Files
papers-we-love_papers-we-love/nautilus.db

1893 lines
1004 KiB
Plaintext
Raw Normal View History

2017-09-05 22:05:28 -04:00
SQLite format 3@ M<00>M-<2D>
<0F>
<0E><0F><0E> r <0C> I V , +
 <00>p <01>?tablelinkslinks CREATE TABLE links
(id integer primary key,
paper_id int,
url varchar unique not null,
title varchar not null,
directory varchar not null,
status int not null,
created varchar,
modified varchar)) =indexsqlite_autoindex_links_1links <0A>| <01>Wtablefilesfiles
CREATE TABLE files
(id integer primary key,
paper_id int,
sha1 varchar unique not null,
filename varchar not null,
directory varchar not null,
normalized varchar not null,
created varchar,
modified varchar))
=indexsqlite_autoindex_files_1files <0B> !!<01>etabletagspaperstagspapers CREATE TABLE tagspapers
(id integer primary key,
tag_id integer not null,
paper_id integer not null)a<01>%tabletagstagsCREATE TABLE tags
(id integer primary key,
tag varchar unique not null)';indexsqlite_autoindex_tags_1tags<08>''<01>qtableauthorspapersauthorspapersCREATE TABLE authorspapers
(id integer primary key,
author_id integer not null,
paper_id integer not null)<29>0<01>7tableauthorsauthorsCREATE TABLE authors
(id integer primary key,
name varchar unique not null,
first_name varchar,
middle_name varchar,
last_name varchar)-Aindexsqlite_autoindex_authors_1authors<05>\<01>tablepaperspapersCREATE TABLE papers
(id integer primary key,
title varchar unique not null,
year int,
abstract varchar,
venue varchar,
directory varchar,
created varchar,
modified varchar)+?indexsqlite_autoindex_papers_1papers<00> <0C><00><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>~ytoje`[VQLGB=82,& <0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>~xrlf`ZTNHB<60*$  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> | v p j d ^ X R L F @ : 4 . ( "   
 <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C>action devices, such as mice, buttons, and keyboards. <i>Squeak</i> is a user interface implementation language that exploits this concurrency rather than hiding it, helping the programmer to express interactions using multiple devices. We present the motivation, design and semantics of <i>squeak</i>. The language is based on concurrent programming constructs but can be compiled into a conventional sequential language; our implementation generates C code. We discuss how <i>squeak</i> programs can be integrated into a graphics system written in a conventional language to implement large but regular user interfaces, and close with a description of the formal semantics.SIGGRAPH02017-09-06T01:52:38.5045039062017-09-06T01:52:38.504503906<EFBFBD>

_<02>9GGSecurity Concerns in Android mHealth Apps<07>Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data.AMIA02017-09-06T01:52:37.6891340332017-09-06T01:52:37.689134033<EFBFBD>D
}<02> GGThe PageRank Citation Ranking: Bringing Order to the Web<07>The importance of a Web page is an inherently subjective matter, which depends on the readers interests, knowledge and attitudes. But there is still much that can be said objectively about the relative importance of Web pages. This paper describes PageRank, a method for rating Web pages objectively and mechanically, eeectively measuring the human interest and attention devoted to them. We compare PageRank to an idealized random Web surfer. We show how to eeciently compute PageRank for large numbers of pages. And, we showhow to apply PageRank to search and to user navigation.02017-09-06T01:52:36.1404409182017-09-06T01:52:36.140440918<EFBFBD>} <00> <02>kGGOmega: flexible, scalable schedulers for large compute clusters<07>Increasing scale and the need for rapid response to changing requirements are hard to meet with current monolithic cluster scheduler architectures. This restricts the rate at which new features can be deployed, decreases efficiency and utilization, and will eventually limit cluster growth. We present a novel approach to address these needs using parallelism, shared state, and lock-free optimistic concurrency control.
We compare this approach to existing cluster scheduler designs, evaluate how much interference between schedulers occ<00><><00><><00><><00><><00><><00><><00><> <00><>
<00><><00><><00><><00><><00><>~<00><>|<00><>y<00><>w<00><>u<00><>t<00><>r߂nނk݂iۂgڂeقd؂bׂ`ւ]Ղ[ԂY҂VтRЂNςL͂ÎE˂CʂBɂ@Ȃ=ł;Â8‚5<00><>1<00><>-<00><>*<00><>)<00><>&<00><>#<00><><00><><00><><00><><00><><00><><00><><00><> <00><> <00><><00><><00><><00><><00><>|<00><>y<00><>u<00><>r<00><>p<00><>n<00><>i<00><>g<00><>c<00><>_<00><>Z<00><>V<00><>S<00><>O<00><>N<00><>I<00><>E<00><>C<00><>@<00><>><00><>;<00><>8<00><>5<00><>0<>-~<7E>+}<7D>(|<7C>'{<7B>#x<> w<>v<>u<>s<>r<>q<>p<>n<> l<>k<>j<>i|hyexctbq_j^h]f\c[aZ]Y[XWSSQPPMMILFICH?G=F;E8D6C3B.A*>'=#< ;:987654 3
2cc<00><0F>lc<0E><0E>f<04>_<06> < <09>G<08> N <0A>
<08><02><07><07> <0A> <0C><03><0E><00><06><08>
<EFBFBD> <0C> <0C>$_<04><0F><05> <0B> ?<08>n<00>X <0A>x(?. <0E>4<0F><04>\|
K
<EFBFBD><05> <0B> ,]Light Propagation Volumes in Cryengine 3C:yProgramming languages - application and interpretationBB<04>MillWheel: Fault-Tolerant Stream Processing at Internet ScaleACProjecting a Modular Future@J<04>QuickCheck: a lightweight tool for random testing of Haskell programs?P<04>#2Q: A Low Overhead High Performance Buffer Management Replacement Algorithm>*YCausal Diagrams for Empirical Research=W<04>1SWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocol<A<04>A program optimization for automatic database result caching;B<04>HaLoop: Efficient Iterative Data Processing on Large Clusters:I<04>HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast96qAutomatic prediction of emotions induced by movies8<}IronFleet: proving practical distributed systems correct7*YA unified theory of garbage collection6"ITheory in Programming Practice5AResilient Overlay Networks43Dynamic Hash Tables3O<04>!Breadth-first numbering: lessons from a small exercise in algorithm design2/Axodraw Version 216qThe Dynamic Window Approach to Collision Avoidance0'SObject Space Silhouette Algorithims/:yMulticore profiling for Erlang programs using percept2."INew directions in cryptography-3A history of Erlang,J<04>On computable numbers with an application to the Entscheidungsproblem+.aTraits: A mechanism for fine-grained reuse*Y<04>5Making lockless synchronization fast: performance implications of memory reclamation)?<04>Practical byzantine fault tolerance and proactive recovery(8uLightweight Locking for Main Memory Database Systems'L<04>CRUSH: controlled, scalable, decentralized placement of replicated data&O<04>!Teaching Garbage Collection without Implementing Compilers or Interpreters%F<04>Heap architectures for concurrent languages using message passing$9wImaging vector fields using line integral convolution#|<04>{Analysis of Three Bayesian Network Inference Algorithms: Variable Elimination, Likelihood Weighting, and Gibbs Sampling"#KEfficient Predicate Dispatching!!GLooking Inside the (Drop) Box +[FlashNet: flash/network stack co-designJ<04>Piranha: A scalable architecture based on single-chip multiprocessingR<04>'Parallel generational-copying garbage collection with a block-structured heap9wAsynchronous functional reactive programming for GUIs4mDecoding speech in the presence of other sourcesI<04>Experiences with QuickCheck: Testing the Hard Stuff and Staying SaneH<04>The treadmill: real-time garbage collection without motion sicknessX<04>3Towards a next generation data center architecture: scalability and commoditizationN<04>Map-reduce-merge: simplified relational data processing on large clusters9wComposable and compilable macros: : you want it when?A<04>A LISP garbage-collector for virtual-memory computer systems'SOrganizing Programs Without Classes1gVEWS: A Wikipedia Vandal Early Warning System#Soft Typingc<04>IAnd then there were none: a stall-free real-time garbage collector for reconfigurable hardware-_Message Analysis for Concurrent LanguagesCInteractive Horizon MappingE<04> Metaobject protocols: Why we want them and what else they can do3kViewstamped Replication: A General Primary Copy 4mEvaluating Generative Models for Text Generation 5Instant architecture )WQuickCheck Testing for Fun and Profit
V<04>/Everything you always wanted to know about synchronization but were afraid to ask ^<04>?Conditional Random Fields: Probabilistic Models for Segmenting ano<}Kafka: a Distributed Messaging System for Log Processing<00>K<04>Motion Planning 5.1 Motion Planning Concepts 5.1.1 Configuration Spacez<00>CProjecting a Modular Future@<00>D<04> The Chubby Lock Service for Loosely-Coupled Distributed Systemsj F<04>KJ<04>Efficient reconciliation and flow control for anti-entropy protocols<00>J@<04>Bigtable: A Distributed Storage System for Structured DataO <0F><00><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F> <0A> <0A> <0A> <0A> O  <0C> <0C> <0C> <0C> _ 0  <0B> <0B> <0B> ~ W 6 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
a
D
 <09> <09> <09> <09> S ( <08><08><08><08>g<<07><07><07><07>oC"<06><06><06><06>e@<05><05><05><05>wM* <04><04><04>nI$<03><03><03><03>eA"<02><02><02><02>xN+<01><01><01>jL(<00>#k+ Carlos MaltzahnCarlosMaltzahn"j+Ethan L. MillerEthanL.Miller"i+Scott A. BrandtScottA.Brandth%Sage A. WeilSageA.Weil,g5Robert Bruce FindlerRobertBruceFindlerf% Jay MccarthyJayMccarthy/e7 'Shriram KrishnamurthiShriramKrishnamurthid! Arjun GuhaArjunGuha&c/Gregory H. CooperGregoryH.Cooper!b) Erik JohanssonErikJohansson(a1Leith Casey LeedomLeithCaseyLeedom`% Brian CabralBrianCabral%_- Rusmin SoetjiptoRusminSoetjipto^#Rose F. LiuRoseF.Liu]# Weimin ChenWeiminChen)\1! Przemyslaw WegrzynPrzemyslawWegrzyn[% Dhiru KholiaDhiruKholia"Z+Thomas R. GrossThomasR.Gross'Y/ Kornilios KourtisKorniliosKourtis'X/ Ioannis KoltsidasIoannisKoltsidas#W+ Jonas PfefferleJonasPfefferle!V) Patrick StuediPatrickStuedi#U+ Bernard MetzlerBernardMetzler#T+ Nikolas IoannouNikolasIoannou#S+ Animesh TrivediAnimeshTrivedi.R7Simon L. Peyton JonesSimonL. PeytonJones"Q+Roshan P. JamesRoshanP.James&P/Timothy L. HarrisTimothyL.HarrisO% Simon MarlowSimonMarlowN' Stephen ChongStephenChong!M) Evan CzaplickiEvanCzaplicki(L1Daniel P. W. EllisDanielP. W.EllisK% Martin CookeMartinCookeJ%J. P. BarkerJ.P.Barker I)Henry G. BakerHenryG.Baker%H- Sudipta SenguptaSudiptaSenguptaG' Parveen PatelParveenPatel F)David A. MaltzDavidA.Maltz#E+ Parantap LahiriParantapLahiri*D3Albert G. GreenbergAlbertG.Greenberg,C5Douglas Stott ParkerDouglasStottParker#B+ Ruey-Lung HsiaoRuey-LungHsiaoA! Ali DasdanAliDasdan!@) Hung-Chih YangHung-ChihYang?' Matthew FlattMatthewFlatt*>3Jerome C. YochelsonJeromeC.Yochelson#=+ Robert FenichelRobertFenichel<# Urs HölzleUrsHölzle;' Bay-Wei ChangBay-WeiChang:# David UngarDavidUngar!9) Craig ChambersCraigChambers(81%V. S. SubrahmanianV.S.Subrahmanian)71 Francesca SpezzanoFrancescaSpezzano6% Srijan KumarSrijanKumar5! Mike FaganMikeFagan'4/ !Robert CartwrightRobertCartwright3% Sunil ShuklaSunilShukla2# Perry ChengPerryCheng 1)David F. BaconDavidF.Bacon)01 #Jesper WilhelmssonJesperWilhelmsson-/5% Konstantinos SagonasKonstantinosSagonas%.- Richard CarlssonRichardCarlsson$--Michael F. CohenMichaelF.Cohen*,3!Peter-Pike J. SloanPeter-PikeJ.Sloan!+) Michael AshleyMichaelAshley$*-Daniel G. BobrowDanielG.Bobrow)# Amin VahdatAminVahdat!() Luis RodriguezLuisRodriguez%'- J.michael AshleyJ.michaelAshley#&+ Gregor KiczalesGregorKiczales!%) Barbara LiskovBarbaraLiskov$%Brian M. OkiBrianM.Oki##+ Suvrat BhooshanSuvratBhooshan"' Raunaq RewariRaunaqRewari%!- Prasad KawthekarPrasadKawthekar% - William RibarskyWilliamRibarsky,5François X. SillionFrançoisX.Sillion!) Michael WimmerMichaelWimmer# Peter WonkaPeterWonka# John HughesJohnHughes-5 !Vasileios TrigonakisVasileiosTrigonakis%- Rachid GuerraouiRachidGuerraoui# Tudor DavidTudorDavid%- Fernando PereiraFernandoPereira#+ Andrew MccallumAndrewMccallum$-John D. LaffertyJohnD.Lafferty8A!!Henk O Ten Cate HoedemakerHenkO Ten CateHoedemaker09#Jean-Pierre E N PierieJean-PierreE NPierie' Erik HeinemanErikHeineman# Jetse GorisJetseGoris$-Maarten B JalinkMaartenBJalink Jun RaoJunRao' Neha NarkhedeNehaNarkhede Jay KrepsJayKreps  Rob PikeRobPike ' Luca CardelliLucaCardelli# + Klara NahrstedtKlaraNahrstedt
)Carl A. GunterCarlA.Gunter# + Muhammad NaveedMuhammadNaveed# Dongjing HeDongjingHe# John WilkesJohnWilkes-5 %Michael Abd-El-MalekMichaelAbd-El-Malek!) Andy KonwinskiAndyKonwinski'/ #Malte SchwarzkopfMalteSchwarzkopf&/Marshall C. PeaseMarshallC.Pea΋J<00><>a<00><>{<00><>s<00><>l<00><>k<00><>m<00><>t<>d<>0R<>E@<40>V?kb"<00><0F><0F>6N<0F>l"<0F><0F>9 <09> Q<01>X_ - z u<02><03><08><01> @{,<04>9<07><05> <0B> <0C><07>E
+
<EFBFBD> 4<05> <0B><08>`
<EFBFBD>=O<0E>v<07>
+ <0B> <0A><01> `ji
d<06> m 8<05>
S <04><0E>&-<0E> > G<0E><06><05>T <0A>p<04> N<02>x!<G<0E><02><01>% ^ "<07><08><0F> <0C>S<0E><03><0F><04>N<01><02><0F>
B<06> ,<0F> <0C><03> <0C><04> <0A>x <0B>L<06><0E> <09>
<EFBFBD>
<EFBFBD> bP1<05> $ <0A> <0C> w<08> eh w <0B><0F> V@<06><08> <09>
<EFBFBD><08><07>W <07><05>7r <09> <09><02> <0B><04>
#
w  Q1e  <09><02> j <0B> <0A><08><06> <0A><01><03>i<03>#Mark Hayden<00>/Kenneth P. Birman<00>-Brian D. Davison<00>%Xiaoguang Qi<00>#Armando Fox<00>'George Candea<00>%A. M. Turing<00>+Anton Kaplanyan<00>#Sam Whittle<00>)Paul Nordstrom<00>%Daniel Mills<00>#Sam Mcveety<00>!Reuven Lax<00>'Josh Haberman<00>)Slava Chernyak<00>)Kaya Bekiroglu<00>%Alex Balikov<00>%Tyler Akidau<00>!Bernd Kolb<00>!Jos Warmer<00>)Markus Völter<00>'Koen Claessen<00>'Dennis Shasha<00>-Theodore Johnson<00>#Judea Pearl<00>+Ashish Motivala<00>)Indranil Gupta<00>)Abhinandan Das<00>'Adam Chlipala<00>!Ziv Scully<00>-Michael D. Ernst<00>5Magdalena Balazinska<00>Bill Howe<00>Yingyi Bu<00>7Luís E. T. Rodrigues<00>7José Orlando Pereira<00>'João Leitão<00>5Emmanuel Dellandréa<00>%Yoann Baveye<00>!Brian Zill<00>3Srinath T. V. Setty<00>1Michael L. Roberts<00>#Bryan Parno<00>)Jacob R. Lorch<00>+Manos Kapritsos<00>!Jon Howell<00>-Chris Hawblitzel<00>#V. T. Rajan<00>'Jayadev Misra<00>'Robert Morris<00>/M. Frans Kaashoek<00>/Hari Balakrishnan<00>/David G. Andersen<00>+Per-Åke Larson<00>'Chris Okasaki<00>3J. A. M. Vermaseren<00>+John C. Collins<00>/Sebastian Thrunyz<00>-Wolfram Burgardy<00>#Dieter Foxy<00>#Bruce Gooch<00>%Elaine Cohen%Mark Hartner~)Ashley Hartner}/Simon J. Thompson|!Huiqing Li{/Martin E. Hellmanz-Whitfield Diffiey'Joe Armstrongx+Andrew P. Blackw!Roel Wuytsv1Nathanael Schärliu-Oscar Nierstraszt/Stéphane Ducasses1Angela Demke Brownr-Paul E. Mckenneyq)Thomas E. Hartp'Miguel Castroo+Daniel J. Abadin/Alexander Thomsonm Kun Renl+Carlos Maltzahnk+Ethan L. Millerj+Scott A. Brandti%Sage A. Weilh5Robert Bruce Findlerg%Jay Mccarthyf7Shriram Krishnamurthie!Arjun Guhad/Gregory H. Cooperc)Erik Johanssonb1Leith Casey Leedoma%Brian Cabral`-Rusmin Soetjipto_#Rose F. Liu^#Weimin Chen]1Przemyslaw Wegrzyn\%Dhiru Kholia[+Thomas R. GrossZ/Kornilios KourtisY/Ioannis KoltsidasX+Jonas PfefferleW)Patrick StuediV+Bernard MetzlerU+Nikolas IoannouT+Animesh TrivediS7Simon L. Peyton JonesR+Roshan P. JamesQ/Timothy L. HarrisP%Simon MarlowO'Stephen ChongN)Evan CzaplickiM1Daniel P. W. EllisL%Martin CookeK%J. P. BarkerJ)Henry G. BakerI-Sudipta SenguptaH'Parveen PatelG)David A. MaltzF+Parantap LahiriE3Albert G. GreenbergD5Douglas Stott ParkerC+Ruey-Lung HsiaoB!Ali DasdanA)Hung-Chih Yang@'Matthew Flatt?3Jerome C. Yochelson>+Robert Fenichel=#Urs Hölzle<'Bay-Wei Chang;#David Ungar:)Craig Chambers91V. S. Subrahmanian81Francesca Spezzano7%Srijan Kumar6!Mike Fagan5/Robert Cartwright4%Sunil Shukla3#Perry Cheng2)David F. Bacon11Jesper Wilhelmsson05Konstantinos Sagonas/-Richard Carlsson.-Michael F. Cohen-3Peter-Pike J. Sloan,)Michael Ashley+-Daniel G. Bobrow*#Amin Vahdat))Luis Rodriguez(-J.michael Ashley'+Gregor Kiczales&)Barbara Liskov%%Brian M. Oki$+Suvrat Bhooshan#'Raunaq Rewari"-Prasad Kawthekar!-William Ribarsky 5François X. Sillion)Michael Wimmer#Peter Wonka#John Hughes5Vasileios Trigonakis-Rachid Guerraoui#Tudor David-Fernando Pereira+Andrew Mccallum-John D. LaffertyAHenk O Ten Cate Hoedemaker9Jean-Pierre E N Pierie'Erik Heineman#Jetse Goris-Maarten B Jalink Jun Rao'Neha Narkhede Jay Kreps Rob Pike 'Luca Cardel<00>!Ravi Chugh<02>m)Gilles DuboscqL<00>J. Goulis<0F>
#Ra<00>/Mohana RamaratnamP<00> L. ZhangV<0F>N%Bernd Bickell<00>-Sylvain Lefebvret+Ethan L.O-David S. Wishartx<0F><00><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|tld\TLD<4,$ <0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>|tld\TLD<4,$  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> | t l d \ T L D < 4 , $    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> | t l d \ T L D < 4 , $    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> { q g ] T K A 7 - #   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
y
o
e
[
Q
G
=
4
*

 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> w m c Y O E ; 1 '   <08><08><08><08><08><08><08><08><08><08><08><08><08>}si_WMC9/&<07><07><07><07><07><07><07><07><07><07><07><07><07>~tj`VLB8.$<06><06><06><06><06><06><06><06><06><06><06><06><06>zpf\RH>4*  <05><05><05><05><05><05><05><05><05><05><05><05><05>wmd[RI?5+! <04><04><04><04><04><04><04><04><04><04><04><04><04>wmcYOE;1'
<03><03><03><03><03><03><03><03><03><03><03><03>~tj`VLB8.$<02><02><02><07>kSu<07>jRu<07>iQu<07>hPt<07>gOt<07>fNt<07>eMt<07>dLt<07>cKt<07>bJt<07>aIt<07>`Ht<07>_Gs<07>^Fs<07>]Es<07>\Ds<07>[Cs<07>ZBr<07>YAr<07>X@r<07>W?q<07>V>p<07>U=p<07>T<o<07>S;n<07>R<00>m<07>Q:l<07>P9l<07>O8k<07>N7k<07>M6k<06>Lk<07>K5k<07>J4k<07>I<00>k<07>H3j<07>G2i<07>F1i<07>E0i<07>D/i<07>C.i<07>B<00>h<07>A-h<07>@,h<07>?+h<07>><00>h<07>=*g<07><)g<07>;(g<07>:'f<07>9&f<07>8%f<07>7$e<07>6#e<07>5"e<07>4!e<07>3 e<07>2d<07>1d<07>0d<07>/c<06>.Hb<06>-Gb<06>,Fb<06>+Eb<07>*b<07>)b<07>(b<07>'b<06>&Db<07>%a<07>$a<07>#a<07>"a<07>!`<07> `<07>`<07>_<07>_<07>^<07> ^<07> ^<07> ]<07>
]<07> ]<07>]<07>]<07>]<07>]<07>]<07>\<07>\<07>[<07>[<07> <00>Z<07> <00>Z<07> <00>Z<07>
<00>Z<07> <00>Z<07><00>Z<07><00>Z<07><00>Z<07><00>Z<07><00>Y<07><00>X<07><00>W<07><00>V<07><00>V<07><00>U<07>~<00>U<07>}<00>U<07>|<00>U<07>{<00>T<07>z<00>T<07>y<00>T<07>x<00>T<07>w<00>T<07>v<00>T<07>u<00>T<07>t<00>T<07>s<00>S<07>r<00>R<07>q<00>R<07>p<00>R<07>o<00>Q<07>n<00>Q<07>m<00>Q<07>l<00>P<07>k<00>P<06>j0O<06>i/O<07>h<00>N<07>g<00>N<07>f<00>N<07>e<00>N<06>dPN<07>c<00>N<07>b<00>N<07>a<00>N<07>`<00>N<05>_ M<07>^<00>L<07>]<00>L<07>\<00>L<07>[<00>L<07>Z<00>K<07>Y<00>K<07>X<00>K<07>W<00>K<07>V<00>J<07>U<00>I<07>T<00>I<07>S<00>I<07>R<00>I<07>Q<00>I<07>P<00>I<07>O<00>I<07>N<00>I<07>M<00>I<07>L<00>I<07>K<00>I<07>J<00>H<07>I<00>G<07>H<00>G<07>G<00>G<07>F<00>G<07>E<00>G<07>D<00>G<07>C<00>F<07>B<00>F<07>A<00>E<07>@<00>E<07>?<00>D<07>><00>C<06>=eB<07><<00>A<07>;<00>A<07>:<00>A<07>9<00>A<07>8<00>A<07>7<00>A<07>6<00>A<07>5<00>A<07>4<00>A<07>3<00>A<07>2<00>@<07>1<00>@<07>0<00>@<06>/?<07>.<00>?<07>-<00>><07>,<00>><07>+<00>=<07>*<00><<07>)<00><<07>(<00><<07>'<00>;<07>&<00>;<07>%<00>:<07>$<00>:<07>#<00>:<07>"<00>:<07>!<00>9<07> <00>9<07><00>9<07><00>8<07><00>8<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>6<06>26<06>16<07><00>5<07><00>4<07><00>4<07><00>4<07> <00>4<07> <00>3<07> <00>2<07>
<00>1<07> <00>1<07><00>0<07><00>0<07><00>0<07><00>/<06>/<06>~/<06>}/<06>|.<06>{.z-~y-}x,|w*{v*zu*yt*xs*wr)vq)up)t%(so(rn'qm'pl'ok&nj&mi&lh&kg%jf%ie%hd%gc%f0$e/$db$ca#b`#a_"`^"_]!^9!]\ \[ [ZZYYXXWWVVUUTTSSRRQQPPOONNMMLLKKJJIIHHGGFFEEDDCCBBAA@@??>>==<<;;::99887766554433221100//..--,,++**))((''&&%% $$ ## "" !!      
