The games we play: critical complexity improves machine learning

no code yet • 18 May 2022

To achieve this, we use theories of critical complexity to both evaluate these grand narratives and contrast them with the Open ML approach.

Computers and Society

TWEETS

Neighbourhood matching creates realistic surrogate temporal networks

antoniolonga/etngen 18 May 2022

We further show that beyond generating realistic interaction patterns, our method is able to capture intrinsic temporal periodicity of temporal networks, all with an execution time lower than competing methods by multiple orders of magnitude.

Social and Information Networks Computers and Society Data Analysis, Statistics and Probability Physics and Society

TWEETS

Security Analysis of DeFi: Vulnerabilities, Attacks and Advances

no code yet • 19 May 2022

Decentralized finance (DeFi) in Ethereum is a financial ecosystem built on the blockchain that has locked over 200 billion USD until April 2022.

Cryptography and Security

TWEETS

Human and technological infrastructures of fact-checking

no code yet • 22 May 2022

Our findings highlight that the fact-checking process is a collaborative effort among various stakeholder groups and associated technological and informational infrastructures.

Human-Computer Interaction

TWEETS

Hyperion: A Case for Unified, Self-Hosting, Zero-CPU Data-Processing Units (DPUs)

no code yet • 18 May 2022

Since the inception of computing, we have been reliant on CPU-powered architectures.

Hardware Architecture Distributed, Parallel, and Cluster Computing Operating Systems Programming Languages C.5; D.3; D.4; B.4

TWEETS

Leapfrog: Certified Equivalence for Protocol Parsers

no code yet • 18 May 2022

Proofs are powered by a certified compilation chain from first-order entailments to low-level bitvector verification conditions, which are discharged using off-the-shelf SMT solvers.

Programming Languages

TWEETS

rgpdOS: GDPR Enforcement By The Operating System

no code yet • 22 May 2022

The General Data Protection Regulation (GDPR) forces IT companies to comply with a number of principles when dealing with European citizens' personal data.

Operating Systems Cryptography and Security

TWEETS

Tower: Data Structures in Quantum Superposition

no code yet • 20 May 2022

Practically realizing such an algorithm as a program for a quantum computer requires an efficient implementation of the data structure whose operations correspond to unitary operators that manipulate quantum superpositions of data.

Programming Languages Quantum Physics

TWEETS

Wireless On-Chip Communications for Scalable In-memory Hyperdimensional Computing

no code yet • 22 May 2022

Hyperdimensional computing (HDC) is an emerging computing paradigm that represents, manipulates, and communicates data using very long random vectors (aka hypervectors).

Hardware Architecture

TWEETS

Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates

no code yet • 18 May 2022

We present an empirical study exploring how privacy influences the acceptance of vaccination certificate (VC) deployments across different realistic usage scenarios.

Computers and Society Cryptography and Security Human-Computer Interaction K.4.1

TWEETS