Brown University
Displaying 1-40 of 86 results
-
Participatory Networking: An API for Application Control of SDNs
The authors present the design, implementation, and evaluation of an API for applications to control a Software-Defined Network (SDN). Their API is implemented by an OpenFlow controller that delegates...
Provided By Brown University
-
On Verifying the Consistency of Remote Untrusted Services
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each oth...
Provided By Brown University
-
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Password-Authenticated Secret Sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS 2011, allow users to distribute data among several servers so that the data can be recovered using a...
Provided By Brown University
-
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic defenses from such atta...
Provided By Brown University
-
On The Security of One-Witness Blind Signature Schemes
Blind signatures have proved an essential building block for applications that protect privacy while ensuring unforgeability, i.e., electronic cash and electronic voting. One of the oldest, and most e...
Provided By Brown University
-
Malleable Proof Systems and Applications
Malleability for cryptography is not necessarily an opportunity for attack, but in many cases a potentially useful feature that can be exploited. In this paper, the authors examine notions of malleabi...
Provided By Brown University
-
Compression Aware Physical Database Design
Modern RDBMSs support the ability to compress data using methods such as null suppression and dictionary encoding. Data compression offers the promise of significantly reducing storage requirements an...
Provided By Brown University
-
ADsafety Type-Based Verification of JavaScript Sandboxing
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing. The many entry-points o...
Provided By Brown University
-
ADsafety: Type-Based Verification of JavaScript Sandboxing
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which require robust sandboxing. The many entry-points of...
Provided By Brown University
-
Xheal: Localized Self-Healing Using Expanders
The authors consider the problem of self-healing in reconfigurable networks (e.g. peer-to-peer and wireless mesh networks) that are under repeated attack by an omniscient adversary and propose a fully...
Provided By Brown University
-
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
In this paper, the authors initially design a new authenticated data structure for a dynamic table with n entries. They present the first dynamic authenticated table that is update-optimal, using a la...
Provided By Brown University
-
Tight Bounds on Information Dissemination in Sparse Mobile Networks
The emergence of mobile computing devices has added a new intriguing component, mobility, to the study of distributed systems. In fully mobile systems, such as wireless Mobile Ad-hoc NETworks (MANETs)...
Provided By Brown University
-
Self-Organization For Collective Action: An Experimental Study Of Voting On Formal, Informal, And No Sanction Regimes
One of the most fundamental puzzles of economic life is how people can cooperate given the preeminence of self-interest. In some domains, the problem is minimized because cooperation can take the form...
Provided By Brown University
-
State Or Nature? Formal Vs. Informal Sanctioning In The Voluntary Provision Of Public Goods
The sanctioning of norm-violating behavior by an effective formal authority is an efficient solution for social dilemmas. It is in the self-interest of voters and is often favorably contrasted with le...
Provided By Brown University
-
The Case for Predictive Database Systems: Opportunities and Challenges
This paper argues that next generation database management systems should incorporate a predictive model management component to effectively support both inward-facing applications, such as self manag...
Provided By Brown University
-
Bilateral And Community Enforcement In A Networked Market With Simple Strategies
In many markets, successful execution of mutually beneficial economic transactions relies on informal contracts that are enforced by social pressure and reputation. Informal enforcement mechanisms inc...
Provided By Brown University
-
Botticelli: A Supply Chain Management Agent
The paper describes the architecture of Brown University's agent, Botticelli, a finalist in the 2003 Trading Agent Competition in Supply Chain Management (TAC SCM). In TAC SCM, a simulated computer ma...
Provided By Brown University
-
Entropy And The Value Of Information For Investors
Consider any investor who fears ruin facing any set of investments that satisfy no-arbitrage. Before investing, he can purchase information about the state of nature in the form of an information stru...
Provided By Brown University
-
The Margrave Tool for Firewall Analysis
Writing and maintaining firewall configurations can be challenging, even for experienced system administrators. Tools that uncover the consequences of configurations and edits to them can help sysadmi...
Provided By Brown University
-
Rational Secret Sharing With Side Information in Point-to-Point Networks Via Time-Delayed Encryption
In this paper, the authors give the first construction of a rational secret sharing protocol that is strict Nash (or Nash with respect to trembles) in the computational sense, works in a standard poin...