         

  <00><>X<00><><00><>cg<>(f<>k<0F><00><0F><0F><0F><0F><0F><0F>{rYO<4( <0E><0E><0E><0E><0E><0E><0E><0E><0E>}WH*"  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> l U A )    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> x h Z J 4   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> x l V K C : 2 *   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
y
q
b
Q
3
#

<09> <09> <09> <09> <09> <09> <09> <09> } u d W O G 7 + !  <08><08><08><08><08><08><08>viTB8/"
<07><07><07><07><07><07><07><07>yjJ>)<06><06><06><06><06><06><06><06><06><06>|s\RH?5,#<05><05><05><05><05><05><05><05><05>hQG-$<04><04><04><04><04><04>~aWI;'<03><03><03><03><03><03><03><03>zqgR<(<02><02><02><02><02><02><02><02>~s^LC+<12>u+graphical model<0F>t%factor graph<15>s1belief propagation<06>rrbf<0F>q%maximization<12>p+kernel function<08>olkopf<08>nvoxel<07>mfull<15>l1paravirtualization <09>kdenali<06>jlso<06>ixen<06>hbft<11>g)paxos protocol<1B>f=fault-tolerant consensus<0F>e%asynchronous<06>dibm<06>ctdd<11>b)defect density<13>a-development team<12>`+code inspection<07>_dhmm<06>^isa<14>]/scaling procedure<06>\alg<07>[tsdf <0C>Zdepth map<14>Y/3d reconstruction<19>X9kinectfusion algorithm<06>Wgpu<07>Vslab <0C>Uallocator<10>T'kernel memory <09>Sbuffer<11>R)complex object <0B>Qscalable <0B>Pepidemic<07>Oties<1A>N;document classification <0C>Mhypertext<1A>L;web page classification<16>K3text classification <0B>Jrelevant <09>Ireboot <0C>Hexpensive<15>G1persistent storage <09>Fuptime<08>Ejudge<06>Dbot<06>Clos<17>B5machine intelligence<07>Acent<14>@/stream processing<14>?/programming model <0C>>millwheel <0C>=streaming<12><+fault tolerance <09>;editor <09>:mbeddr<06>9ast<06>8pes<11>7)random testing<08>6ation<06>5enc <0A>4!quickcheck <0C>3generator<06>2lfu<06>1lir<07>0lrfu<06>/arc<07>.ping<07>-swim<14>,/failure detection<06>+int<07>*effi<08>)rithm
<EFBFBD>(computa <0A>'!membership <09>&gossip<06>%tcp<0F>$%partial view <09>#random <0B>"liveness <0C>!ironfleet<06> bug<07>dual<15>1reference counting<12>+reference count <09>detour<1D>Aresilient overlay networks <0C>multicast<06>qos <09>ticast<14>/number of records<0E>#binary tree<11>)linear hashing <0A>!hash table <09>bucket<16>3collision avoidance<08>local<15>1obstacle avoidance
<EFBFBD>mission<06>dwa<07> void<0F> %mobile robot<12> +motion dynamics
<EFBFBD>
command
<EFBFBD> elocity<06>cep<07>blem<1F>Ediffie-hellman key agreement<06>dlp <0A>!public-key <0B>knapsack<1F>Easynchronous message passing <09>erlang<07>statplaid~mixin
}sch rli|#reclamation{ebrzrcu ydeadlockx%bft protocolwsmrv)fault-tolerantu?state machine replicationtvlls-database systemsrrushqcrushp1consistent hashingoosd nmetadata mdebugging lpreterk#interpreterj?line integral convolutioni%vector field h!streamlinegeldfodteapid#source-codec/generic technique
bdropboxa/security analysis`#block layer_cpu^ghc
]garbage \flavor[rpcZfrpYguiXasyncWpreVasrUenceTcon StationR/garbage collector
QpointerPlem OtreadmillN)load balancingMdcnL#data centerK5network architecture
JmonsoonImerge H!map-reduceGdryadFmod EmapreduceD=prototype-based languageC/natural extensionB#inheritance Adata type@#class-based?3vandalism detection>'early warning=edit <vandal ;checking:check 9static8#soft typing 7run-time6heap5fpga4mmu 3collector
2mutator13memory architecture0+message passing/1garbage collection./allocation scheme-lisp,mop+ant*clo);viewstamped replication(paxos'crash
&primary %!leadership
$grammar#split"mar !street facademcs?synchronization primitive !contention$Operformance and energy efficiencylock !sequence xsgd labels t#local model)vertices of g. messaging/messaging systems analytic linkedin log data#concurrency
mhealthapp )sensitive data hipaa 5security and privacy
yarn
schedul'cluster state schedulermeso3byzantine agreementreplilie/byzLjz<00><>y<>GW<>^V<>u<0F>}<00><0F><0F>}<0F><0F>5@ 3<05> !<08><05>,<02> e<07><08>
<EFBFBD><07><06><0F><0F>H<08> <0C> <0C> i <0A><0F>S <07>j(<06> D <09>I
<EFBFBD> <0A> <09> <0B> [ <09> <0B> X
)<02><03>?=h<08><08>b
<EFBFBD> <0B>0 <0C> H <0C><05>}
rw<05> ;J <04>]<05> ~<02>
<EFBFBD> <0C> <02>
<EFBFBD> V W
<EFBFBD>
<EFBFBD><06><03> <0A> <07> <0C>P Kt
$<06>r_ <03><08><0E> <0A> y$<0F>
4<07><0E>- <0A><06>t <0B><0E>~ %6<02>. <0B>
M<05>#<06> * <0B><0F> B<0E><0E> <09>)<05># " C  <0B> <0A>Uk  5 <0B><07>
z <09><02><06> <0A><02>X<04><05>I  m +
 <0A>i <08>z<06><05>D P<04> 8*<04><0F>K<06> <0C> <09><{ ,|<0F>
<EFBFBD>Z=<0E><0E><03> v <0C>
<EFBFBD> <0A>  <09> <0C>R<05>
c S+<0F> L<06> <04><07>X <0B><03> <0C> y
R<0E> <0A> <09>9<04><02>s+graphical model<00>%factor graph<00>1belief propagation<00>rbf<00>%maximization<00>+kernel function<00>
lkopf<00>
voxel<00> full<00>1paravirtualization<00> denali<00>lso<00>xen<00>bft<00>)paxos protocol<00>=fault-tolerant consensus<00>%asynchronous<00>ibm<00>tdd<00>)defect density<00>-development team<00>+code inspection<00> dhmm<00>isa<00>/scaling procedure<00>alg<00> tsdf<00>depth map<00>/3d reconstruction<00>9kinectfusion algorithm<00>gpu<00> slab<00>allocator<00>'kernel memory<00> buffer<00>)complex object<00> scalable<00> epidemic<00> ties<00>;document classification<00>hypertext<00>;web page classification<00>3text classification<00> relevant<00> reboot<00>expensive<00>1persistent storage<00> uptime<00>
judge<00>bot<00>los<00>5machine intelligence<00> cent<00>/stream processing<00>/programming model<00>millwheel<00>streaming<00>+fault tolerance<00> editor<00> mbeddr<00>ast<00>pes<00>)random testing<00>
ation<00>enc<00>!quickcheck<00>generator<00>lfu<00>lir<00> lrfu<00>arc<00> ping<00> swim<00>/failure detection<00>int<00> effi<00>
rithm<00> computa<00>!membership<00> gossip<00>tcp<00>%partial view<00> random<00> liveness<00>ironfleet<00>bug<00> dual<00>1reference counting<00>+reference count<00> detour<00>Aresilient overlay networks<00>multicast<00>qos<00> ticast<00>/number of records<00>#binary tree<00>)linear hashing<00>!hash table<00> bucket<00>3collision avoidance<00>
local<00>1obstacle avoidance<00> mission<00>dwa<00> void<00>%mobile robot<00>+motion dynamics<00> command<00> elocity<00>cep<00> blem<00>!Ediffie-hellman key agreement<00>dlp<00>!public-key<00> knapsack<00>!Easynchronous message passing<00> erlang<00> stat<00> plaid mixin~ sch rli}#reclamation|ebr{rcuz deadlocky%bft protocolxsmrw)fault-tolerantv?state machine replicationuvllt-database systemssrushr crushq1consistent hashingposdo metadatan debuggingm
preterl#interpreterk?line integral convolutionj%vector fieldi!streamlineheldgodtfapie#source-coded/generic techniquec dropboxb/security analysisa#block layer`cpu_ghc^ garbage]
flavor\rpc[frpZguiY asyncXpreWasrVenceUconT
tationS/garbage collectorR pointerQlemP treadmillO)load balancingNdcnM#data centerL5network architectureK monsoonJ mergeI!map-reduceH dryadGmodF mapreduceE=prototype-based languageD/natural extensionC#inheritanceB data typeA#class-based@3vandalism detection?'early warning>edit=
vandal< checking; check:
static9#soft typing8 run-time7heap6fpga5mmu4 collector3 mutator23memory architecture1+message passing01garbage collection//allocation scheme.lisp-mop,ant+clo*;viewstamped replication) paxos( crash' primary&!leadership% grammar$ split#mar"
street!
facade mcs?synchronization primitive!contention%Operformance and energy efficiencylock!sequence xsgd labels t#local model)vertices of g. messaging/messaging systems analytic linkedin log data#concurrency mhealthapp)sensitive data hipaa 5security and privacy yarn
z7logic and computationi<00>+number of steps<01><0F>Tcop<03><00>)sensitive data 7hU%gamification3<0F><00><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>~vnf^VNF>6.&<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>~vnf^VNF>6.& <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> ~ v n f ^ V N F > 6 . &     <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> ~ v n f ^ V N F > 6 . &     <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> z p f \ R H > 5 + !  
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
m
c
Z
Q
G
=
3
)


 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> v l b X N D : 0 &   <08><08><08><08><08><08><08><08><08><08><08><08><08>~tj`VLB8.$<07><07><07><07><07><07><07><07><07><07><07><07><07>{qg]SI?5+!<06><06><06><06><06><06><06><06><06><06><06><06><06>{qh^TJ@6-#<05><05><05><05><05><05><05><05><05><05><05><05><05>{qg]SI?5+! <04><04><04><04><04><04><04><04><04><04><04><04><04>xndZPG=3) <03><03><03><03><03><03><03><03><03><03><03><03>ukaWMC9/%<02><02><02><07>lAj<06>k(j<06>jwj<07>i<00>j<07>h@i<07>g?i<07>f>i<07>e=i<07>d<i<07>c;h<07>b:h<07>a9h<07>`8h<07>_<00>h<07>^7g<07>]6g<07>\5g<07>[4g<07>Z3g<07>Y2f<07>X1f<07>W0f<07>V/f<07>U.f<07>T-e<07>S,e<07>R+e<07>Q*e<07>P)e<07>O(d<07>N'd<07>M&d<07>L<00>d<07>K<00>d<07>J%c<06>IMb<07>H$b<07>G#b<07>F"b<07>E!b<07>D a<07>C<00>a<07>Ba<07>Aa<07>@a<07>?_<07>>_<07>=_<06><e_<07>;_<07>:^<07>9^<07>8^<07>7^<07>6^<07>5]<07>4]<07>3]<07>2]<07>1]<07>0[<07>/ [<07>. [<07>- [<07>,
[<07>+ [<07>*[<06>)[<06>([<07>'Z<07>&<00>Z<07>%<00>Z<07>$Z<07>#Z<07>"X<07>!X<07> X<07>X<07>X<07><00>V<07><00>V<07><00>V<07><00>V<07><00>V<06>(U<07><00>U<07><00>U<07><00>U<07><00>U<07><00>S<06>0S<07><00>S<07><00>S<07><00>S<07><00>P<07> <00>P<07> <00>P<07> <00>P<07>
<00>P<06> 2O<06>3O<06>/O<07><00>N<07><00>N<07><00>N<07><00>N<07><00>N<06>'M<07><00>M<07><00>M<07>~<00>M<07>}<00>M<07>|<00>K<07>{<00>K<07>z<00>K<07>y<00>K<07>x<00>K<07>w<00>J<06>vVJ<07>u<00>J<07>t<00>J<07>s<00>J<07>r<00>I<07>q<00>I<07>p<00>I<07>o<00>I<07>n<00>I<07>m<00>H<07>l<00>H<07>k<00>H<07>j<00>H<07>i<00>H<07>h<00>G<07>g<00>G<07>f<00>G<07>e<00>G<07>d<00>G<07>c<00>F<07>b<00>F<07>a<00>F<07>`<00>F<07>_<00>F<07>^<00>E<07>]<00>E<06>\'E<07>[<00>E<07>Z<00>E<07>Y<00>D<07>X<00>D<07>W<00>D<07>V<00>D<07>U<00>D<06>TkB<07>S<00>A<07>R<00>A<07>Q<00>A<07>P<00>A<07>O<00>A<07>N<00>@<07>M<00>@<07>L<00>@<07>K<00>@<07>J<00>?<07>I<00>?<07>H<00>?<07>G<00>?<07>F<00>?<07>E<00>><07>D<00>><07>C<00>><07>B<00>><07>A<00><<07>@<00><<07>?<00><<07>><00><<07>=<00><<07><<00>:<07>;<00>:<07>:<00>:<07>9<00>:<06>8P:<07>7<00>9<07>6<00>9<07>5<00>9<07>4<00>9<07>3<00>9<07>2<00>7<07>1<00>7<07>0<00>7<07>/<00>6<07>.<00>6<06>-/6<06>,36<07>+<00>6<07>*<00>4<07>)<00>4<07>(<00>4<07>'<00>4<07>&<00>4<07>%<00>3<07>$<00>3<07>#<00>3<07>"<00>3<07>!<00>3<07> <00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<06>.<07><00>.<07><00>.<07><00>-<07><00>-<07><00>-<07><00>-<07><00>-<07><00>,<07> <00>,<07> <00>*<06> *<06>
B*<06> ~*<06>}*<06>|)<06>{)<06>z)<06>)<06>y)<06>((<06>x(<06>w(v(~u(}'|t'{'zs'y'xr&wq&vp&uo&tn&sm%rl%q/%p3%ok%n$m0$lj#ki#jh#ig#hf#ge fd ec db ca b`a_`^_]^\][\Z[YZXYWXVWUVTUSTRSQR/QPPOONNMMLLKKJJIIHHGGFFEEDDCCBBAA@@??>>==<<;;::99887766554433221100//..--,,++**)) (( '' && %% $$ ## "" !!              

