing functions that result in sixteen different formulations of CFIE. One of the objectives of this paper is to illustrate that not all CFIE …


Interoperable Web Services For Computational Portals, Marlon Pierce, Geoffrey C. Fox, Choonhan Youn, Steve Mock, Kurt Mueller Jan 2002

Interoperable Web Services For Computational Portals, Marlon Pierce, Geoffrey C. Fox, Choonhan Youn, Steve Mock, Kurt Mueller

Electrical Engineering and Computer Science - All Scholarship

Computational web portals are designed to simplify access to diverse sets of high performance computing resources, typically through an interface to computational Grid tools. An important shortcoming of these portals is their lack of interoperable and reusable services. This paper presents an overview of research efforts undertaken by our group to build interoperating portal services around a Web Services model. We present a comprehensive view of an interoperable portal architecture, beginning with core portal services that can be used to build Application Web Services, which in turn may be aggregated and managed through portlet containers.


Buffer Overflow And Format String Overflow Vulnerabilities, Kyung-Suk Lhee, Steve J. Chapin Jan 2002

Buffer Overflow And Format String Overflow Vulnerabilities, Kyung-Suk Lhee, Steve J. Chapin

Electrical Engineering and Computer Science - All Scholarship

This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run time. We augment executable files with type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section), and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library.


Perspectives On The Evolution Of Simulation, Richard E. Nance, Robert G. Sargent Jan 2002

Perspectives On The Evolution Of Simulation, Richard E. Nance, Robert G. Sargent

Electrical Engineering and Computer Science - All Scholarship

Simulation is introduced in terms of its different forms and uses, but the focus on discrete event modeling for systems analysis is dominant as it has been during the evolution of the technique within operations research and the management sciences. This evolutionary trace of over almost fifty years notes the importance of bidirectional influences with computer science, probability and statistics, and mathematics. No area within the scope of operations research and the management sciences has been affected more by advances in computing technology than simulation. This assertion is affirmed in the review of progress in those technical areas that collectively …