Provided By Brown University
-
Measuring Economic Growth From Outer Space
This paper focuses on measurement of real GDP growth over time within a country, which besides measuring nominal GDP requires the construction of reliable domestic price indices, again a problem for m...
Provided By Brown University
-
Social Networks And Unraveling In Labor Markets
This paper studies the phenomenon of early hiring in entry-level labor markets in the presence of social networks. The authors offer a two-stage model in which workers in training institutions reveal ...
Provided By Brown University
-
Community Structure And Market Outcomes: A Repeated Games In Networks Approach
Consider a large market with asymmetric information, in which sellers choose whether to cooperate or deviate and 'Cheat' their buyers, and buyers decide whether to re-purchase from different sellers. ...
Provided By Brown University
-
Human Capital Investment And The Gender Division Of Labor In A Brawn-Based Economy
The authors use a model of human capital investment and activity choice to explain facts describing gender differentials in the levels and returns to human capital investments. These include the highe...
Provided By Brown University
-
The Demographic Transition: Causes And Consequences
This paper develops the theoretical foundations and the testable implications of the various mechanisms that have been proposed as possible triggers for the demographic transition. Moreover, it examin...
Provided By Brown University
-
Attacks on the AKACP Protocol
In the recent paper by Mohammad et al. it was shown that the protocols for authenticated key agreement proposed by Elkamchuchi and Eldefrawy in and are vulnerable against Key Compromise Impersonation ...
Provided By Brown University
-
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
In recent years, many advances have been made in cryptography, as well as in the performance of communication networks and processors. As a result, many advanced cryptographic protocols are now effici...
Provided By Brown University
-
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays
The authors present the results of an experiment examining the extent to which individuals will tolerate delays when told that such delays are for security purposes. In the experiment, they asked 800 ...
Provided By Brown University
-
Experiences With Tracing Causality in Networked Services
Unlike device-centric monitoring, task-centric tracing enables an operator to causally trace the complete execution of a networked system across the boundaries of applications, protocols, and administ...
Provided By Brown University
-
Egalitarianism Under Incomplete Information
The present paper discusses possible extensions of the egalitarian principle to environments with asymmetric information. The approach will be primarily axiomatic, focusing on the characteristic prope...
Provided By Brown University
-
The Essence of JavaScript
The authors reduce JavaScript to a core calculus structured as a small-step operational semantics. They present several peculiarities of the language and show that the calculus models them. They expli...
Provided By Brown University
-
Public Goods And Voting On Formal Sanction Schemes: An Experiment
An important insight from the last decade of research on the provision of public goods is that the problem of voluntary cooperation can be partially resolved by allowing individuals to engage in infor...
Provided By Brown University
-
Evaluating The Conditions For Robust Mechanism Design
The authors assess the strength of the different conditions identified in the literature of robust mechanism design. They focus on three conditions: ex post incentive compatibility, robust monotonicit...
Provided By Brown University
-
Strategic Planning for Disaster Recovery With Stochastic Last Mile Distribution
This paper considers the Single Commodity Allocation Problem (SCAP) for disaster recovery, a fundamental problem faced by all populated areas. SCAPs are complex stochastic optimization problems that c...
Provided By Brown University
-
Egalitarian Equivalence Under Asymmetric Information
The authors propose a definition of egalitarian equivalence that extends Pazner and Schmeidler's (1978) concept to environments with incomplete information. If every feasible allocation rule can be im...
Provided By Brown University
-
A Generic Auto-Provisioning Framework for Cloud Databases
This paper discusses the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, this paper describes a...
Provided By Brown University
-
Safe at Any Speed: Fast, Safe Parallelism in Servers
Many applications take advantage of parallelism to increase performance. Servers are a particularly common case as they must multiplex resources across many simultaneous users. Unfortunately, writing ...
Provided By Brown University
-
Hidden Markov Support Vector Machines
This paper presents a novel discriminative learning technique for label sequences based on a combination of the two most successful learning algorithms, Support Vector Machines and Hidden Markov Model...
Provided By Brown University
-
A New Necessary Condition for Implementation in Iteratively Undominated Strategies
Implementation in iteratively undominated strategies relies on permissive conditions. However, for the sufficiency results available, authors have relied on assumptions that amount to quasilinear pref...
Provided By Brown University
-
Cryptographic Accumulators for Authenticated Hash Tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n element in a hash table that is outsourced at a remote server. Authenticating the hash t...