   <00><>%<00><>ia<>-`<60>l <0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><00><00> ]<5D>+1<>#GG78c295cfd7469cd3d494a48df7bd7748139e0660digital_video_stabilization_and_rolling_shutter_correction_using_gyroscopes.pdfcomputer_graphics/digital video stabilization and rolling shutter correction using gyroscopes2017-09-06T01:52:29.2103068852017-09-06T01:52:29.210306885<EFBFBD> ]<5D>#3<>GG30fae8663ffba4f4abca068a9bc8735a590a9bc5A framework for automated generation of questions across formal domains.pdfcomputer_education/a framework for automated generation of questions across formal domains2017-09-06T01:52:29.1541999512017-09-06T01:52:29.154199951<EFBFBD> ]<5D>?<3F>GGce8411564f95396b503868217469e2aaf1b996c9mexica-a-computer-model-of-a-cognitive-account-of-creativing-writing.pdfcomputational_creativity/mexica a computer model of a cognitive account of creativing writing2017-09-06T01:52:29.1267189942017-09-06T01:52:29.126718994<EFBFBD>
]<5D>Q{GG83cf2b3372ef98f7fa5caf94aa44e7262ee47519story-of-squeak-a-practical-smalltalk-written-in-itself.pdfcomp_sci_fundamentals_and_history/story of squeak a practical smalltalk written in itself2017-09-06T01:52:29.1192629392017-09-06T01:52:29.119262939<EFBFBD>7 ]<5D>9Q<39>1GG7edaa9cc255ba8e0938cb563110b204a4f393d60recursive-functions-of-symbolic-expressions-and-their-computation-by-machine-parti.pdfcomp_sci_fundamentals_and_history/recursive functions of symbolic expressions and their computation by machine parti2017-09-06T01:52:29.1161120612017-09-06T01:52:29.116112061<EFBFBD>Q ]UQMGG1c1ff93040a96dfe9f1309bfe34a989d5f93bb4fhints-for-computer-system-design.pdfcomp_sci_fundamentals_and_history/hints for computer system design2017-09-06T01:52:29.1132980962017-09-06T01:52:29.113298096<EFBFBD>
]<5D> Q<>GGfb2db075fa0230289a4f05caf2127b95fcc9aa9cearly-lisp-history-1956-1959-herbert-stoyan-html-rendering.pdfcomp_sci_fundamentals_and_history/early lisp history 1956 1959 herbert stoyan html rendering2017-09-06T01:52:29.0392648932017-09-06T01:52:29.039264893<EFBFBD>W ]]QUEE4712e0a50083a6bda848bf4a65fe214f0f6a7069axiomatic-basis-computer-programming.pdfcomp_sci_fundamentals_and_history/axiomatic basis computer programming2017-09-06T01:52:28.922617922017-09-06T01:52:28.92261792<EFBFBD>q ]<5D> <1D>GG6e39523a0acd9855ff465598253c323f7dfd3cdaa-program-optimization-for-automatic-database-result-caching.pdfcaching/a program optimization for automatic database result caching2017-09-06T01:52:28.7966411132017-09-06T01:52:28.796641113<EFBFBD> ]<5D><1D>GG6718cc5cd4e1484990ee79a8c3cffaad6d7271c3a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdfcaching/a constant algorithm for implementing the lfu cache eviction scheme2017-09-06T01:52:28.6480371092017-09-06T01:52:28.648037109<EFBFBD>  ]<5D>)<1D>!GGd62de5f995164fff50f5ce61c0113f6bc9f042252q-a-low-overhead-high-performance-buffer-management-replacement-algorithm.pdfcaching/2q a low overhead high performance buffer management replacement algorithm2017-09-06T01:52:28.5605510252017-09-06T01:52:28.560551025<EFBFBD>8 ]O+GGGe76af50e96b12fc507e73b025fe9da4a99600af9shazam-audio-search-algorithm.pdfaudio_comp_sci/shazam audio search algorithm2017-09-06T01:52:28.4378378912017-09-06T01:52:28.437837891<EFBFBD>h ]+wGG3a05eea36ffdbcf0625d5154a6458e75ca835971an-ethnographic-and-technological-study-of-breakbeats.pdfaudio_comp_sci/an ethnographic and technological study of breakbeats2017-09-06T01:52:27.8624121092017-09-06T01:52:27.862412109<EFBFBD> ]<5D>=<3D>GG02cc6a5944d57d2353a55639c7b77336b94f29b6efficient-selectivity-and-backup-operators-in-monte-carlo-tree-search.pdfartificial_intelligence/efficient selectivity and backup operators in monte carlo tree search2017-09-06T01:52:27.8398139652017-09-06T01:52:27.839813965<EFBFBD>Q ]a=YEEac14e6bf50d1491043baf1d854727a68f5f3f51d3-bayesian-network-inference-algorithm.pdfartificial_intelligence/3 bayesian network inference algorithm2017-09-06T01:52:27.808997072017-09-06T01:52:27.80899707<EFBFBD> ])#!GGbd9e0c2f5aaf68d784862ab361cc1a41fc9b32cdapi-design.pdfapi_design=<19>%_Ɓ/<18><17>w<00>gR<00>E2"<0F><0F><0F> <0C> <0C>r <0B>YVd= <0B><02>
<06><03> <09> ^<02>g<08>M7<01><00><07>l: <0B> <09><05> o <07>
<EFBFBD>K<06> <0E><0E><00>u<05> 1<03> <0A> <0A> &) <09>E <02><03><01>
<EFBFBD> P<0F><08><0F>x }
a <0A><0E>H<05>
<EFBFBD><07>
4<08><06>j S<01> B<04>?<04> #,]763d0321ced31b774bd4ba2f9f369c087cbd278eW,]43c7b3780b5864f99d042392d83ab331f7fddf2aV,]4bf4acf54bfd2e65b1ed31fe272670a7e276c534U,]1a0ba12427c68642a4871677b9de7a337356b9f6T,]f16c6ce0c7eabd4f5896962335879b3932138e52S,]a2e4dc4b1cce765255e4d15084811da125c564c5R,]3e375c8d996b8c46c83b9d3f72732d7477e5fd86Q,]f3050b5586ddfec5da0d719338a6afa8b166985bP,]c20baa16cb57ff4979569871d15294fa720bbc23O,]57efc2b9ba2a725af1d66cc43c472d0314190051N,]bde7543a8b3ce071342dfaea2a14357431d94b82M,]1e86909765bd5603a152bbd55e511e0586f1b77fL,]36222f8eb2ccf21ca345e15186cea64506581543K,]9aa8f3d1df6ff6d266a531432fe9ea0bb56ad3c3J,]00e3756119a91432622f6982b59ecd24a1340fbeI,]1551d42b24a5b1e1ead5f0793e807869249ab93eH,]7d7de228c501ef486534cca1829378eef8ef1081G,]28142adcd8a406110c76dbb8e324dc211f3944d1F,]9d2c1271f1219522d13f150c2b04123bef300dd9E,]50158bc1a8a67295ab7bce0550886a9859000dc2D,]49ed15db181c74c7067ec01800fb5392411c868cC,]368427e6e351d1ac0ef97e824968ed15d0dc3d4dB,]f52e7afce70597024c3be7df105185dd59a2c8e6A,]fd443b2ce70c48202ba26cbc6caa471ae262e270@,]003d5a65de0ac72daaf105ded903cb3eb88585b3?,]11ff11e3aedaa41a67bea3623e5d2a805db6166e>,]d65e79756ac6817d4780286045a35d34aaaaf836=,]76c0579c23504531220601029d455dca6413b628<,]4e63eed9e709b6c8e20a4a68300883898c7d8f37;,]daf38d927e2b21c885efdb4b2cc46a2d9f47d679:,]76eea8436996c7e9c8f7ad3dac34a12865edab249,]892b955b6fb175c92f3f294ab431f97a8827748d8,]17007f5e69efcfeff03853a33121943e2b4df4227,]24cece61e2128780072bc58f90b8ba47f624bc276,]f06554b06ac49f129086c8889690faaa761398bb5,]59b3e2060ef7108c9170975219aae410f52ba0b84,]208aee805004d575035284b1c232209e9fa26b0e3,]3b2c76827fb4ad1b2da0d0870441e77a27ee37de2,]177f9ad15ae9420c5c22f20da9a7c8e8dad4f32d1,]451da9c5558de4c75f01582292063a7c980292080,]e51582689653f238029d984cd1780c93ef672771/,]50c42217e3c5b52eb1732f4193bf452dcc0de71b.,]0db38d32069f3341d34c35085dc009a85ba13c13-,]8de2fdb04edce612738eb51e14ecc426381f8ed8,,]0f278cf94ac0d7fe15a7c4e0f283446e9fc07474+,]eecf3aaa6aadf48778bb1daa6b09d011632b9f55*,]b8645fcfdf5af5759dc20ae769b96be510bdff1a),]39ac2e0fc4ec63753306f99e71e0f38133e58ead(,]87fbf4fa017a90b5ff819bcfca17fb52d6f6a790',]f1948a2d5dc8745f725e3ba0b24e14847778cb19&,]4cb33680dda1fa1f0bad1ca52e07a8a34a500104%,]8b1d8d46836a6d5eb4355315b64d85c128cbff27$,]29f3f5918946bf0a4d75bf5244f993847d03e26c#,]07d847f310d5fa9138f461f0a25c5e0024f1c4af",]e95ecb39639ce118c7ddd5bd7892378eacdd105f!,]cb4710f77feed90ae01b332c492853a5b20e2c7d ,]a2e89c6111f3e306c56472306795af290ffb29af,]57d70e73a995be26f01ae51f321fdaf42a089bf8,]e2e60f19214efaa7d842b4a3b3b322964bf78dc7,]973f17392cb7b417271e9d482d17a44a8c70c70a,]f5222809526d8a419a1752547880ba0a9013a8ca,]4fc240d0d9e690cb9b0bcb2f8a5e5ca918b01410,]1cdc911f5a1b7a770b2e27bf4ebfae04c003a616,]11825521850926501e3f353ffb7cf14b0c389320,]4b1ed99c65d500d4a610813736169851cb496810,]fe0ae75e97abe2686e6bc8cbe94bfd08934e36da,]a9d9352d43986d4a5a3554a84b99580225ec00cf,]c5cf25551312490d3f3f3a6b62c5c3492b63f1f1,]0ec3651f70a50c371a1f9502fc7d3eab272d5cff,]0f007df1707d77a72237248b0d7fd93b37fc9db7,]6125b966172dd6cde3563f2ae10d8f782d14e1de,]78c295cfd7469cd3d494a48df7bd7748139e0660,]30fae8663ffba4f4abca068a9bc8735a590a9bc5,]ce8411564f95396b503868217469e2aaf1b996c9,]83cf2b3372ef98f7fa5caf94aa44e7262ee47519 ,]7edaa9cc255ba8e0938cb563110b204a4f393d60 ,]1c1ff93040a96dfe9f1309bfe34a989d5f93bb4f ,]fb2db075fa0230289a4f05caf2127b95fcc9aa9c
,]4712e0a50083a6bda848bf4a65fe214f0f6a7069 ,]6e39523a0acd9855ff465598253c323f7dfd3cda,]6718cc5cd4e1484990ee79a8c3cffaad6d7271c3,]d62de5f995164fff50f5ce61c0113f6bc9f04225,]e76af50e96b12fc507e73b025fe9da4a99600af9,]3a05eea36ffdbcf0625d5154a6458e75ca835971,]02cc6a5944d57d2353a55639c7b77336,]c5cf25551312490d3f3f3a6b62c5c3492b63f1f1,]5b0ccfcd8135c9599f8088443ed7de1874fa1c97k<0F>/<0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><01>0<>S <00><17>'GGhttp://www.cs.duke.edu/courses/cps296.4/spring04/papers/Adleman94.pdfMolecular Computation of Solutions to Combinatorial Problemsbiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934y M'GGhttp://en.wikipedia.org/wiki/Pcrwikipediabiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934<EFBFBD> a''GGhttp://www.youtube.com/watch?v=2KoLnIwoZKUa short videobiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934<EFBFBD>E
a<>+GGhttps://github.com/ibab/tensorflow-wavenet[Python] Implementation with the TensorFlow Machine Intelligence libraryaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>6
W<> +GGhttps://github.com/basveeling/wavenet[Python] Implementation with the Keras Neural Networks libraryaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>5
<00>W+GGhttps://deepmind.com/blog/wavenet-generative-model-raw-audio/Announcement and interactive examplesaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD> U_+GGhttps://arxiv.org/pdf/1609.03499.pdfWaveNet: A Generative Model for Raw Audioaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>: e[UGGhttp://ftp.cs.ucla.edu/pub/stat_ser/r360.pdfThe algorithmization of counterfactualsartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>= mYUGGhttp://ftp.cs.ucla.edu/pub/stat_ser/R218-B-L.pdfCausal diagrams for empirical researchartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>9 uIUGGhttp://ftp.cs.ucla.edu/pub/stat_ser/r156-reprint.pdfA theory of inferred causationartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>[
c<>UGGhttp://ftp.cs.ucla.edu/pub/stat_ser/r30.pdfReverend Bayes on inference engines: A distributed hierarchical approachartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>i <00>!<21>=GGhttp://airesearch.com/wp-content/uploads/2016/01/deepmind-mastering-go.pdfMastering the Game of Go with Deep Neural Networks and Tree Searchartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>  W#=GGhttp://bayes.cs.ucla.edu/jp_home.htmlJudea Pearlartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>5 yU=GGhttp://www.csee.umbc.edu/courses/471/papers/turing.pdfComputing Machinery and Intelligenceartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>S <00> <0B>{=GGhttps://github.com/papers-we-love/papers-we-love/blob/master/artificial_intelligence/3-bayesian-network-inference-algorithm.pdfAnalysis of Three Bayesian Network Inference Algorithms: Variable Elimination, Likelihood Weighting, and Gibbs Samplingartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD> <00>'<27>Q#GGhttps://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdfArchitectural Styles and the Design of Network-based Software Architectures (REST) by Roy Fieldingapi_design/2017-09-06T01:52:31.5847519532017-09-06T01:52:31.584751953<EFBFBD>f
g<>gGGhttp://www.bodden.de/pubs/far+14flowdroid.pdfFlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Appsandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062<EFBFBD>{
u<>GGhttp://www.cse.psu.edu/~duo114/pubs/octeau-sec13.pdfEffective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysisandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062<EFBFBD>?
