1,009 research outputs found

    Bibliography for computer security, integrity, and safety

    Get PDF
    A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports

    A Celebration of West Point Authors

    Get PDF
    Today we celebrate the more than 200 works of scholarship produced at the Academy between January and June 2017. Our featured work is “Intolerance: Political Animals and Their Prey,” a book which grew from a year-long multidisciplinary collaboration between faculty members of Bard College and West Point.https://digitalcommons.usmalibrary.org/books/1014/thumbnail.jp

    Robust Algorithms Under Adversarial Injections

    Get PDF
    In this paper, we study streaming and online algorithms in the context of randomness in the input. For several problems, a random order of the input sequence - as opposed to the worst-case order - appears to be a necessary evil in order to prove satisfying guarantees. However, algorithmic techniques that work under this assumption tend to be vulnerable to even small changes in the distribution. For this reason, we propose a new adversarial injections model, in which the input is ordered randomly, but an adversary may inject misleading elements at arbitrary positions. We believe that studying algorithms under this much weaker assumption can lead to new insights and, in particular, more robust algorithms. We investigate two classical combinatorial-optimization problems in this model: Maximum matching and cardinality constrained monotone submodular function maximization. Our main technical contribution is a novel streaming algorithm for the latter that computes a 0.55-approximation. While the algorithm itself is clean and simple, an involved analysis shows that it emulates a subdivision of the input stream which can be used to greatly limit the power of the adversary
    • …
    corecore