Provided By Brown University
-
Uncertainty Aversion And The Term Structure Of Interest Rates
This paper proposes a novel explanation for the empirical finding that yields on risk-free bonds are increasing with their maturity (the term premium). The key ingredient in the explanation is that in...
Provided By Brown University
-
Malleable Proof Systems and Applications
Malleability for cryptography is not necessarily an opportunity for attack, but in many cases a potentially useful feature that can be exploited. In this paper, the authors examine notions of malleabi...
Provided By Brown University
-
ADsafety Type-Based Verification of JavaScript Sandboxing
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing. The many entry-points o...
Provided By Brown University
-
Xheal: Localized Self-Healing Using Expanders
The authors consider the problem of self-healing in reconfigurable networks (e.g. peer-to-peer and wireless mesh networks) that are under repeated attack by an omniscient adversary and propose a fully...
Provided By Brown University
-
Compression Aware Physical Database Design
Modern RDBMSs support the ability to compress data using methods such as null suppression and dictionary encoding. Data compression offers the promise of significantly reducing storage requirements an...
Provided By Brown University
-
Cryptographic Protocol Explication and End-Point Projection
Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the communications from the perspective ...
Provided By Brown University
-
Semantics-Based Code Search
The authors' goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user's specifications. The key words here are specifications and g...
Provided By Brown University
-
Comparison Between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification
This paper describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" wit...
Provided By Brown University
-
Efficient Content Authentication in Peer-to-Peer Networks
Peer-to-Peer (p2p) networks provide the basis for the design of fully decentralized systems, where data and computing resources are shared among participating peers. Properties of p2p networks include...
Provided By Brown University
-
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Password-Authenticated Secret Sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS 2011, allow users to distribute data among several servers so that the data can be recovered using a...
Provided By Brown University
-
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic defenses from such atta...
Provided By Brown University
-
On The Security of One-Witness Blind Signature Schemes
Blind signatures have proved an essential building block for applications that protect privacy while ensuring unforgeability, i.e., electronic cash and electronic voting. One of the oldest, and most e...
Provided By Brown University
-
On Verifying the Consistency of Remote Untrusted Services
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each oth...
Provided By Brown University
-
Strategic Planning for Disaster Recovery With Stochastic Last Mile Distribution
This paper considers the Single Commodity Allocation Problem (SCAP) for disaster recovery, a fundamental problem faced by all populated areas. SCAPs are complex stochastic optimization problems that c...
Provided By Brown University
-
Safe at Any Speed: Fast, Safe Parallelism in Servers
Many applications take advantage of parallelism to increase performance. Servers are a particularly common case as they must multiplex resources across many simultaneous users. Unfortunately, writing ...
Provided By Brown University
-
Handling Uncertain Data in Array Database Systems
Scientific and intelligence applications have special data handling needs. In these settings, data does not fit the standard model of short coded records that had dominated the data management area fo...
Provided By Brown University
-
A Generic Auto-Provisioning Framework for Cloud Databases
This paper discusses the problem of resource provisioning for database management systems operating on top of an Infrastructure-As-A-Service (IaaS) cloud. To solve this problem, this paper describes a...
Provided By Brown University
-
Efficient Integrity Checking Of Untrusted Network Storage
The authors propose an architecture for verifying the integrity of untrusted outsourced storage. For the method to work, no trust is needed at either the storage server or the authentication server. T...
Provided By Brown University
-
Exergaming: Video Games As A Form Of Exercise
Video Games have always been a source of entertainment for adults and children. Over the years, people have worked at making these games more than just a form of recreation. One such effort was target...
Provided By Brown University
-
Pragmatic Perspectives On Rethinking Financial Regulation
The reevaluation and reconfiguration of financial regulation should be firmly based on four observations. First, finance is very important for human welfare and this importance extends far beyond fina...
Provided By Brown University
-
Participatory Networking: An API for Application Control of SDNs
The authors present the design, implementation, and evaluation of an API for applications to control a Software-Defined Network (SDN). Their API is implemented by an OpenFlow controller that delegates...
Provided By Brown University
-
A Comparison of Stream-Oriented High-Availability Algorithms
Recently, significant efforts have focused on developing novel data-processing systems to support a new class of applications that commonly require sophisticated and timely processing of high-volume d...