<00> uGGhttps://www.eecs.berkeley.edu/~daw/papers/intents-mobisys11.pdfAnalyzing Inter-Application Communication in Androidandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062<EFBFBD>M
<00>+qGGhttp://blog.sei.cmu.edu/post.cfm/secure-coding-tools-analyzing-android-apps-118Two Secure Coding Tools for Analy2.<2E>-<2D>~,<2C>k*<2A>X)<29>D'<27>0&<26>1<>
%z#i"W!D!<0E> <0A>+<0F>: <0A>y <0C>  > <0C> @<06>t<06><06><05><01><04>0Mg<0E>] ;<04><05>`2. <0A><00>
<EFBFBD>b<02><08> <09> <0B> v<03> 3 <0B><03>#

<EFBFBD>( g<0E><07>`d<04>Khttp://www.disneyresearch.com/project/coupled-3d-reconstruction-of-sparse-facial-hair-and-skin/9=http://shapegrammar.org/83khttp://shapegrammar.org/ifip/SGBestPapers72.pdf7=http://cs.brown.edu/courses/csci2370/2000/1999/cabral.pdf6F<04>http://peterwonka.net/Publications/pdfs/2014.SG.Lipp.PushPull.pdf5[<04>9http://www.peterwonka.net/Publications/pdfs/2003.SG.Wonka.InstantArchitecture.high.pdf4h<04>Shttp://www.peterwonka.net/Publications/pdfs/2006.SG.Mueller.ProceduralModelingOfBuildings.final.pdf3Q<04>%http://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdf2?<04>http://research.microsoft.com/en-us/um/people/cohen/bs.pdf1A<04>http://www.crytek.com/download/Light_Propagation_Volumes.pdf09whttps://github.com/luanfujun/deep-photo-styletransfer/(Uhttps://arxiv.org/pdf/1703.07511.pdf./chttps://www.youtube.com/watch?v=Oie1ZXWceqM-X<04>3http://www.cs.tau.ac.il/~dcor/articles/2013/3-Sweep-Extracting-Editable-Objects.pdf,I<04>http://research.microsoft.com/pubs/155416/kinectfusion-uist-comp.pdf+@<04>http://www.cs.jhu.edu/~misha/Code/PoissonRecon/Version5.71/*I<04>http://research.microsoft.com/en-us/um/people/hoppe/poissonrecon.pdf)S<04>)http://www.cs.rpi.edu/~cutler/classes/advancedgraphics/S08/lectures/kajiya.pdf(G<04>http://www.cs.northwestern.edu/~ago820/cs395/Papers/Phong_1975.pdf'c<04>Ihttp://page.mi.fu-berlin.de/block/htw-lehre/wise2015_2016/bel_und_rend/skripte/gouraud1971.pdf&/chttps://www.youtube.com/watch?v=HScYuRhgEJw%Ahttp://gigavoxels.imag.fr/$6qhttp://maverick.inria.fr/Publications/2009/CNLE09/#A<04>http://maverick.inria.fr/Publications/2009/CNLE09/CNLE09.pdf"K<04>https://www.cs.drexel.edu/~david/Classes/CS586/Papers/p343-whitted.pdf!H<04>http://graphics.stanford.edu/papers/stabilization/karpenko_gyro.pdf .ahttp://barroso.org/publications/isca00.pdfz<04>whttps://www.researchgate.net/publication/220080099_MEXICA_A_computer_model_of_a_cognitive_account_of_creative_writingi<04>Uhttp://www.ams.org/journals/tran/1965-117-00/S0002-9947-1965-0170805-7/S0002-9947-1965-0170805-7.pdf0ehttp://www.turingarchive.org/browse.php/B/12=https://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf\<04>;http://gatekeeper.dec.com/ftp/pub/dec/SRC/publications/broder/positano-final-wpnums.pdfF<04>http://adam.chlipala.net/papers/SqlcachePOPL17/SqlcachePOPL17.pdf*Yhttp://www.vldb.org/conf/1994/P439.PDF<18><04>%https://github.com/papers-we-love/papers-we-love/blob/master/caching/a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdfS<04>)https://homes.cs.washington.edu/~luisceze/publications/dnastorage-asplos16.pdfD<04> http://www.dna.caltech.edu/courses/cs191/paperscs191/turing.pdfJ<04>http://www.cs.duke.edu/courses/cps296.4/spring04/papers/Adleman94.pdf$Mhttp://en.wikipedia.org/wiki/Pcr.ahttp://www.youtube.com/watch?v=2KoLnIwoZKU.ahttps://github.com/ibab/tensorflow-wavenet)Whttps://github.com/basveeling/wavenetB<04>https://deepmind.com/blog/wavenet-generative-model-raw-audio/(Uhttps://arxiv.org/pdf/1609.03499.pdf0ehttp://ftp.cs.ucla.edu/pub/stat_ser/r360.pdf 4mhttp://ftp.cs.ucla.edu/pub/stat_ser/R218-B-L.pdf 8uhttp://ftp.cs.ucla.edu/pub/stat_ser/r156-reprint.pdf /chttp://ftp.cs.ucla.edu/pub/stat_ser/r30.pdf
O<04>!http://airesearch.com/wp-content/uploads/2016/01/deepmind-mastering-go.pdf )Whttp://bayes.cs.ucla.edu/jp_home.html:(K<04>http://www.ssw.uni-linz.ac.at/General/Staff/TW/Wuerthinger05Train.pdf<00>$:yhttp://www.csee.umbc.edu/courses/471/papers/turing.pdf0`<04>Ahttps://github.com/papers-we-love/papers-we-love/blob/master/plt/predicate-dispatching.pdf<00>{7K<04>http://webcem01.cem 2i 3ihttp://user.a<04>Chttp://homepages.inf.ed.ac.uk/wadler/papers/propositions-as-types/propositions-as-types.pdf<00>E<04> http://www.ic.unicam c<04>Ghttp://static.googleusercontent.com/media/research.google.com/en/us/archive/chubby-osdi06.pdf<00> <00>m<0E>  <0C> <0B>
<EFBFBD> <09><00><08><07><05><04><03><02>u<00>r ]<5D> <1D>GG;6e39523a0acd9855ff465598253c323f7dfd3cdaa-program-optimization-for-automatic-database-result-caching.pdfcaching/a program optimization for automatic database result caching2017-09-06T01:52:28.7966411132017-09-06T01:52:28.796641113<EFBFBD> ]<5D>+1<>#GG<00>78c295cfd7469cd3d494a48df7bd7748139e0660digital_video_stabilization_and_rolling_shutter_correction_using_gyroscopes.pdfcomputer_graphics/digital video stabilization and rolling shutter correction using gyroscopes2017-09-06T01:52:29.2103068852017-09-06T01:52:29.210306885<EFBFBD> ]<5D>#3<>GGA30fae8663ffba4f4abca068a9bc8735a590a9bc5A framework for automated generation of questions across formal domains.pdfcomputer_education/a framework for automated generation of questions across formal domains2017-09-06T01:52:29.1541999512017-09-06T01:52:29.154199951<EFBFBD> ]<5D>?<3F>GG<00>ce8411564f95396b503868217469e2aaf1b996c9mexica-a-computer-model-of-a-cognitive-account-of-creativing-writing.pdfcomputational_creativity/mexica a computer model of a cognitive account of creativing writing2017-09-06T01:52:29.1267189942017-09-06T01:52:29.126718994<EFBFBD>
]<5D>Q{GG<01>83cf2b3372ef98f7fa5caf94aa44e7262ee47519story-of-squeak-a-practical-smalltalk-written-in-itself.pdfcomp_sci_fundamentals_and_history/story of squeak a practical smalltalk written in itself2017-09-06T01:52:29.1192629392017-09-06T01:52:29.119262939<EFBFBD>9 ]<5D>9Q<39>1GGq7edaa9cc255ba8e0938cb563110b204a4f393d60recursive-functions-of-symbolic-expressions-and-their-computation-by-machine-parti.pdfcomp_sci_fundamentals_and_history/recursive functions of symbolic expressions and their computation by machine parti2017-09-06T01:52:29.1161120612017-09-06T01:52:29.116112061<EFBFBD>S ]UQMGGM1c1ff93040a96dfe9f1309bfe34a989d5f93bb4fhints-for-computer-system-design.pdfcomp_sci_fundamentals_and_history/hints for computer system design2017-09-06T01:52:29.1132980962017-09-06T01:52:29.113298096<EFBFBD>
]<5D> Q<>GGfb2db075fa0230289a4f05caf2127b95fcc9aa9cearly-lisp-history-1956-1959-herbert-stoyan-html-rendering.pdfcomp_sci_fundamentals_and_history/early lisp history 1956 1959 herbert stoyan html rendering2017-09-06T01:52:29.0392648932017-09-06T01:52:29.039264893<EFBFBD>Y ]]QUEE14712e0a50083a6bda848bf4a65fe214f0f6a7069axiomatic-basis-computer-programming.pdfcomp_sci_fundamentals_and_history/axiomatic basis computer programming2017-09-06T01:52:28.922617922017-09-06T01:52:28.92261792<EFBFBD> ]<5D><1D>GGe6718cc5cd4e1484990ee79a8c3cffaad6d7271c3a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdfcaching/a constant algorithm for implementing the lfu cache eviction scheme2017-09-06T01:52:28.6480371092017-09-06T01:52:28.648037109<EFBFBD> ]<5D>)<1D>!GG>d62de5f995164fff50f5ce61c0113f6bc9f042252q-a-low-overhead-high-performance-buffer-management-replacement-algorithm.pdfcaching/2q a low overhead high performance buffer management replacement algorithm2017-09-06T01:52:28.5605510252017-09-06T01:52:28.560551025<EFBFBD>: ]O+GGGPe76af50e96b12fc507e73b025fe9da4a99600af9shazam-audio-search-algorithm.pdfaudio_comp_sci/shazam audio search algorithm2017-09-06T01:52:28.4378378912017-09-06T01:52:28.437837891<EFBFBD>j ]+wGG^3a05eea36ffdbcf0625d5154a6458e75ca835971an-ethnographic-and-technological-study-of-breakbeats.pdfaudio_comp_sci/an ethnographic and technological study of breakbeats2017-09-06T01:52:27.8624121092017-09-06T01:52:27.862412109<EFBFBD> ]<5D>=<3D>GGa02cc6a5944d57d2353a55639c7b77336b94f29b6efficient-selectivity-and-backup-operators-in-monte-carlo-tree-search.pdfartificial_intelligence/efficient selectivity and backup operators in monte carlo tree search2017-09-06T01:52:27.8398139652017-09-06T01:52:27.839813965<EFBFBD>S ]a=YEEVac14e6bf50d1491043baf1d854727a68f5f3f51d3-bayesian-network-inference-algorithm.pdfartificial_intelligence/3 bayesian network inference algorithm2017-09-06T01:52:27.808997072017-09-06T01:52:27.80899707<EFBFBD> ])#!GGbd9e0c2f5aaf68d784862ab361cc1a41fc9b32cdapi-design.pdfapi_design/api design2017-09-06T01:52:27.7784309082017-09-06T01:52:27.778430908 f<00>w<00> <0A> = I 0
<EFBFBD> <09> E<08><07><06>+N<04><03><02>f<00>L ]c'[GG<01>0ec3651f70a50c371a1f9502fc7d3eab272d5cffcommunication-theory-of-secrecy-systems.pdfcryptography/communication theory of secrecy systems2017-09-06T01:52:29.5208349612017-09-06T01:52:29.520834961!]<5D>5#<23>-GG<01>29f3f5918946bf0a4d75bf5244f993847d03e26cnetwork-challenges-of-data-recovery-in-erasure-coded-distributed-storage-systems.pdfdatastores/network challenges of data recovery in erasure coded distributed storage systems2017-09-06T01:52:30.0153620612017-09-06T01:52:30.015362061<EFBFBD>" ]<5D>1#<23>)GGl07d847f310d5fa9138f461f0a25c5e0024f1c4afmegastore-providing-scalable-highly-available-storage-for-interactive-services.pdfdatastores/megastore providing scalable highly available storage for interactive services2017-09-06T01:52:29.9983029792017-09-06T01:52:29.998302979<EFBFBD>z! ]<5D>#<23> CC.e95ecb39639ce118c7ddd5bd7892378eacdd105ffreenet-a-distributed-anonymous-information-and-retrieval-system.pdfdatastores/freenet a distributed anonymous information and retrieval system2017-09-06T01:52:29.98615212017-09-06T01:52:29.9861521<EFBFBD>* ]C#;GGscb4710f77feed90ae01b332c492853a5b20e2c7dflat-datacenter-storage.pdfdatastores/flat datacenter storage2017-09-06T01:52:29.9789870612017-09-06T01:52:29.978987061<EFBFBD>Z ]s#kGG0a2e89c6111f3e306c56472306795af290ffb29afdynamo-amazons-highly-available-key-value-store.pdfdatastores/dynamo amazons highly available key value store2017-09-06T01:52:29.9559790042017-09-06T01:52:29.955979004<EFBFBD>Q ]k#aGGG57d70e73a995be26f01ae51f321fdaf42a089bf8database-metatheory--asking-the-big-queries.pdfdatastores/database metatheory asking the big queries2017-09-06T01:52:29.9231159672017-09-06T01:52:29.923115967<EFBFBD>o
]<5D>#GGOe2e60f19214efaa7d842b4a3b3b322964bf78dc7bigtable-a-distributed-storage-system-for-structured-data.pdfdatastores/bigtable a distributed storage system for structured data2017-09-06T01:52:29.9147690432017-09-06T01:52:29.914769043<EFBFBD>3 ]G-?GG}973f17392cb7b417271e9d482d17a44a8c70c70alevel-ancestor-simplified.pdfdata_structures/level ancestor simplified2017-09-06T01:52:29.8729951172017-09-06T01:52:29.872995117<EFBFBD> ]/-'GG<01>f5222809526d8a419a1752547880ba0a9013a8calca-revisited.pdfdata_structures/lca revisited2017-09-06T01:52:29.8688759772017-09-06T01:52:29.868875977<EFBFBD>! ]5--GGJ4fc240d0d9e690cb9b0bcb2f8a5e5ca918b01410ideal-hash-trees.pdfdata_structures/ideal hash trees2017-09-06T01:52:29.8638400882017-09-06T01:52:29.863840088<EFBFBD>1 ]E-=GG<00>1cdc911f5a1b7a770b2e27bf4ebfae04c003a616epidemic-broadcast-trees.pdfdata_structures/epidemic broadcast trees2017-09-06T01:52:29.8548310552017-09-06T01:52:29.854831055<EFBFBD> ]''GGo11825521850926501e3f353ffb7cf14b0c389320tidy_data.pdfdata_science/tidy data2017-09-06T01:52:29.7942661132017-09-06T01:52:29.794266113<EFBFBD> ]<5D>'/<2F>GG4b1ed99c65d500d4a610813736169851cb496810a-comprehensive-study-of-convergent-and-communative-replicated-data-types.pdfdata_replication/a comprehensive study of convergent and communative replicated data types2017-09-06T01:52:29.5398269042017-09-06T01:52:29.539826904<EFBFBD>q ]<5D> %<25>EE<00>fe0ae75e97abe2686e6bc8cbe94bfd08934e36daa-new-approach-to-linear-filtering-and-prediction-problems.pdfdata_fusion/a new approach to linear filtering and prediction problems2017-09-06T01:52:29.536247072017-09-06T01:52:29.53624707<EFBFBD>" ]5/-GGa9d9352d43986d4a5a3554a84b99580225ec00cfdata-compression.pdfdata_compression/data compression2017-09-06T01:52:29.5305668952017-09-06T01:52:29.530566895<EFBFBD> ])'!GG<00>c5cf25551312490d3f3f3a6b62c5c3492b63f1f1ntru-prime.pdfcryptography/ntru prime2017-09-06T01:52:29.5260380862017-09-06T01:52:29.526038086<EFBFBD> ])1!GG<00>0f007df1707d77a72237248b0d7fd93b37fc9db7pushpull++.pdfcomputer_graphics/pushpull++2017-09-06T01:52:29.4756289062017-09-06T01:52:29.475628906<EFBFBD>l ]1wGG#6125b966172dd6cde3563f2ae10d8f782d14e1deimaging_vector_fields_using_line_integral_convolution.pdfcomputer_graphics/imaging vector fields using line integral convolution2017-09-06T01:52:29.4438491212017-09-06T01:52:29.443849121  -S<0E>
 U <0B>
<EFBFBD>-
 <09><08>Uel<02>t  <00>\* ]u#mGG<01>eecf3aaa6aadf48778bb1daa6b09d011632b9f55warp-multi-key-transactions-for-key-value-stores.pdfdatastores/warp multi key transactions for key value stores2017-09-06T01:52:30.1608710942017-09-06T01:52:30.160871094<05><01>]<5D>?5<>7GGjf06554b06ac49f129086c8889690faaa761398bbbeehive-lookup-performance-for-power-law-query-distributions-in-peer-to-peer-overlays.pdfdistributed_systems/beehive lookup performance for power law query distributions in peer to peer overlays2017-09-06T01:52:30.4055910642017-09-06T01:52:30.405591064<EFBFBD>)4 ]<5D>75<37>/GGh59b3e2060ef7108c9170975219aae410f52ba0b8a-versatile-scheme-for-ro<72>?1 ]S5KCC177f9ad15ae9420c5c22f20da9a7c8e8dad4f32da-note-on-distributed-computing.pdfdistributed_systems/a note on distributed computing2017-09-06T01:52:30.33522292017-09-06T01:52:30.3352229<EFBFBD># ]<5D>5#<23>-GG<01>29f3f5918946bf0a4d75bf5244f993847d03e26cnetwork-challenges-of-data-recovery-in-erasure-coded-distributed-storage-systems.pdfdatastores/network challenges of data recovery in erasure coded distributed storage systems2017-09-06T01:52:30.0153620612017-09-06T01:52:30.015362061<EFBFBD>52 ]<5D>C5<43>;GG<01>3b2c76827fb4ad1b2da0d0870441e77a27ee37dea-response-to-cheriton-and-skeens-criticism-of-causal-and-totally-ordered-communication.pdfdistributed_systems/a response to cheriton and skeens criticism of causal and totally ordered communication2017-09-06T01:52:30.3622661132017-09-06T01:52:30.362266113<00>]S5KCC177f9ad15ae9420c5c22f20da9a7c8e8dad4f32da-note-on-distributed-computing.pdfdistributed_systems/a note on distributed computing2017-09-06T01:52:30.33522292017-09-06T01:52:30.3352229<EFBFBD>v0
]<5D>5}GGy451da9c5558de4c75f01582292063a7c98029208a-hundred-impossibility-proofs-for-distributed-computing.pdfdistributed_systems/a hundred impossibility proofs for distributed computing2017-09-06T01:52:30.3004030762017-09-06T01:52:30.300403076<EFBFBD>m/ ]}5uGG*e51582689653f238029d984cd1780c93ef672771a-history-of-the-virtual-synchrony-replication-model.pdfdistributed_systems/a history of the virtual synchrony replication model2017-09-06T01:52:30.2775700682017-09-06T01:52:30.277570068<EFBFBD>. ]'/GG50c42217e3c5b52eb1732f4193bf452dcc0de71bprimecoin.pdfdigital_currency/primecoin2017-09-06T01:52:30.2584719242017-09-06T01:52:30.258471924<EFBFBD>- ]%/GG]0db38d32069f3341d34c35085dc009a85ba13c13peercoin.pdfdigital_currency/peercoin2017-09-06T01:52:30.2395148932017-09-06T01:52:30.239514893<EFBFBD>, ]#/GGT8de2fdb04edce612738eb51e14ecc426381f8ed8bitcoin.pdfdigital_currency/bitcoin2017-09-06T01:52:30.2103588872017-09-06T01:52:30.210358887<EFBFBD>+ ]91GG!0f278cf94ac0d7fe15a7c4e0f283446e9fc07474out-of-the-tar-pit.pdfdesign/out of the tar pit2017-09-06T01:52:30.1805539552017-09-06T01:52:30.180553955<EFBFBD>\) ]u#mGGb8645fcfdf5af5759dc20ae769b96be510bdff1atransactional-storage-for-geo-replicated-systems.pdfdatastores/transactional storage for geo replicated systems2017-09-06T01:52:30.1302409672017-09-06T01:52:30.130240967<EFBFBD>@( ]Y#QGGp39ac2e0fc4ec63753306f99e71e0f38133e58eadtao-facebook-distributed-datastore.pdfdatastores/tao facebook distributed datastore2017-09-06T01:52:30.1000991212017-09-06T01:52:30.100099121<EFBFBD>D' ]_#WEE<01>87fbf4fa017a90b5ff819bcfca17fb52d6f6a790stasis-flexible-transactional-storage.pdfdatastores/stasis flexible transactional storage2017-09-06T01:52:30.089867922017-09-06T01:52:30.08986792<EFBFBD>k&
]<5D>#{GG=f1948a2d5dc8745f725e3ba0b24e14847778cb19spartan-a-distributed-array-framework-with-smart-tiling.pdfdatastores/spartan a distributed array framework with smart tiling2017-09-06T01:52:30.0822141112017-09-06T01:52:30.082214111<EFBFBD>X% ]q#iGG4cb33680dda1fa1f0bad1ca52e07a8a34a500104spanner-google's-globally-distributed-database.pdfdatastores/spanner google's globally distributed database2017-09-06T01:52:30.0611110842017-09-06T01:52:30.061111084<EFBFBD>$ ]<5D>/#<23>'GG{8b1d8d46836a6d5eb4355315b64d85c128cbff27rados-a-scalable-reliable-storage-service-for-petabyte-scale-storage-clusters.pdfdatastores/rados a scalable reliable storage service for petabyte scale storage clusters2017-09-06T01:52:30.0372380372017-09-06T01:52:30.037238037 <05> <03><07><06><03>2<0E> <0A> <0C> <0B>
<EFBFBD> <09><08><05>X:?<00>NB ]_5WGGu368427e6e351d1ac0ef97e824968ed15d0dc3d4dend-to-end-arguments-in-system-design.pdfdistributed_systems/end to end arguments in system design2017-09-06T01:52:30.5334619142017-09-06T01:52:30.533461914]<5D>!5<>GG<01>fd443b2ce70c48202ba26cbc6caa471ae262e270distributed-snapshots-determining-global-states-of-distributed-systems.pdfdistributed_systems/distributed snapshots determining global states of distributed systems2017-09-06T01:52:30.5257509772017-09-06T01:52:30.525750977<EFBFBD>xE
]<5D>5GGi9d2c1271f1219522d13f150c2b04123bef300dd9herbivore-a-scalable-and-efficient-protocol-for-anonymous.pdfdistributed_systems/herbivore a scalable and efficient protocol for anonymous2017-09-06T01:52:30.5473469242017-09-06T01:52:30.547346924<EFBFBD>[D ]k5cGGD50158bc1a8a67295ab7bce0550886a9859000dc2harvest-yield-and-scalable-tolerant-systems.pdfdistributed_systems/harvest yield and scalable tolerant systems2017-09-06T01:52:30.544548096201<EFBFBD>15 ]<5D>?5<>7GGjf06554b06ac49f129086c8889690faaa761398bbbeehive-lookup-performance-for-power-law-query-distributions-in-peer-to-peer-overlays.pdfdistributed_systems/beehive lookup performance for power law query distributions in peer to peer overlays2017-09-06T01:52:30.4055910642017-09-06T01:52:30.405591064<EFBFBD>)6 ]951GG<01>24cece61e2128780072bc58f90b8ba47f624bc27brewers-conjecture.pdfdistributed_systems/brewers conjecture2017-09-06T01:52:30.4104208982017-09-06T01:52:30.410420898V<00>]5wGG<01>f52e7afce70597024c3be7df105185dd59a2c8e6eluding-carnivores-file-sharing-with-strong-anonymity.pdfdistributed_systems/eluding carnivores file sharing with strong anonymity2<79>)4 ]<5D>75<37>/GGh59b3e2060ef7108c9170975219aae410f52ba0b8a-versatile-scheme-for-routing-highly-variable-traffic-in-service-overlays-and-ip.pdfdistributed_systems/a versatile scheme for routing highly variable traffic in service overlays and ip2017-09-06T01:52:30.3946950682017-09-06T01:52:30.394695068<EFBFBD>3 ]<5D>5<> GG<01>208aee805004d575035284b1c232209e9fa26b0ea-universal-modular-actor-formalism-for-artificial-intelligence.pdfdistributed_systems/a universal modular actor formalism for artificial intelligence2017-09-06T01:52:30.3829450682017-09-06T01:52:30.382945068<EFBFBD>K= ][5SGG6d65e79756ac6817d4780286045a35d34aaaaf836consistent-hashing-and-random-trees.pdfdistributed_systems/consistent hashing and random trees2017-09-06T01:52:30.5050930182017-09-06T01:52:30.505093018<EFBFBD>-< ]<5D>;5<>3GG[76c0579c23504531220601029d455dca6413b628consistent-global-states-of-distributed-systems-fundamental-concepts-and-mechanisms.pdfdistributed_systems/consistent global states of distributed systems fundamental concepts and mechanisms2017-09-06T01:52:30.5014130862017-09-06T01:52:30.501413086<EFBFBD>Y; ]i5aGG4e63eed9e709b6c8e20a4a68300883898c7d8f37consensus-in-presence-of-partial-synchrony.pdfdistributed_systems/consensus in presence of partial synchrony2017-09-06T01:52:30.4801831052017-09-06T01:52:30.480183105<EFBFBD>t:
]<5D>5{GG<01>daf38d927e2b21c885efdb4b2cc46a2d9f47d679commodifying-replicated-state-machines-with-openreplica.pdfdistributed_systems/commodifying replicated state machines with openreplica2017-09-06T01:52:30.4629499512017-09-06T01:52:30.462949951<EFBFBD> 9 ]<5D>5<>GGR76eea8436996c7e9c8f7ad3dac34a12865edab24chain-replication-for-supporting-high-throughput-and-availability.pdfdistributed_systems/chain replication for supporting high throughput and availability2017-09-06T01:52:30.4537900392017-09-06T01:52:30.453790039<EFBFBD>m8 ]}5uGG892b955b6fb175c92f3f294ab431f97a8827748dbyzantine-fault-tolerant-distributed-commit-protocol.pdfdistributed_systems/byzantine fault tolerant distributed commit protocol2017-09-06T01:52:30.4369108892017-09-06T01:52:30.436910889<EFBFBD>;7 ]K5CGG17007f5e69efcfeff03853a33121943e2b4df422byzantine-chain-replication.pdfdistributed_systems/byzantine chain replication2017-09-06T01:52:30.4134299322017-09-06T01:52:30.413429932<00>]951GG24cece61e2128780072bc58f90b8ba47f624bc27brewers-conjecture.pdfdistributed_systems/brewers conjecture2017-09-06T01:52:30.4104208982017-09-06T01:52:30.410420898  <00>4<01>  A
5 <09>I -<00><02><00> Q ]<5D>5<>CC|3e375c8d996b8c46c83b9d3f72732d7477e5fd86mesos-a-platform-for-fine-grained-resource-sharing-in-the-data-center.pdfdistributed_systems/mesos a platform for fine grained resource sharing in the data center2017-09-06T01:52:30.59515212017-09-06T01:52:30.5951521<EFBFBD>G ]<5D>5<> GG`7d7de228c501ef486534cca1829378eef8ef1081how-the-hidden-hand-shapes-the-market-for-software-reliability.pdfdistributed_systems/how the hidden hand shapes the market for software reliability2017-09-06T01:52:30.5544418952017-09-06T01:52:30.554441895<EFBFBD>'R ]<5D>75<37>/EE_a2e4dc4b1cce765255e4d15084811da125c564c5oblivious-routing-of-highly-variable-traffic-in-service-overlays-and-ip-backbones.pdfdistributed_systems/oblivious routing of highly variable traffic in service overlays and ip backbones2017-09-06T01:52:30.599617922017-09-06T01:52:30.59961792""]<5D>5<>CC3e375c8d996b8c46c83b<33>iJ ]y5qGG<01>9aa8f3d1df6ff6d266a531432fe9ea0bb56ad3c3in-search-of-an-understandable-consensus-algorithm.pdfdistributed_systems/in search of an understandable consensus algorithm2017-09-06T01:52:30.5663940432017-09-06T01:52:30.566394043<EFBFBD>rP
]<5D>5yGG<f3050b5586ddfec5da0d719338a6afa8b166985bmapreduce-simplified-data-processing-on-large-clusters.pdfdistributed_systems/mapreduce simplified data processing on large clusters2017-09-06T01:52:30.5918000492017-09-06T01:52:30.591800049 +]<5D>5GGc20ba<62>dF ]u5kGG<01>28142adcd8a406110c76dbb8e324dc211f3944d1high-level-specifications--lessons-from-industry.pdfdistributed_systems/high level specifications lessons from industry2017-09-06T01:52:30.5507409672017-09-06T01:52:30.550740967<EFBFBD>+N ]<5D>;5<>3EE357efc2b9ba2a725af1d66cc43c472d0314190051large-scale-incremental-processing-using-distributed-transactions-and-notifications.pdfdistributed_systems/large scale incremental processing using distributed transactions and notifications2017-09-06T01:52:30.583489992017-09-06T01:52:30.58348999<EFBFBD>GM ]<5D>U5<55>MGG8bde7543a8b3ce071342dfaea2a14357431d94b82kelips-building-an-efficient-and-stable-p2p-dht-through-increased-memory-and-background-overhead.pdfdistributed_systems/kelips building an efficient and stable p2p dht through increased memory and background overhead2017-09-06T01:52:30.5795039062017-09-06T01:52:30.579503906<EFBFBD>L ]/5'GG\1e86909765bd5603a152bbd55e511e0586f1b77fjoin-calculus.pdfdistributed_systems/join calculus2017-09-06T01:52:30.5750910642017-09-06T01:52:30.575091064<EFBFBD>sK
]<5D>5{GG736222f8eb2ccf21ca345e15186cea64506581543ironFleet-proving-practical-distributed-systems-correct.pdfdistributed_systems/ironfleet proving practical distributed systems correct2017-09-06T01:52:30.5708459472017-09-06T01:52:30.570845947<00>]y5qGG9aa8f3d1df6ff6d266a531432fe9ea0bb56ad3c3in-search-of-an-understandable-consensus-algorithm.pdfdistributed_systems/in search of an understandable consensus algorithm2017-09-06T01:52:30.5663940432017-09-06T01:52:30.566394043<EFBFBD>iI ]y5qGGH00e3756119a91432622f6982b59ecd24a1340fbeimpossibility-of-consensus-with-one-faulty-process.pdfdistributed_systems/impossibility of consensus with one faulty process2017-09-06T01:52:30.5618740232017-09-06T01:52:30.561874023<EFBFBD>H ]<5D>#5<>EE%1551d42b24a5b1e1ead5f0793e807869249ab93eimplementing-the-omega-failure-detector-in-crash-recovery-failure-model.pdfdistributed_systems/implementing the omega failure detector in crash recovery failure model2017-09-06T01:52:30.557877932017-09-06T01:52:30.55787793 ]<5D><11>xO
]<5D>5GGkc20baa16cb57ff4979569871d15294fa720bbc23life-beyond-distributed-transactions-an-apostates-opinion.pdfdistributed_systems/life beyond distributed transactions an apostates opinion2017-09-06T01:52:30.5871550292017-09-06T01:52:30.587155029<00>]u5kGG28142adcd8a406110c76dbb8e324dc211f3944d1high-level-specifications--lessons-from-industry.pdfdistributed_systems/high level specifications lessons from industry2017-09-06T01:52:30.5507409672017-09-06T01:52:30.550740967 j y
<EFBFBD>c_Vf<01> L <09>y<02>k<06>}_cj<00>n\
]<5D>5{AA-ca9ccbcf4a8440590a81f94295a22386a422d198solution-of-a-problem-in-concurrent-programming-control.pdfdistributed_systems/solution of a problem in concurrent programming control2017-09-06T01:52:30.7818752017-09-06T01:52:30.781875!=]<5D>5GGfc11031895c302dc52404d34de58af1a72f3b817zab-high<67>Y ]<5D>'5<>GGZ95d36d171e5e2183c424f535fad2e8053f5cec64sift-design-and-analysis-of-a-fault-tolerant-computer-for-aircraft-contro.pdfdistributed_systems/sift design and analysis of a fault tolerant computer for aircraft contro2017-09-06T01:52:30.7117080082017-09-06T01:52:30.711708008<EFBFBD>%] ]75/EEUd14dee375bc275d08b09e5b7d420c28a5ef6b47asparse-partitions.pdfdistributed_systems/sparse partitions2017-09-06T01:52:30.785132082017-09-06T01:52:30.78513208<EFBFBD>x^
]<5D>5GG@64832c7b1602f0922e4e818ad045d1bb5ae95dd6stronger-semantics-for-low-latency-geo-replicated-storage.pdfdistributed_systems/stronger semantics for low latency geo replicated storage2017-09-06T01:52:30.7900830082017-09-06T01:52:30.790083008<EFBFBD>vX
]<5D>5}GG?4329143e227370d931a207184f3b995c0cb5c8d5self-stabilizing-systems-in-spite-of-distributed-control.pdfdistributed_systems/self stabilizing systems in spite of distributed control2017-09-06T01:52:30.7079780272017-09-06T01:52:30.707978027<EFBFBD>?V ]O5GGG 43c7b3780b5864f99d042392d83ab331f7fddf2apaxos-made-moderately-complex.pdfdistributed_systems/paxos made moderately complex2017-09-06T01:52:30.6142080082017-09-06T01:52:30.614208008M<00>]<5D>Q5<51>IEE4bf4acf54bfd2e65b1ed31fe272670a7e276c534pastry-scalable-decentralized-object-location-and-routing-for-large-scale-peer-to-peer-systems.p<>)_ ]951GG<01>e1ac8e8d810a148dc3f5291795b0ac0b114db824the-akamai-network.pdfdistributed_systems/the akamai network2017-09-06T01:52:30.7943159182017-09-06T01:52:30.794315918<EFBFBD>gT ]y5qGG1a0ba12427c68642a4871677b9de7a337356b9f6p5-a-protocal-for-scalable-anonymous-communication.pdfdistributed_systems/p5 a protocal for scalable anonymous communication2017-09-06T01:52:30.6078249512017-09-06T01:52:30.607824951 d]]]5UGGf16c6ce0c7eabd4f5896962335879b3932138e52on-proof-and-progress-in-mathematics.pdfdistributed_systems/on proof and progress in mathematics2017-09-06T01:52:30.6048859862017-09-06T01:52:30.604885986<EFBFBD>'_ ]951GGe1ac8e8d810a148dc3f5291795b0ac0b114db824the-akamai-network.pdfdistributed_systems/the akamai network2017-09-06T01:52:30.79431591820<EFBFBD>g[ ]w5oGG<01>5eb4500b8053ac8dd1a21bfca10c818e1e0a2405simple-testing-can-prevent-most-critical-failures.pdfdistributed_systems/simple testing can prevent most critical failures2017-09-06T01:52:30.7597739262017-09-06T01:52:30.759773926<EFBFBD>MS ]]5UGGnf16c6ce0c7eabd4f5896962335879b3932138e52on-proof-and-progress-in-mathematics.pdfdistributed_systems/on proof and progress in mathematics2017-09-06T01:52:30.6048859862017-09-06T01:52:30.604885986 E<00>]w5oGG5eb4500b8053ac8dd1a21bfca10c818e1e0a2405simple-testing-can-prevent-most-critical-failures.pdfdistributed_systems/simple testing can prevent most critical failures2017-09-06T01:52:30.7597739262017-09-06T01:52:30.759773926<EFBFBD>vZ
]<5D>5}GG&65d3575b1c380b1bcc14ec69ccf6989c04be9493signal-&-collect-graph-algorithms-for-the-(semantic)-web.pdfdistributed_systems/signal & collect graph algorithms for the (semantic) web2017-09-06T01:52:30.7393081052017-09-06T01:52:30.739308105<00>]<5D>'5<>GG95d36d171e5e2183c424f535fad2e8053f5cec64sift-design-and-analysis-of-a-fault-tolerant-computer-for-aircraft-contro.pdfdistributed_systems/sift design and analysis of a fault tolerant computer <20>AU ]<5D>Q5<51>IEEz4bf4acf54bfd2e65b1ed31fe272670a7e276c534pastry-scalable-decentralized-object-location-and-routing-for-large-scale-peer-to-peer-systems.pdfdistributed_systems/pastry scalable decentralized object location and routing for large scale peer to peer systems2017-09-06T01:52:30.610989992017-09-06T01:52:30.61098999<EFBFBD>'W ]75/GG#763d0321ced31b774bd4ba2f9f369c087cbd278epaxos-made-simple.pdfdistributed_systems/paxos made simple2017-09-06T01:52:30.7026169432017-09-06T01:52:30.702616943
<01>D<00><0F><0F>yL<0E><0E><0E>i< <0A> <0A> <0A> [X .  <0C> <0C> z M <0B> <0B> <0B> l >*<00> 
<EFBFBD>
<EFBFBD>
<EFBFBD>
\
.
 <09> <09> y L <08><08><08>k><07><07><07>\/<06><06>{N <05><05><01><05>l><04><04>]0X<03><03>|N <02><02><00><01><02>j=<01>-]703d0b290a4ece50c17854ed72ecc808ce3e6f43<00>-]23c425f022baa054c68683eaf81f5d482915ce13<00>-]239ff60210c28900f866c588f40e974d897a9f62<00>-]1396a6cd134a7f41eeb1e5d4ca8d4edf6edfc432<00>-]557b1ec3182ccb3a902cc9904a443accb438842f<00>76e1cf37ae212298802799c2c3588030d20a769f<00>=.70882fa7790685902d4d8b56ba08a361f6e74eb1<00>,]76eea8436996c7e9c8f7ad3dac34a12865edab249<02>76c0579c23504531220601029d455dca6413b628<-]765e049036ca947af05fb5b4f29b9daf4b363558<00>,]763d0321ced31b774bd4ba2f9f369c087cbd278eW6e39523a0acd9855ff465598253c323f7dfd3cda-]6995ac2e570960403c02250b02e64cafed8378fd<00>-]6980e1e551cadbde62454bedf5e1324032fa1e40<00>-]6848895fe48b0ca3b0bc34c1bcdf66eb58e64308<00>,]6718cc5cd4e1484990ee79a8c3cffaad6d7271c3,]66401c00817c71713e86438385d91956246aeaabf,]65d3575b1c380b1bcc14ec69ccf6989c04be9493Z,]64832c7b1602f0922e4e818ad045d1bb5ae95dd6^<00>612b437425a8077a832c27b7f4ec057143e87a8cj,]6125b966172dd6cde3563f2ae10d8f782d14e1de,]5eb4500b8053ac8dd1a21bfca10c818e1e0a2405-]59a968fa431e7117aa11005ed98ab39f1efddc30<00>,]5ac2852c69cc7bda25677129da011dec23fc3d77v,]59b3e2060ef7108c9170975219aae410f52ba0b84-]59776eb2358b4be265e7dae9df4f946dab25bf6f<00>,]57efc2b9ba2a725af1d66cc43c472d0314190051N,]57d70e73a995be26f01ae51f321fdaf42a089bf8,]530b50510808903545d298de7e19d6e5463a72cdd,]50c42217e3c5b52eb1732f4193bf452dcc0de71b.-]5046034fe0cddda681ad9374d306fd27eec8b5fb<00>,]50158bc1a8a67295ab7bce0550886a9859000dc2D,]4fc240d0d9e690cb9b0bcb2f8a5e5ca918b01410,]4e63eed9e709b6c8e20a4a68300883898c7d8f37;,]4cb33680dda1fa1f0bad1ca52e07a8a34a500104%,]4bf4acf54bfd2e65b1ed31fe272670a7e276c534U,]4ba0079fbfaf8a49f36f4e400f44c17b7f4552d4|-]4b85765a808e4c29f05bc48a17a2dced1702db9d<00>,]4b1ed99c65d500d4a610813736169851cb496810,]49ed15db181c74c7067ec01800fb5392411c868cC,]4712e0a50083a6bda848bf4a65fe214f0f6a7069 ,]451da9c5558de4c75f01582292063a7c980292080,]43c7b3780b5864f99d042392d83ab331f7fddf2aV,]4329143e227370d931a207184f3b995c0cb5c8d5X,]3e375c8d996b8c46c83b9d3f72732d7477e5fd86Q,]3b2c76827fb4ad1b2da0d0870441e77a27ee37de2,]3a05eea36ffdbcf0625d5154a6458e75ca835971,]39ac2e0fc4ec63753306f99e71e0f38133e58ead(,]381c0200a69d43c6605079aaf73beace048b76a6,]368427e6e351d1ac0ef97e824968ed15d0dc3d4dB,]36222f8eb2ccf21ca345e15186cea64506581543K-]3547ac839d02f6efe3f6f76a8289738a22528442<00>,]30fae8663ffba4f4abca068a9bc8735a590a9bc5-]30ef9946a1733c097d541ffaae8e95f0af862a08<00>-]30baa244b66e81d737ccf9f667c9bfca4f0c18f1<00>,]2db53cdcf4ba7c67321c022954c2b2be9c8a40bdi,]29f3f5918946bf0a4d75bf5244f993847d03e26c#,]28142adcd8a406110c76dbb8e324dc211f3944d1F,]24cece61e2128780072bc58f90b8ba47f624bc276-]223b694fb70d4bd18ba0f4bd73ff3c6bc8f6370a<00>,]2128052ca0319cdf9c9256eb52f26a23c6527094t,]208aee805004d575035284b1c232209e9fa26b0e3,]1e86909765bd5603a152bbd55e511e0586f1b77fL,]1cdc911f5a1b7a770b2e27bf4ebfae04c003a616,]1c1ff93040a96dfe9f1309bfe34a989d5f93bb4f ,]1a0ba12427c68642a4871677b9de7a337356b9f6T,]18a74ae5e33b76a0528d0724d5c55a98dabe0b1fn,]177f9ad15ae9420c5c22f20da9a7c8e8dad4f32d1,]17007f5e69efcfeff03853a33121943e2b4df4227,]158d08ec7c2134382e20b44001903ad5b8a521b2l,]1551d42b24a5b1e1ead5f0793e807869249ab93eH,]11ff11e3aedaa41a67bea3623e5d2a805db6166e>,]11825521850926501e3f353ffb7cf14b0c389320,]0f278cf94ac0d7fe15a7c4e0f283446e9fc07474+,]0f007df1707d77a72237248b0d7fd93b37fc9db7,]0ec3651f70a50c371a1f9502fc7d3eab272d5cff,]0db38d32069f3341d34c35085dc009a85ba13c13--]09ac606ba306a1bea91642deb2af0909360b038f<00>,]07f82eecbe3d530e3f967342245a4d5c8e41c05be,]07d847f310d5fa9138f461f0a25c5e0024f1c4af"-]07ad71a8d82bf51e0b5d1d892aa6a10673a3b830<00>,]0404bd58e5f1edbd288cd69fcbc224485af415bfs,]02cc6a5944d57d2353a55639c7b77336b94f29b6,]016f4930ad10f8097c42e5294b56d25bfb3c121fq,]00e3756119a91432622f6982b59ecd24a1340fbeI,]003d5a65de0ac72daaf105ded903cb3eb88585b3?