Provided By Brown University
-
Energy-Aware Microprocessor Synchronization: Transactional Memory Vs. Locks
One important way in which multiprocessors differ from uniprocessors is in the need to provide programmers the ability to synchronize concurrent access to memory. Transactional memory was proposed as ...
Provided By Brown University
-
Hidden Markov Support Vector Machines
This paper presents a novel discriminative learning technique for label sequences based on a combination of the two most successful learning algorithms, Support Vector Machines and Hidden Markov Model...
Provided By Brown University
-
Recent Trends In The Earnings Of New Immigrants To The United States
This paper studies long-term trends in the labor market performance of immigrants in the United States, using the 1960-2000 PUMS and 1994-2009 CPS. While there was a continuous decline in the earnings...
Provided By Brown University
-
Bilateral And Community Enforcement In A Networked Market With Simple Strategies
In many markets, successful execution of mutually beneficial economic transactions relies on informal contracts that are enforced by social pressure and reputation. Informal enforcement mechanisms inc...
Provided By Brown University
-
Entropy And The Value Of Information For Investors
Consider any investor who fears ruin facing any set of investments that satisfy no-arbitrage. Before investing, he can purchase information about the state of nature in the form of an information stru...
Provided By Brown University
-
Self-Organization For Collective Action: An Experimental Study Of Voting On Formal, Informal, And No Sanction Regimes
One of the most fundamental puzzles of economic life is how people can cooperate given the preeminence of self-interest. In some domains, the problem is minimized because cooperation can take the form...
Provided By Brown University
-
State Or Nature? Formal Vs. Informal Sanctioning In The Voluntary Provision Of Public Goods
The sanctioning of norm-violating behavior by an effective formal authority is an efficient solution for social dilemmas. It is in the self-interest of voters and is often favorably contrasted with le...
Provided By Brown University
-
Bargaining, Coalitions And Externalities: A Comment On Maskin
The authors first observe that two of Maskin's results do not extend beyond three players: they construct a four-player partition function with nonpositive externalities whose unique solution is ineff...
Provided By Brown University
-
Equilibrium Blocking In Large Quasilinear Economies
We study information transmission in large interim quasilinear economies using the theory of the core. We concentrate on the core with respect to equilibrium blocking, a core notion in which informati...
Provided By Brown University
-
Multiplicity Of Mixed Equilibria In Mechanisms: A Unified Approach To Exact And Approximate Implementation
The authors characterize full implementation of social choice sets in mixed-strategy Bayesian equilibrium. The results concern both exact and virtual mixed implementation. For exact implementation, th...
Provided By Brown University
-
Comparative Economic Development: Insights From Unified Growth Theory
This paper explores the implications of Unified Growth Theory for the origins of existing differences in income per capita across countries. The theory sheds light on three fundamental layers of compa...
Provided By Brown University
-
Isolation And Development
This paper exploits cross-country variation in the degree of geographical isolation, prior to the advent of sea-faring and airborne transportation technologies, to examine its impact on the course of ...
Provided By Brown University
-
Measuring Economic Growth From Outer Space
This paper focuses on measurement of real GDP growth over time within a country, which besides measuring nominal GDP requires the construction of reliable domestic price indices, again a problem for m...
Provided By Brown University
-
Pet Overpopulation: An Economic Analysis
This paper considers the problem of pet overpopulation. It develops a tractable dynamic model whose positive predictions square well with key features of the current U.S. market for pets. The model is...
Provided By Brown University
-
Axiomatic Bargaining On Economic Environments With Lotteries
Most contributions in axiomatic bargaining are phrased in the space of utilities. This comes in sharp contrast with standards in most other branches of economic theory. The present paper shows how Nas...
Provided By Brown University
-
Social Networks And Unraveling In Labor Markets
This paper studies the phenomenon of early hiring in entry-level labor markets in the presence of social networks. The authors offer a two-stage model in which workers in training institutions reveal ...
Provided By Brown University
-
Community Structure And Market Outcomes: A Repeated Games In Networks Approach
Consider a large market with asymmetric information, in which sellers choose whether to cooperate or deviate and 'Cheat' their buyers, and buyers decide whether to re-purchase from different sellers. ...
Provided By Brown University
-
The Demographic Transition: Causes And Consequences
This paper develops the theoretical foundations and the testable implications of the various mechanisms that have been proposed as possible triggers for the demographic transition. Moreover, it examin...
Provided By Brown University