<00>C<00>f9 <07><07><07>W*<06><06><06>rE<05><05><05>a3<04><0F><0F>yKO<0E><0E><0E>i< <0A> <0A> <0A> Z , <0C> <0C> <0C> x J <00> <0B> <0B> <0B> i <} 
<EFBFBD>
<EFBFBD>
<EFBFBD>
Y<04>
+ <09> <09> <09> x J <08><08><08>S&<03><03><03>pC<02><02><02>b5<01><01><01>S%-]9b8aec8ef5c67da463f5ec7c174570eb7d1643a8<00>Xd0d8b7501d7f75613d5493d706d6d81852a73d6e<00>-]fec6b29569eac1a340990bb07e90355efd2434ec<00>,]fe0ae75e97abe2686e6bc8cbe94bfd08934e36da,]fd443b2ce70c48202ba26cbc6caa471ae262e270@,]fc11031895c302dc52404d34de58af1a72f3b817g,]fb2db075fa0230289a4f05caf2127b95fcc9aa9c
-]f6dce666a0f64f97f380f99cba7f14e24d5f54ad<00>,]f52e7afce70597024c3be7df105185dd59a2c8e6A,]f5222809526d8a419a1752547880ba0a9013a8ca,]f3485e24d796c33f11048f74e447853ef4a6dc53c,]f3050b5586ddfec5da0d719338a6afa8b166985bP,]f1948a2d5dc8745f725e3ba0b24e14847778cb19&,]f16c6ce0c7eabd4f5896962335879b3932138e52S,]f06554b06ac49f129086c8889690faaa761398bb5-]f00e7c584731135892cb1bc133672a3d63d9e095<00>,]eee4e109fd92ea679600a61dd7d3428efa786a64m,]eecf3aaa6aadf48778bb1daa6b09d011632b9f55*-]eb654b2087706468fe3173c4b38b940be0c85722<00>,]e95ecb39639ce118c7ddd5bd7892378eacdd1-]8004558792c00764d173dc63c03d3a391acfe6b7<00>-]a5c83733c6abcd1a089bed36cf2ef38577ec5521<00>-]b68ff86ce8591931d3bef1294f8b46dae63780ad<00>,]778e77ac46880d905d104d4f771fc5bb978a19ee},]76eea8436996c7e9c8f7ad3dac34a12865edab249-]76e1cf37ae212298802799c2c3588030d20a769f<00>,]76c0579c23504531220601029d455dca6413b628<-]765e049036ca947af05fb5b4f29b9daf4b363558<00>,]763d0321ced31b774bd4ba2f9f369c087cbd278eW-]70882fa7790685902d4d8b56ba08a361f6e74eb1<00>-]703d0b290a4ece50c17854ed72ecc808ce3e6f43<00>,]6e39523a0acd9855ff465598253c323f7dfd3cda-]6995ac2e570960403c02250b02e64cafed8378fd<00>-]6980e1e551cadbde62454bedf5e1324032fa1e40<00>-]6848895fe48b0ca3b0bc34c1bcdf66eb58e64308<00>-]67ea9f0fe38b6848de19578589eab498473562c3<00>,]6718cc5cd4e1484990ee79a8c3cffaad6d7271c3,]66401c00817c71713e86438385d91956246aeaabf,]65d3575b1c380b1bcc14ec69ccf6989c04be9493Z,]64832c7b1602f0922e4e818ad045d1bb5ae95dd6^-]614d66c63f8a04cf24cf19ce885f6a34be56a67c<00>,]612b437425a8077a832c27b7f4ec057143e87a8cj,]6125b966172dd6cde3563f2ae10d8f782d14e1de,]5eb4500b8053ac8dd1a21bfca10c818e1e0a2405[-]c501a067498b94558da0e0510a4c29370388aee0<00>-]c2eec09d057ce3b7277395e6820f38744e67fb97<00>,]c20baa16cb57ff4979569871d15294fa720bbc23O-]c1350b1680d30a7bdcb9837bff2e0e8c40f9a92a<00>-]c0f83a70b1c225e7705c301e1106332819bff375<00>,]bde7543a8b3ce071342dfaea2a14357431d94b82M+] bd9e0c2f5aaf68d784862ab361cc1a41fc9b32cd,]bac41b59697da3ca5c80ca08f2bbbc97a3576248a,]b8645fcfdf5af5759dc20ae769b96be510bdff1a)-]b7741ea891833418cc888b38f9f529bdb86409a4<00>-]b615e2186f1982009d863f3f2f98909f2f7815ab<00>,]ac14e6bf50d1491043baf1d854727a68f5f3f51d,]a9d9352d43986d4a5a3554a84b99580225ec00cf,]a673b5ccb8fed1cb38edf75ead930569ba568c10z-]a659692ed5031c5410668d644a60d7806bb2efbb<00>,]a2e89c6111f3e306c56472306795af290ffb29af,]a2e4dc4b1cce765255e4d15084811da125c564c5R,]9ed603d5743ef547a23578c5d50bd23069a6f2a8{,]9d48eb6b89a9d7aa6feab3f6b2f57c70c1d9d18fw,]9d2c1271f1219522d13f150c2b04123bef300dd9E,]9aa8f3d1df6ff6d266a531432fe9ea0bb56ad3c3J-]997d371f1e063ff11e00fc6c0aef259558b92303<00>,]993f5b0bb126caae848937b2323efabdf8bc21e9`,]97edc89b0a19e90e2123f22315b88aaf7033bb3a~,]973f17392cb7b417271e9d482d17a44a8c70c70a,]95d36d171e5e2183c424f535fad2e8053f5cec64Y-]94e8fc6068b6dff5a2a688f51c44ebfdd23f7e1a<00>-]904014fb5cb22e8241c55e2fc6ae46288c5eebaf<00>,]8eacd0f01ab0f53706561dda0ce8d1f96544a348p,]8e1408e93d56b214a9018a7c13422715367a28bex,]8de2fdb04edce612738eb51e14ecc426381f8ed8,,]8b1d8d46836a6d5eb4355315b64d85c128cbff27$,]892b955b6fb175c92f3f294ab431f97a8827748d8,]87fbf4fa017a90b5ff819bcfca17fb52d6f6a790',]87a6e1ec4dd1df928541467296e4cf2a0f2df0c3b,]83cf2b3372ef98f7fa5caf94aa44e7262ee47519 -]802fed876e180f32c06ede4d1cc951ba44f79dd2<00>,]7edaa9cc255ba8e0938cb563110b204a4f393d60 -]7de4f6fddb11254d1fd5f8adfd67b6e0c9439eaa<00>,]7d7de228c501ef486534cca1829378eef8ef1081G,]78dec404a01664b35f3c740834597920186fbba7u,]78c295cfd7469cd3d494a48df7bd7748139e0660 <00> <0A>  <0B>
<EFBFBD><00>
 0x<07><06><05>^@<01><00>m ]<5D>/3<>'GGeee4e109fd92ea679600a61dd7d3428efa786a64parallel_generational_copying_garbage_collection_with_a_block_structured_heap.pdfgarbage_collection/parallel generational copying garbage collection with a block structured heap2017-09-06T01:52:30.9190681152017-09-06T01:52:30.919068115<EFBFBD>]w ]<5D>m1<6D>eGGm9d48eb6b89a9d7aa6feab3f6b2f57c70c1d9d18ftackling-the-awkward-squad-monadic-input-output-concurrency-exceptions-and-foreign-language-calls-in-haskell.pdflanguages/haskell/tackling the awkward squad monadic input output concurrency exceptions and foreign language calls in haskell2017-09-06T01:52:31.1086040042017-09-06T01:52:31.108604004<EFBFBD>v ]<5D>+1<>#GG5ac2852c69cc7bda25677129da011dec23fc3d77making-a-fast-curry-push-enter-versus-eval-apply-for-higher-order-languages.pdflanguages/haskell/making a fast curry push enter versus eval apply for higher order languages2017-09-06T01:52:31.1043149412017-09-06T01:52:31.104314941<EFBFBD>=u ]O1GGGw78dec404a01664b35f3c740834597920186fbba7a-poor-mans-concurrency-monad.pdflanguages/haskell/a poor mans concurrency monad2017-09-06T01:52:31.0730991212017-09-06T01:52:31.073099121<EFBFBD>[t ]m1eGG<00>2128052ca0319cdf9c9256eb52f26a23c6527094a-practical-optional-type-system-for-clojure.pdflanguages/clojure/a practical optional type system for clojure2017-09-06T01:52:31.0689699712017-09-06T01:52:31.068969971<EFBFBD>Zs ]k3cGG50404bd58e5f1edbd288cd69fcbc224485af415bfa-mathematical-theory-of-communication-1948.pdfinformation_theory/a mathematical theory of communication 19482017-09-06T01:52:31.0503640142017-09-06T01:52:31.050364014<EFBFBD>vr
]<5D>9{GG<01>e36073e9e5c97e0204050c0c316d87479f94974ethe-pagerank-citation-ranking-bringing-order-to-the-web.pdfinformation_retrieval/the pagerank citation ranking bringing order to the web2017-09-06T01:52:31.0264340822017-09-06T01:52:31.026434082<EFBFBD>#q ]19)GG<00>016f4930ad10f8097c42e5294b56d25bfb3c121fokapi-at-trec3.pdfinformation_retrieval/okapi at trec32017-09-06T01:52:31.0224780272017-09-06T01:52:31.022478027<EFBFBD>5p ]E9=EE<00>8eacd0f01ab0f53706561dda0ce8d1f96544a348graph_of_word_and_tw_idf.pdfinformation_retrieval/graph of word and tw idf2017-09-06T01:52:31.001635012017-09-06T01:52:31.00163501<EFBFBD>ko ]y9qGG<00>da731f99e05dd4f1fad1d21a1c6124efeb3bcf61authoritative-sources-in-a-hyperlinked-environment.pdfinformation_retrieval/authoritative sources in a hyperlinked environment2017-09-06T01:52:30.9729860842017-09-06T01:52:30.972986084<EFBFBD>>n ]O3GGG<01>18a74ae5e33b76a0528d0724d5c55a98dabe0b1fthe_lisp_ii_garbage_collector.pdfgarbage_collection/the lisp ii garbage collector2017-09-06T01:52:30.9695930182017-09-06T01:52:30.969593018<EFBFBD>l ]<5D>3<> GG<00>158d08ec7c2134382e20b44001903ad5b8a521b2incremental_mature_garbage_collection_using_the_train_algorithm.pdfgarbage_collection/incremental mature garbage collection using the train algorithm2017-09-06T01:52:30.8757519532017-09-06T01:52:30.875751953<EFBFBD>,k ]<5D>A'<27>9GG<01>5b0ccfcd8135c9599f8088443ed7de1874fa1c97why-students-engage-in-gaming-the-system-behavior-in-interactive-learning-environments.pdfgamification/why students engage in gaming the system behavior in interactive learning environments2017-09-06T01:52:30.8707141112017-09-06T01:52:30.870714111<EFBFBD>Xj ]o'gGG(612b437425a8077a832c27b7f4ec057143e87a8cgamification-in-education-what-how-why-bother.pdfgamification/gamification in education what how why bother2017-09-06T01:52:30.8676201172017-09-06T01:52:30.867620117<EFBFBD> i ]<5D>A<> GG<00>2db53cdcf4ba7c67321c022954c2b2be9c8a40bda-theoreticians-guide-to-the-experimental-analysis-of-algorithms.pdfexperimental_algorithmics/a theoreticians guide to the experimental analysis of algorithms2017-09-06T01:52:30.8639431152017-09-06T01:52:30.863943115<EFBFBD>}h ]<5D> 5<>GGxd0cb011908e333fe17309518249be05820b5239fzookeeper-wait-free-coordination-for-internet-scale-systems.pdfdistributed_systems/zookeeper wait free coordination for internet scale systems2017-09-06T01:52:30.8548469242017-09-06T01:52:30.854846924 <03><00>4p <0A> <0C> <0B>
fc<08><07>R<05><04><00>, <00>G<EFBFBD> ]Y1QGG<01>765e049036ca947af05fb5b4f29b9daf4b363558kvm-linux-virtual-machines-monitor.pdfoperating_systems/kvm linux virtual machines monitor2017-09-06T01:52:31.2237290042017-09-06T01:52:31.223729004<EFBFBD>#~ ];%3GG<01>97edc89b0a19e90e2123f22315b88aaf7033bb3atranscendence-of-pi.pdfmathematics/transcendence of pi2017-09-06T01:52:31.1579528812017-09-06T01:52:31.157952881<EFBFBD><1F> ]<5D>/1<>'GG<00>4b85765a808e4c29f05bc48a17a2dced1702db9dsolaris-zones-operating-system-support-for-consolidating-commercial-workloads.pdfoperating_systems/solaris zones operating system support for consolidating commercial workloads2017-09-06T01:52:31.2463830572017-09-06T01:52:31.246383057<EFBFBD>G<EFBFBD> ]Y1QGG9d4723308389e064389bc4e6aee46db5fc9b214eelive-migration-of-virtual-machines.pdfoperating_systems/live migration of virtual machines2017-09-06T01:52:31.2409990232017-09-06T01:52:31.240999023 <09><00> ]Y1QGG765e049036ca947af05fb5b4f29b9daf4b363558kvm-linux-virtual-machines-monitor.pdfoperating_systems/kvm linux virtual machines monitor2017-09-06T01:52:31.2237290042017-09-06T01:52:31.223729004<EFBFBD>K<EFBFBD> ]]1UGG<00>a659692ed5031c5410668d644a60d7806bb2efbbjails-confining-the-omnipotent-root..pdfoperating_systems/jails confining the omnipotent root.2017-09-06T01:52:31.2209240722017-09-06T01:52:31.220924072<EFBFBD>?<3F> ]K=CGG<00>c2eec09d057ce3b7277395e6820f38744e67fb97efficient-lock-free-b+trees.pdfnon_blocking_algorithms/efficient lock free b+trees2017-09-06T01:52:31.2175520022017-09-06T01:52:31.217552002<EFBFBD>+<2B> ]7=/GGK6995ac2e570960403c02250b02e64cafed8378fda-wait-free-stack.pdfnon_blocking_algorithms/a wait free stack2017-09-06T01:52:31.2134199222017-09-06T01:52:31.213419922<EFBFBD>\<5C> ]i=aGGxd5c3b8b3006fc4b24e770f028c938d4bcbd62695a-wait-free-queue-as-fast-as-fetch-and-add.pdfnon_blocking_algorithms/a wait free queue as fast as fetch and add2017-09-06T01:52:31.1810319822017-09-06T01:52:31.181031982<EFBFBD><0F> ]<5D>1<>GG<00>802fed876e180f32c06ede4d1cc951ba44f79dd2scatteralloc-massively-parallel-dynamic-memory-allocation-for-the-gpu.pdfmemory_management/scatteralloc massively parallel dynamic memory allocation for the gpu2017-09-06T01:52:31.1750900882017-09-06T01:52:31.175090088<EFBFBD>K ]]1UGG381c0200a69d43c6605079aaf73beace048b76a6making-lockless-synchronization-fast.pdfmemory_management/making lockless synchronization fast2017-09-06T01:52:31.1614980472017-09-06T01:52:31.161498047<00>];%3GG97edc89b0a19e90e2123f22315b88aaf7033bb3atranscendence-of-pi.pdfmathematics/transcendence of pi2017-09-06T01:52:31.1579528812017-09-06T01:52:31.157952881<EFBFBD>7} ]<5D>/a<>'GG2778e77ac46880d905d104d4f771fc5bb978a19eetoward-a-unified-theory-of-sparse-dimensionality-reduction-in-euclidean-space.pdfmachine_learning/dimensionality_reduction/toward a unified theory of sparse dimensionality reduction in euclidean space2017-09-06T01:52:31.1417380372017-09-06T01:52:31.141738037<EFBFBD>k| ]ea]GGB4ba0079fbfaf8a49f36f4e400f44c17b7f4552d4a-sparse-johnson-lindenstrauss-transform.pdfmachine_learning/dimensionality_reduction/a sparse johnson lindenstrauss transform2017-09-06T01:52:31.1365759282017-09-06T01:52:31.136575928<EFBFBD>{ ]<5D>9<> GGF9ed603d5743ef547a23578c5d50bd23069a6f2a8representing-game-dialogue-as-expressions-in-first-order-logic.pdflogic_and_programming/representing game dialogue as expressions in first order logic2017-09-06T01:52:31.1251411132017-09-06T01:52:31.125141113<EFBFBD>Wz ]e9]GG+a673b5ccb8fed1cb38edf75ead930569ba568c10on-the-meanings-of-the-logical-constants.pdflogic_and_programming/on the meanings of the logical constants2017-09-06T01:52:31.1213859862017-09-06T01:52:31.121385986<EFBFBD>Ay ]Q5IGG)d25c77b7d5f4b6742e63bc6f3b92ab220c833d23The-Early-History-Of-Smalltalk.pdflanguages/smalltalk/the early history of smalltalk2017-09-06T01:52:31.1162629392017-09-06T01:52:31.116262939<EFBFBD>Ix ]Y5QGGv8e1408e93d56b214a9018a7c13422715367a28beDesign-Principles-Behind-Smalltalk.pdflanguages/smalltalk/design principles behind smalltalk2017-09-06T01:52:31.1125568852017-09-06T01:52:31.112556885 <03><00>m<0E> <0A> <0C><01>
<EFBFBD> <09> <Gh<05><04><00><02><00><19> ]<5D>a<> GG<01>223b694fb70d4bd18ba0f4bd73ff3c6bc8f6370aray-integrating-rx-and-async-for-direct-style-reactive-streams.pdfparadigms/functional_reactive_programming/ray integrating rx and async for direct style reactive streams2017-09-06T01:52:31.3576730962017-09-06T01:52:31.357673096<EFBFBD>X<EFBFBD> ][OSGG<01>904014fb5cb22e8241c55e2fc6ae46288c5eebafequal-rights-for-functional-objects.pdfparadigms/functional_programming/equal rights for functional objects2017-09-06T01:52:31.2905620122017-09-06T01:52:31.290562012<EFBFBD>|<7C>
]<5D>=GG<01>eb654b2087706468fe3173c4b38b940be0c85722cognitive-computing-programming-paradigm-corelet-language.pdfparadigms/new_paradigms/cognitive computing programming paradigm corelet language2017-09-06T01:52:31.3619519042017-09-06T01:52:31.361951904 <0B> ]<5D>a<> GG223b694fb70d4bd18ba0f4bd73ff3c6bc8f6370aray-integrating-rx-and-async-for-direct-style-reactive-streams.pdfparadigms/functional_reactive_programming/ray integrating rx and async for direct style reactive streams2017-09-06T01:52:31.3576730962017-09-06T01:52:31.357673096<EFBFBD>S<EFBFBD> ]OaGEEce306d45aeb2d3f72055ce72ccbebd0ccb42cdf17functional-reactive-animation.pdfparadigms/functional_reactive_programming/functional reactive animation2017-09-06T01:52:31.352770022017-09-06T01:52:31.35277002<EFBFBD>=<3D> ]7a/GGd09ac606ba306a1bea91642deb2af0909360b038ffrp-in-plt-scheme.pdfparadigms/functional_reactive_programming/frp in plt scheme2017-09-06T01:52:31.3485300292017-09-06T01:52:31.348530029<EFBFBD>[<5B> ]UaMGG;d7341e40b11008965d60631953ad83e89aa40584deprecating-the observer-pattern.pdfparadigms/functional_reactive_programming/deprecating the observer pattern2017-09-06T01:52:31.3438310552017-09-06T01:52:31.343831055<EFBFBD>q<EFBFBD> ]kacGG5046034fe0cddda681ad9374d306fd27eec8b5fba-survey-of-functional-reactive-programming.pdfparadigms/functional_reactive_programming/a survey of functional reactive programming2017-09-06T01:52:31.3397109382017-09-06T01:52:31.339710938<EFBFBD>V<EFBFBD> ]YOQGGgc501a067498b94558da0e0510a4c29370388aee0why-functional-programming-matters.pdfparadigms/functional_programming/why functional programming matters2017-09-06T01:52:31.3357780762017-09-06T01:52:31.335778076<EFBFBD>W<EFBFBD> ][OSGGf6dce666a0f64f97f380f99cba7f14e24d5f54adorganizing-programs-without-classes.pdfparadigms/functional_programming/organizing programs without classes2017-09-06T01:52:31.3321979982017-09-06T01:52:31.332197998<EFBFBD>d<EFBFBD> ]gO_GG:59776eb2358b4be265e7dae9df4f946dab25bf6foptimal-purely-functional-priority-queues.pdfparadigms/functional_programming/optimal purely functional priority queues2017-09-06T01:52:31.3091499022017-09-06T01:52:31.309149902<EFBFBD><1A> ]<5D>O<>GG7fec6b29569eac1a340990bb07e90355efd2434ecfunctional-programming-with-bananas-lenses-envelops-and-barbed-wire.pdfparadigms/functional_programming/functional programming with bananas lenses envelops and barbed wire2017-09-06T01:52:31.3053930662017-09-06T01:52:31.305393066<00> ][OSGG904014fb5cb22e8241c55e2fc6ae46288c5eebafequal-rights-for-functional-objects.pdfparadigms/functional_programming/equal rights for functional objects2017-09-06T01:52:31.2905620122017-09-06T01:52:31.290562012<EFBFBD>r<EFBFBD> ]uOmGG$d238ce802f284a57bffb618af93d009457b8320bconcatenative-programming-an-overlooked-paradigm.pdfparadigms/functional_programming/concatenative programming an overlooked paradigm2017-09-06T01:52:31.2871809082017-09-06T01:52:31.287180908<EFBFBD>k<EFBFBD>
]uAmGGS30baa244b66e81d737ccf9f667c9bfca4f0c18f1common-ground-and-coordination-in-joint-activity.pdforganizational_simulation/common ground and coordination in joint activity2017-09-06T01:52:31.2818601072017-09-06T01:52:31.281860107<EFBFBD>3<EFBFBD> ]E1=GG<01>6980e1e551cadbde62454bedf5e1324032fa1e40unix-time-sharing-system.pdfoperating_systems/unix time sharing system2017-09-06T01:52:31.2750539552017-09-06T01:52:31.275053955<EFBFBD><0F> ]!1GG/f00e7c584731135892cb1bc133672a3d63d9e095therac.pdfoperating_systems/therac2017-09-06T01:52:31.2496850592017-09-06T01:52:31.249685059 `y <YA<04>% o
a<05> <09>e <0B> <0C>y<08>{Z<01><00><00>!<21>- ]31+GG4703d0b290a4ece50c17854ed72ecc808ce3e6f43shors_algorithm.pdfquantum_computing/shors algorithm2017-09-06T01:52:31.4922749022017-09-06T01:52:31.492274902<EFBFBD>J<EFBFBD>/ ]g_GGdd0854bf535d79d51104ae3d5c19c6ac7e562180macaroons-cookies-with-contextual-caveats.pdfsecurity/macaroons cooki<6B>\<5C># ]}uGGB557b1ec3182ccb3a902cc9904a443accb438842fprogramming-languages-application-and-interpretation.pdfplt/programming languages application and interpretation2017-09-06T01:52:31.4448588872017-09-06T01:52:31.444858887<EFBFBD>d<EFBFBD> ]w/oGG<00>6848895fe48b0ca3b0bc34c1bcdf66eb58e64308compiling-pattern-matching-to-good-decision-trees.pdfpattern_matching/compiling pattern matching to good decision trees2017-09-06T01:52:31.3808911132017-09-06T01:52:31.380891113<EFBFBD>^<5E> ]s/kEE>d62e2ae46b1cfac38357e6ce32bad7b36b0b49b4extensible-pattern-matching-extensible-language.pdfpattern_matching/extensible pattern matching extensible language2017-09-06T01:52:31.385614992017-09-06T01:52:31.38561499`<60><1D> ]91GGr30ef9946a1733c097d541ffaae8e95f0af862a08buridans-principle.pdfphysics/buridans principle2017-09-06T01:52:31.3951201172017-09-06T01:52:31.395120117<EFBFBD><<3C> ]O/GGGW997d371f1e063ff11e00fc6c0aef259558b92303warnings-for-pattern-matching.pdfpattern_matching/warnings for pattern matching2017-09-06T01:52:31.3900458982017-09-06T01:52:31.390045898<EFBFBD>V<EFBFBD> ]woGG94e8fc6068b6dff5a2a688f51c44ebfdd23f7e1acomposable-and-compilable-macros-you-want-it-when.pdfplt/composable and compilable macros you want it when2017-09-06T01:52:31.4100209962017-09-06T01:52:31.410020996F <09>]<5D> ]}uGG<00>c1350b1680d30a7bdcb9837bff2e0e8c40f9a92aon-understanding-types-data-abstraction-polymorphism.pdfplt/on understanding types data abstraction polymorphism2017-09-06T01:52:31.4347150882017-09-06T01:52:31.434715088<08><00> ]M/EGG3547ac839d02f6efe3f6f76a8289738a22528442aho-corasick-string-matching.pdfpattern_matching/aho corasick string matching2017-09-06T01:52:31.3737041022017-09-06T01:52:31.373704102<EFBFBD><1F>% ]?7GG"c0f83a70b1c225e7705c301e1106332819bff375propositions-as-types.pdfplt/propositions as types2017-09-06T01:52:31.4531369632017-09-06T01:52:31.453136963
Y
]s<15>S<EFBFBD>$ ]skGG<01>b615e2186f1982009d863f3f2f98909f2f7815abprogramming-with-algebraic-effects-and-handlers.pdfplt/programming with algebraic effects and handlers2017-09-06T01:52:31.4495920412017-09-06T01:52:31.449592041<EFBFBD>O<EFBFBD> ]ogGG<00>e186a8489dc6ab1c5dd30fc0501f7866d0c3d0f1fundamental-concepts-in-programming-languages.pdfplt/fundamental concepts in programming languages2017-09-06T01:52:31.4307548832017-09-06T01:52:31.430754883 , ]<5D>G<EFBFBD> ]c[GG<01>07ad71a8d82bf51e0b5d1d892aa6a10673a3b830on-the-electrodynamics-of-moving-bodies.pdfphysics/on the electrodynamics of moving bodies2017-09-06T01:52:31.4057028812017-09-06T01:52:31.405702881T ]?7EE708<30>:<3A> ]M/EGG<01>3547ac839d02f6efe3f6f76a8289738a22528442aho-corasick-string-matching.pdfpattern_matching/aho corasick string matching2017-09-06T01:52:31.3737041022017-09-06T01:52:31.373704102<EFBFBD><1C>! ]?7EE!70882fa7790685902d4d8b56ba08a361f6e74eb1predicate-dispatching.pdfplt/predicate dispatching2017-09-06T01:52:31.438357912017-09-06T01:52:31.43835791<EFBFBD>Q<EFBFBD>" ]qiGG<00>76e1cf37ae212298802799c2c3588030d20a769fprincipal-type-schemes-for-functional-programs.pdfplt/principal type schemes for functional programs2017-09-06T01:52:31.4420439452017-09-06T01:52:31.442043945<EFBFBD>a<EFBFBD> ]}uGG~b7741ea891833418cc888b38f9f529bdb86409a4on-the-attraction-of-two-perfectly-conducting-plates.pdfphysics/on the attraction of two perfectly conducting plates2017-09-06T01:52:31.3985969242017-09-06T01:52:31.398596924<01> ]c[GG07ad71a8d82bf51e0b5d1d892aa6a10673a3b830on-the-electrodynamics-of-moving-bodies.pdfphysics/on the electrodynamics of moving bodies2017-09-06T01:52:31.4057028812017-09-06T01:52:31.405702881<00> ]}uGGb7741ea891833418cc888b38f9f529bdb86409a4on-the-attraction-of-two-perfectly-conducting-plates.pdfphysics/on the attraction of two perfectly conducting plates2017-09-06T01:52:31.3985969242017-09-06T01:52:31.398596924
-<0F><0F>yL<0E><0E><0E>h: <0A> <0A> <0A> W *c <0C> <0C> <0C> t G  <0B> <0B> <0B> d 7
<EFBFBD>
<EFBFBD>
<EFBFBD>
U
( <09>5 <09> <09> s F <08><08><08>-]f55238913918c61b0dad87974699d05a5d71e709<00>-]f4b381f4482586dbdd15fc92bee81ce68bcb6898<00>-]dd0854bf535d79d51104ae3d5c19c6ac7e562180<00>-]fec6b29569eac1a340990bb07e90355efd2434ec<00>,]fe0ae75e97abe2686e6bc8cbe94bfd08934e36da,]fd443b2ce70c48202ba26cbc6caa471ae262e270@,]fc11031895c302dc52404d34de58af1a72f3b817g,]fb2db075fa0230289a4f05caf2127b95fcc9aa9c
-]f6dce666a0f64f97f380f99cba7f14e24d5f54ad<00>,]f52e7afce70597024c3be7df105185dd59a2c8e6A,]f5222809526d8a419a1752547880ba0a9013a8ca,]f3485e24d796c33f11048f74e447853ef4a6dc53c,]f3050b5586ddfec5da0d719338a6afa8b166985bP,]f1948a2d5dc8745f725e3ba0b24e14847778cb19&,]f16c6ce0c7eabd4f5896962335879b3932138e52S,]f06554b06ac49f129086c8889690faaa761398bb5-]f00e7c584731135892cb1bc133672a3d63d9e095<00>,]eee4e109fd92ea679600a61dd7d3428efa786a64m,]eecf3aaa6aadf48778bb1daa6b09d011632b9f55*-]eb654b2087706468fe3173c4b38b940be0c85722<00>,]e95ecb39639ce118c7ddd5bd7892378eacdd105f!,]e76af50e96b12fc507e73b025fe9da4a99600af9,]e51582689653f238029d984cd1780c93ef672771/-]e437aad09eb0508f015c4615e3a9c738bdee9fdf<00>,]e36073e9e5c97e0204050c0c316d87479f94974er-]e306d45aeb2d3f72055ce72ccbebd0ccb42cdf17<00>,]e2e60f19214efaa7d842b4a3b3b322964bf78dc7,]e1ac8e8d810a148dc3f5291795b0ac0b114db824_-]e186a8489dc6ab1c5dd30fc0501f7866d0c3d0f1<00>,]daf38d927e2b21c885efdb4b2cc46a2d9f47d679:,]da731f99e05dd4f1fad1d21a1c6124efeb3bcf61o-]d7341e40b11008965d60631953ad83e89aa40584<00>,]d65e79756ac6817d4780286045a35d34aaaaf836=-]d62e2ae46b1cfac38357e6ce32bad7b36b0b49b4<00>,]d62de5f995164fff50f5ce61c0113f6bc9f04225-]d5c3b8b3006fc4b24e770f028c938d4bcbd62695<00>-]d4723308389e064389bc4e6aee46db5fc9b214ee<00>,]d25c77b7d5f4b6742e63bc6f3b92ab220c833d23y-]d238ce802f284a57bffb618af93d009457b8320b<00>,]d14dee375bc275d08b09e5b7d420c28a5ef6b47a]-]d0d8b7501d7f75613d5493d706d6d81852a73d6e<00>,]d0cb011908e333fe17309518249be05820b5239fh,]ce8411564f95396b503868217469e2aaf1b996c9,]cb4710f77feed90ae01b332c492853a5b20e2c7d ,]ca9ccbcf4a8440590a81f94295a22386a422d198\
<EFBFBD> ! ( !<0E> } <0C> <0B>
9<00><14>1 ]<5D>%/<2F>GGQf4b381f4482586dbdd15fc92bee81ce68bcb68982014-ssac-pointwise-predicting-points-and-valuing-decisions-in-real-time.pdfsports_analytics/2014 ssac pointwise predicting points and valuing decisions in real time2017-09-06T01:52:31.5071240232017-09-06T01:52:31.507124023<EFBFBD> <0B>6 ]#%GGC59a968fa431e7117aa11005ed98ab39f1efddc30ts-asap.pdftime_series/ts asap2017-09-06T01:52:31.5280520022017-09-06T01:52:31.528052002R` ]a%YGG1396a6cd134a7f41eeb1e5d4ca8d4edf6edfc432operators-on-inhomogeneous-time-series.pdft<66>,<2C>0 ]G?GG<01>b68ff86ce8591931d3bef1294f8b46dae63780adsok-eternal-war-in-memory.pdfsecurity/sok eternal war in memory2017-09-06T01:52:31.5040910642017-09-06T01:52:31.504091064<EFBFBD>I<EFBFBD>5 ]a%YGG1396a6cd134a7f41eeb1e5d4ca8d4edf6edfc432operators-on-inhomogeneous-time-series.pdftime_series/operators on inhomogeneous time series2017-09-06T01:52:31.5245820312017-09-06T01:52:31.524582031<EFBFBD>T<EFBFBD>4 ]g1_GGL8004558792c00764d173dc63c03d3a391acfe6b7systematic-review-in-software-engineering.pdfsystematic_review/systematic review in software engineering2017-09-06T01:52:31.5210300292017-09-06T01:52:31.521030029<EFBFBD><EFBFBD>3 ]<5D>7<>EEVf55238913918c61b0dad87974699d05a5d71e709An-Elementary-Proof-of-a-Theorem-of-Johnson-and-Lindenstrauss.pdfsublinear_algorithms/an elementary proof of a theorem of johnson and lindenstrauss2017-09-06T01:52:31.518127932017-09-06T01:52:31.51812793<EFBFBD>N<EFBFBD>2 ]]7UGGXa5c83733c6abcd1a089bed36cf2ef38577ec55211985-Flajolet-Probabilistic-counting.pdfsublinear_algorithms/1985 flajolet probabilistic counting2017-09-06T01:52:31.5128391112017-09-06T01:52:31.512839111<00> ]G?GGb68ff86ce8591931d3bef1294f8b46dae63780adsok-eternal-war-in-memory.pdfsecurity/sok eternal war in memory2017-09-06T01:52:31.5040910642017-09-06T01:52:31.504091064 <02>//k<00> <0C> <0B>
) p <0A><01>F<06><05>$j<03>/<00>G
a<>+GGhttps://github.com/ibab/tensorflow-wavenet[Python] Implementation with the TensorFlow Machine Intelligence libraryaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>}
u<>GG<00>http://www.cse.psu.edu/~duo114/pubs/octeau-sec13.pdfEffective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysisandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062<EFBFBD>k <02>!<21>=GG<00>http://airesearch.com/wp-content/uploads/2016/01/deepmind-mastering-go.pdfMastering the Game of Go with Deep Neural Networks and Tree Searchartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<08><00>a<>+GGhttps://github.com/ibab/tensorflow-wavenet[Python] Implementation with the TensorFlow Machine Intelligence libraryaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>8
W<> +GG<00>https://github.com/basveeling/wavenet[Python] Implementation with the Keras Neural Networks libraryaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>7
<02>W+GG<00>https://deepmind.com/blog/wavenet-generative-model-raw-audio/Announcement and interactive examplesaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>  U_+GG https://arxiv.org/pdf/1609.03499.pdfWaveNet: A Generative Model for Raw Audioaudio_comp_sci/2017-09-06T01:52:31.6513640142017-09-06T01:52:31.651364014<EFBFBD>; e[UGGmhttp://ftp.cs.ucla.edu/pub/stat_ser/r360.pdfThe algorithmization of counterfactualsartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>> mYUGG=http://ftp.cs.ucla.edu/pub/stat_ser/R218-B-L.pdfCausal diagrams for empirical researchartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>: uIUGG~http://ftp.cs.ucla.edu/pub/stat_ser/r156-reprint.pdfA theory of inferred causationartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105<EFBFBD>\
c<>UGGShttp://ftp.cs.ucla.edu/pub/stat_ser/r30.pdfReverend Bayes on inference engines: A distributed hierarchical approachartificial_intelligence/judea_pearl/2017-09-06T01:52:31.6494331052017-09-06T01:52:31.649433105 m<00>W#=GGhttp://bayes.cs.ucla.edu/jp_home.htmlJudea Pearlartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>6 yU=GGDhttp://www.csee.umbc.edu/courses/471/papers/turing.pdfComputing Machinery and Intelligenceartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>T <01> <0B>{=GG"https://github.com/papers-we-love/papers-we-love/blob/master/artificial_intelligence/3-bayesian-network-inference-algorithm.pdfAnalysis of Three Bayesian Network Inference Algorithms: Variable Elimination, Likelihood Weighting, and Gibbs Samplingartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD> <01>'<27>Q#GG_https://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdfArchitectural Styles and the Design of Network-based Software Architectures (REST) by Roy Fieldingapi_design/2017-09-06T01:52:31.5847519532017-09-06T01:52:31.584751953<EFBFBD>g
g<>gGG}http://www.bodden.de/pubs/far+14flowdroid.pdfFlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Appsandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062nu<>GGhttp://www.cse.psu.edu/~duo114/pubs/octeau-sec13.pdfEffective Inter-Component Communication Mappi<70>  W#=GGhttp://bayes.cs.ucla.edu/jp_home.htmlJudea Pearlartificial_intelligence/2017-09-06T01:52:31.6119580082017-09-06T01:52:31.611958008<EFBFBD>A
<02> uGG<00>https://www.eecs.berkeley.edu/~daw/papers/intents-mobisys11.pdfAnalyzing Inter-Application Communication in Androidandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062<EFBFBD>N
<01>+qGGhttp://blog.sei.cmu.edu/post.cfm/secure-coding-tools-analyzing-android-apps-118Two Secure Coding Tools for Analyzing Android Appsandroid/2017-09-06T01:52:31.5821640622017-09-06T01:52:31.582164062 <02> <0C>7H *P? 1
@ #<01>f<04>8q<00>D'
<00>e1GGhttp://www.cs.northwestern.edu/~ago820/cs395/Papers/Phong_1975.pdfIllumination for computer generated picturescomputer_graphics/201<30>a
e<>)QGG+http://www.turingarchive.org/browse.php/B/12Turing, On computable numbers, with an application to the Entscheidungsproblemcomp_sci_fundamentals_and_history/2017-09-06T01:52:31.7410759282017-09-06T01:52:31.741075928<EFBFBD>J
a<>9GGhttp://barroso.org/publications/isca00.pdfPiranha: A Scalable Architecture Based on Single-Chip Multiprocessingcomputer_architecture/2017-09-06T01:52:31.8027260742017-09-06T01:52:31.802726074]<00><00><17>'GGhttp://www.cs.duke.edu/courses/cps296.4/spring04/papers/Adleman94.pdfMolecular Computation of Solutions to Combinatoria<69>U <02><17>'GG<00>http://www.cs.duke.edu/courses/cps296.4/spring04/papers/Adleman94.pdfMolecular Computation of Solutions to Combinatorial Problemsbiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934z M'GGhttp://en.wikipedia.org/wiki/Pcrwikipediabiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934<EFBFBD>O!
<02>o1GG<00>https://www.cs.drexel.edu/~david/Classes/CS586/Papers/p343-whitted.pdfAn Improved Illumination Model for Shaded Displaycomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951 <00><13><>g <02><13>#1GG<00>http://graphics.stanford.edu/papers/stabilization/karpenko_gyro.pdfDigital Video Stabilization and Rolling Shutter Correction using Gyroscopescomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>>
Y<>#GG>http://www.vldb.org/conf/1994/P439.PDF2Q: A Low Overhead High Performance Buffer Management Replacement Algorithmcaching/2017-09-06T01:52:31.7067800292017-09-06T01:52:31.706780029
<00>w<EFBFBD>?GGhttp<74> <02>w<EFBFBD>?GG<00>https://www.researchgate.net/publication/220080099_MEXICA_A_computer_model_of_a_cognitive_account_of_creative_writingMEXICA: a computer model of a cognitive account of creative writing.computational_creativity/2017-09-06T01:52:31.7775778812017-09-06T01:52:31.777577881<EFBFBD>K <01><0F>GG;http://adam.chlipala.net/papers/SqlcachePOPL17/SqlcachePOPL17.pdfA Program Optimization for Automatic Database Result Cachingcaching/2017-09-06T01:52:31.7067800292017-09-06T01:52:31.706780029<EFBFBD>y
<01>UiQGG/http://www.ams.org/journals/tran/1965-117-00/S0002-9947-1965-0170805-7/S0002-9947-1965-0170805-7.pdfOn the Computational Complexity of Algorithimscomp_sci_fundamentals_and_history/2017-09-06T01:52:31.7410759282017-09-06T01:52:31.741075928 i7<>)QGGhttps://www.cs.virginia.edu/~robins/Turing<6E>n
<>)QGG+https://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdfTuring, On computable numbers, with an application to the Entscheidungsproblemcomp_sci_fundamentals_and_history/2017-09-06T01:52:31.7410759282017-09-06T01:52:31.741075928<EFBFBD>b
<02>;k9GGhttp://gatekeeper.dec.com/ftp/pub/dec/SRC/publications/broder/positano-final-wpnums.pdfOn the resemblance and containment of documentsclustering_algorithms/2017-09-06T01:52:31.7385490722017-09-06T01:52:31.738549072<EFBFBD>D
<02>)S'GG<00>https://homes.cs.washington.edu/~luisceze/publications/dnastorage-asplos16.pdfA DNA-Based Archival Storage Systembiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934<EFBFBD>  a''GG<00>http://www.youtube.com/watch?v=2KoLnIwoZKUa short videobiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934<00><00>%<25> GGhttps://github.com/papers-we-love/papers-we-love/blob/master/caching/a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdfAn O(1) algorithm for implementing the <20> <02>%<25> GG https://github.com/papers-we-love/papers-we-love/blob/master/caching/a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdfAn O(1) algorithm for implementing the LFU cache eviction schemecaching/2017-09-06T01:52:31.7067800292017-09-06T01:52:31.706780029<EFBFBD>5
<02> S'GG<00>http://www.dna.caltech.edu/courses/cs191/paperscs191/turing.pdfThe chemical basis of morphogenesisbiocomputing/2017-09-06T01:52:31.6736069342017-09-06T01:52:31.673606934 <03><00>Q <06>O<04><00>  <0C><01>5
s q ^ <09>}<05><02><01>9<00>S<
q<>/%GGhttp://sigops.org/sosp/sosp13/papers/p33-david.pdfEverything You Always Wanted to Know About Synchronization but Were Afraid to Askc<6B><(
<02>)91GG<00>http://www.cs.rpi.edu/~cutler/classes/advancedgraphics/S08/lectures/kajiya.pdfThe Rendering Equationcomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>q+ <01><15>71GGIhttp://research.microsoft.com/pubs/155416/kinectfusion-uist-comp.pdfKinectFusion: Real-time 3D Reconstruction and Interaction Using a Moving Depth Cameracomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>O1 <01><01>1GGhttp://research.microsoft.com/en-us/um/people/cohen/bs.pdfInteractive Horizon Mapping: Shadows for bump-mapped surfacescomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>% c1GGhttps://www.youtube.com/watch?v=HScYuRhgEJwVideocomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951,<00>e1GGhttp://www.cs.northwestern.edu/<2F>F'
<02>e1GGhttp://www.cs.northwestern.edu/~ago820/cs395/Papers/Phong_1975.pdfIllumination for computer generated picturescomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>Z&
<01>IW1GGhttp://page.mi.fu-berlin.de/block/htw-lehre/wise2015_2016/bel_und_rend/skripte/gouraud1971.pdfContinuous shading of curved surfacescomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>g2 <01>%<25>1GGYhttp://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdfInterior Mapping: A new technique for rendering realistic buildingscomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951|$ A%1GGRhttp://gigavoxels.imag.fr/Project pagecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951
k?<00><05>%1GGhttp://maverick.inria.fr/Publications/2009/CNLE09<30>a" <02><05>%1GG<00>http://maverick.inria.fr/Publications/2009/CNLE09/CNLE09.pdfGigaVoxels : Ray-Guided Streaming for Efficient and Detailed Voxel Renderingcomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>b,
<01>3}1GGehttp://www.cs.tau.ac.il/~dcor/articles/2013/3-Sweep-Extracting-Editable-Objects.pdf3-Sweep: Extracting Editable Objects from a Single Photocomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD># q1GGFhttp://maverick.inria.fr/Publications/2009/CNLE09/Web pagecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>;0
<01>]1GGChttp://www.crytek.com/download/Light_Propagation_Volumes.pdfLight Propagation Volumes in CryEngine 3computer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951
<EFBFBD>w<15>- c1GGhttps://www.youtube.com/watch?v=Oie1ZXWceqMVideocomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951 <0A>uU?1GGhttps://arxiv.org/pdf/1703.07511.pdfDeep Photo Style Transfercomputer_graphics/2017-09-06T01:52:31.805699<EFBFBD>. U?1GG
https://arxiv.org/pdf/1703.07511.pdfDeep Photo Style Transfercomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>:)
<02>I1GGhttp://research.microsoft.com/en-us/um/people/hoppe/poissonrecon.pdfPoisson surface reconstructioncomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>*
<01>1GGyhttp://www.cs.jhu.edu/~misha/Code/PoissonRecon/Version5.71/Codecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>/ w1GGyhttps://github.com/luanfujun/deep-photo-styletransferCodecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<00>1GGhttp://www.cs.jhu.edu/~misha/Code/PoissonRecon/Version5.71/Codecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>8)
<00>I1GGhttp://research.microsoft.com/en-us/um/people/hoppe/poissonrecon.pdfPoisson surface reconstructioncomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<00><00>)91GGhttp://www.cs.rpi.edu/~cutler/classes/advancedgraphics/S08/lectures/kajiya.pdfThe Rendering Equationcomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951
;<00><0F>i.<0E><0E><0E>o@ <0A> . <0C> <0C> j  <0B> _ 
<EFBFBD>
h
$ <09> <09> _ !<08><08>r+<07><07>vK<06> <05><05>v/
<04><04>[<03><03>U%<02><00><02>F'<01><01>K<00><00>)Uhttp://futuredata.stanford.edu/asap/6ohttp://home.pipeline.com/~hbaker1/NoMotionGC.html<00>W<04>/http://haskell.cs.yale.edu/wp-content/uploads/2012/08/Winograd-Cort-Wormholes.pdf<00>K<04>http://haskell.cs.yale.edu/wp-content/uploads/2011/02/workshop-02.pdf<00>F<04> http://haskell.cs.yale.edu/wp-content/uploads/2011/02/rt-frp.pdf<00>H<04>http://graphics.stanford.edu/papers/stabilization/karpenko_gyro.pdf Ahttp://gigavoxels.imag.fr/$\<04>;http://gatekeeper.dec.com/ftp/pub/dec/SRC/publications/broder/positano-final-wpnums.pdfP<04>!http://gamification-research.org/wp-content/uploads/2011/04/12-Gerling.pdf<00>0ehttp://ftp.cs.ucla.edu/pub/stat_ser/r360.pdf /chttp://ftp.cs.ucla.edu/pub/stat_ser/r30.pdf
8uhttp://ftp.cs.ucla.edu/pub/stat_ser/r156-reprint.pdf 4mhttp://ftp.cs.ucla.edu/pub/stat_ser/R218-B-L.pdf >http://frenchy64.github.io/papers/typed-clojure-draft.pdf<00>X<04>3http://faculty.salisbury.edu/~xswang/Research/Papers/SERelated/no-silver-bullet.pdfj9uhttp://erlang.org/download/armstrong_thesis_2003.pdf<00>E<04> http://eprints.eemcs.utwente.nl/7281/01/db-utwente-40501F46.pdf<00>._http://en.wikipedia.org/wiki/Suffix_array$Mhttp://en.wikipedia.org/wiki/PcrF<04> http://en.wikipedia.org/wiki/Moving_magnet_and_conductor_problem<00>5ohttp://en.wikipedia.org/wiki/HOL_(proof_assistantB8shttp://en.wikipedia.org/wiki/Empirical_algorithmics<00>:whttp://eb.host.cs.st-andrews.ac.uk/drafts/effects.pdf<00>x<04>qhttp://dl.dropboxusercontent.com/u/220532/MindTrek_Gamification_PrinterReady_110806_SDE_accepted_LEN_changes_1.pdf<00>t<04>khttp://diyhpl.us/~bryan/papers2/distributed/distributed-systems/zab.totally-ordered-broadcast-protocol.2008.pdfm<{http://dig.cs.illinois.edu/papers/lambdaRefactoring.pdf<00>*Whttp://ddg.jaist.ac.jp/pub/HDY+04.pdf<00>M<04>http://db.disi.unitn.eu/pages/VLDBProgram/pdf/industry/p871-curtiss.pdf<00>3ihttp://davidsjohnson.net/papers/experguide.pdf<00>2ghttp://cseweb.ucsd.edu/~vahdat/papers/mop.pdf<00>F<04>http://cs.yale.edu/homes/thomson/publications/calvin-sigmod12.pdfU8uhttp://cs.brown.edu/~mph/HerlihyW90/p463-herlihy.pdfr=http://cs.brown.edu/courses/csci2370/2000/1999/cabral.pdf67qhttp://cs.au.dk/~hosc/local/LaSC-4-3-pp223-242.pdf<00>=http://cs-www.cs.yale.edu/homes/dna/papers/vll-vldb13.pdfZF<04>http://cs-www.cs.yale.edu/homes/dna/papers/determinism-vldb10.pdfW@<04>http://cs-www.cs.yale.edu/homes/dna/papers/abadi-pacelc.pdfX<{http://conal.net/papers/push-pull-frp/push-pull-frp.pdf<00>C<04>http://community.haskell.org/~simonmar/papers/parallel-gc.pdf<00>E<04> http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.524<00>X<04>1http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.9333&rep=rep1&type=pdf<00>W<04>1http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.21.2707&rep=rep1&type=pdfhX<04>3http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.161.6751&rep=rep1&type=pdf[X<04>1http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.9460&rep=rep1&type=pdfX<04>3http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.1302&rep=rep1&type=pdf>8uhttp://cidrdb.org/cidr2015/Papers/CIDR15_Paper16.pdfO1ehttp://chaoran.me/assets/pdf/wfq-ppopp16.pdf<00>X<04>1http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdfS<04>+ http://blog.sei.cmu.edu/post.cfm/secure-coding-tools-analyzing-android-apps-118<31><04>%http://bitsavers.informatik.uni-stuttgart.de/pdf/xerox/parc/techReports/CSL-89-1_Epidemic_Algorithms_for_Replicated_Database_Maintenance.pdf<00>)Whttp://bayes.cs.ucla.edu/jp_home.html.ahttp://barroso.org/publications/isca00.pdf;yhttp://asc.di.fct.unl.pt/~jleitao/pdf/dsn07-leitao.pdf<00>$Khttp://arxiv.org/abs/1507.02988<00>#Ihttp://arxiv.org/abs/1004.4240<00>9uhttp://anil.recoil.org/papers/2013-asplos-mirage.pdf<00>:whttp://algo.inria.fr/flajolet/Publications/FlMa85.pdf O<04>!http://airesearch.com/wp-content/uploads/2016/01/deepmind-mastering-go.pdf F<04>http://adam.chlipala.net/papers/SqlcachePOPL17/SqlcachePOPL17.pdf
<00>7<00><00><0F><0F>C<0E><0E>z - <0A> <0A> z C  <0C> <0C>X = <0B><02> <0B> D
<EFBFBD>
<EFBFBD>
<EFBFBD>
=
<09> <09> ^ <08><08>t2<07><07>b"<06><06>0<05>~4<04><04>c<03><03>~@ <02>L<00><00>2ihttp://user.it.uu.se/~kostis/Papers/esca=}http://homes.cs.washington.edu/~pedrod/papers/cacm12.pdf<00>http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/43438.pdfq_<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41378.pdfu_<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41344.pN<04>http://lafo.ssw.uni-linz.ac.at/papers/2013_Onward_OneVMToRuleThemAll.pdf8shttp://ordiecole.com/squeak/cardelli_squeak1985.pdf>http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2082788uhttp://sites.computer.org/debull/A13june/calvin1.pdfY6qhttp://sigops.org/sosp/sosp13/papers/p33-david.pdf<=http://sigops.org/sosp/sosp13/papers/p151-mashtizadeh.pdf{3khttp://shapegrammar.org/ifip/SGBestPapers72.pdf7=http://shapegrammar.org/8?<04>http://scg.unibe.ch/archive/papers/Duca06bTOPLASTraits.pdfkS<04>'http://researcher.watson.ibm.com/researcher/files/us-bacon/Bacon12AndThen.pdf<00>F<04> http://research.microsoft.com/pubs/80693/vl2-sigcomm09-final.pdf<00>D<04> http://research.microsoft.com/pubs/79348/presto27-greenberg.pdfiD<04> http://research.microsoft.com/pubs/255833/IronFleet-twocol.pdf<00>I<04>http://research.microsoft.com/pubs/155416/kinectfusion-uist-comp.pdf+a<04>Chttp://research.microsoft.com/en-us/um/people/simonpj/papers/history-of-haskell/history.pdf<00>O<04>!http://research.microsoft.com/en-us/um/people/lamport/pubs/time-clocks.pdf=R<04>%http://research.microsoft.com/en-us/um/people/lamport/pubs/lamport-paxos.pdf<00>I<04>http://research.microsoft.com/en-us/um/people/hoppe/poissonrecon.pdf)T<04>)http://research.microsoft.com/en-us/um/people/fournet/papers/join-tutorial.pdf<00>?<04>http://research.microsoft.com/en-us/um/people/cohen/bs.pdf1C<04> http://research.microsoft.com/apps/pubs/default.aspx?id=210931w5ohttp://research.google.com/pubs/archive/41684.pdfvU<04>+http://repository.upenn.edu/cgi/viewcontent.cgi?article=1162&context=cis_papers<00>A<04>http://rd.springer.com/content/pdf/10.1007%2FBF00994018.pdf<00>;http://racket-lang.org/<00>Q<04>%http://publications.lib.chalmers.se/records/fulltext/125252/local_125252.pdf@3ihttp://plosworkshop.org/2013/preprint/kell.pdf<00>F<04>http://peterwonka.net/Publications/pdfs/2014.SG.Lipp.PushPull.pdf5>http://people.seas.harvard.edu/~chong/pubs/pldi13-elm.pdf<00>2ghttp://people.inf.elte.hu/center/fulltext.pdf<00>8shttp://people.ee.duke.edu/~lcarin/Lihan4.21.06a.pdf<00>3khttp://people.csail.mit.edu/rivest/Rsapaper.pdfGC<04> http://people.csail.mit.edu/matei/papers/2013/sosp_sparrow.pdf~8shttp://people.csail.mit.edu/jrb/Projects/dexprs.pdf<00>A<04>http://people.cs.umass.edu/~emery/pubs/berger-asplos2000.pdftG<04>http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_sigcomm.pdfoT<04>)http://pdf.aminer.org/000/465/194/incremental_collection_of_mature_objects.pdf<00>J<04>http://patrickthomson.ghost.io/an-introduction-to-recursion-schemes/<00>X<04>3http://pages.cs.wisc.edu/~remzi/Classes/739/Spring2004/Papers/optimistic-survey.pdfgc<04>Ihttp://page.mi.fu-berlin.de/block/htw-lehre/wise2015_2016/bel_und_rend/skripte/gouraud1971.pdf&@<04>http://orbit.dtu.dk/files/102419168/abstract_ELB_trees.pdf<00>-_http://notes.stephenholiday.com/Kafka.pdfp2ihttp://nms.lcs.mit.edu/papers/ron-sosp2001.pdf|6ohttp://msl.cs.uiuc.edu/~lavalle/papers/Lav98c.pdf9whttp://mcg.cs.tau.ac.il/papers/disc2008-hopscotch.pdfTA<04>http://maverick.inria.fr/Publications/2009/CNLE09/CNLE09.pdf"6qhttp://maverick.inria.fr/Publications/2009/CNLE09/#L<04>http://luthuli.cs.uiuc.edu/~daf/courses/Signals%20AI/Papers/HMMs/0.pdf5ohttp://kowshik.github.io/JPregel/pregel_paper.pdfzG<04>http://jeffreymbradshaw.net/publications/Common_Ground_Single.pdf<00>J<04>http://infoscience.epfl.ch/record/83409/files/neg--1184036295all.pdf<00>?<04>http://infoscience.epfl.ch/record/169879/files/RMTrees.pdfR6ohttp://ilpubs.stanford.edu:8090/422/1/1999-66.pdf<00>E<04> http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5350749<00> d '<07> E<06> <0C> <0B><05>

<EFBFBD>D 7C<03>Id<00>bD <02> <09>/%GG<00>http://www.cs.rochester.edu/~scott/papers/1996_PODC_queues.pdfSimple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithmsconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>5C {i%GG[https://people.eecs.berkeley.edu/~brewer/cs262/Mesa.pdfExperience with Processes and Monitors in Mesaconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>B o%GG<00>http://en.wikipedia.org/wiki/HOL_(proof_assistantHOLconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>7A us%GG]http://www.cl.cam.ac.uk/~pes20/weakmemory/popl09.pdfThe Semantics of x86-CC Multiprocessor Machine Codeconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>Y@ <01>%<25>%GGkhttp://publications.lib.chalmers.se/records/fulltext/125252/local_125252.pdfFinding Race Conditions in Erlang with QuickCheck and PULSEconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>'? i_%GGhttp://user.it.uu.se/~kostis/Papers/escape.pdfMessage Analysis for Concurrent Languagesconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>m9
<02>K}-GG<00>http://www.disneyresearch.com/project/coupled-3d-reconstruction-of-sparse-facial-hair-and-skin/Coupled 3D Reconstruction of Sparse Facial Hair and Skincomputer_vision/2017-09-06T01:52:31.8064370122017-09-06T01:52:31.806437012<EFBFBD>D6 w1GG#http://cs.brown.edu/courses/csci2370/2000/1999/cabral.pdfImaging Vector Fields Using Line Integral Convolutioncomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>A4
<01>951GG http://www.peterwonka.net/Publications/pdfs/2003.SG.Wonka.InstantArchitecture.high.pdfInstant Architecturecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>T<
q<>/%GG http://sigops.org/sosp/sosp13/papers/p33-david.pdfEverything You Always Wanted to Know About Synchronization but Were Afraid to Askconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941 & os-GG<47>[3
<02>SM1GG<00>http://www.peterwonka.net/Publications/pdfs/2006.SG.Mueller.ProceduralModelingOfBuildings.final.pdfProcedural Modeling of Buildingscomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>c:
<02>As-GG<00>http://www.disneyresearch.com/project/high-quality-single-shot-capture-of-facial-geometry/High-Quality Single-Shot Capture of Facial Geometrycomputer_vision/2017-09-06T01:52:31.8064370122017-09-06T01:52:31.806437012<EFBFBD>9; os-GG<00>http://www.sci.utah.edu/~bsumma/projects/weaving/Panorama Weaving:
Fast and Flexible Seam Processingcomputer_vision/2017-09-06T01:52:31.8064370122017-09-06T01:52:31.806437012}8 =-1GGhttp://shapegrammar.org/shapegrammar.orgcomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951 <0A>k<>1GGhttp://shapegramma<6D>#5
<02>!1GG<00>http://peterwonka.net/Publications/pdfs/2014.SG.Lipp.PushPull.pdfPushPull++computer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951<EFBFBD>O7
k<>1GGlhttp://shapegrammar.org/ifip/SGBestPapers72.pdfShape Grammars and the Generative Specification of Painting and Sculpturecomputer_graphics/2017-09-06T01:52:31.8056999512017-09-06T01:52:31.805699951z<00>!1GGhttp://peterwonka.net/Publications/pdfs/2014.SG.Lipp.PushPull.pdfPushPull++computer_graphics/2017-09-06T01:52<35>f> <01>3<EFBFBD>%GG$http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.1302&rep=rep1&type=pdfHeap Architectures For Concurrent Languages Using Message Passingconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>]= <02>!<21> %GG<00>http://research.microsoft.com/en-us/um/people/lamport/pubs/time-clocks.pdfTime, Clocks, and the Ordering of Events in a Distributed Systemconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941 <2 P2<07><06>
O<04>3<02><01>M<0E> <0A>  n <0B>G<04>OG
k<>''GG<00>http://people.csail.mit.edu/rivest/Rsapaper.pdfA Method for Obtaining Digital Signatures and Public-Key Cryptosystems (1977)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>bQ <02><01>/-GG<00>http://www.research.ibm.com/people/m/michael/podc-1996.pdfSimple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithmsdata_structures/2017-09-06T01:52:31.8085471192017-09-06T01:52:31.808547119<EFBFBD>$P
<01>3-GG3http://www.csd.uoc.gr/~hy460/pdf/Dynamic%20Hash%20Tables.pdfDynamic Hash Tablesdata_structures/2017-09-06T01:52:31.8085471192017-09-06T01:52:31.808547119<EFBFBD>)O uK/GG<00>http://cidrdb.org/cidr2015/Papers/CIDR15_Paper16.pdfImmutability Changes Everythingdata_replication/2017-09-06T01:52:31.8081188962017-09-06T01:52:31.808118896 <09><00><07>%GGhtt<74>7R
<02>[-GG<00>http://infoscience.epfl.ch/record/169879/files/RMTrees.pdfRRB-Trees: Efficient Immutable Vectorsdata_structures/2017-09-06T01:52:31.8085471192017-09-06T01:52:31.808547119<EFBFBD>;M
<01>e'GGnhttp://www.cs.bell-labs.com/who/dmr/pdfs/shannoncryptshrt.pdfA Mathematical Theory of Cryptography (1945)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>L U/'GG<00>https://eprint.iacr.org/2016/461.pdfNTRU Prime (2016)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>8K ym'GG<00>http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdfThe Moral Character of Cryptographic Work (2015)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>RJ <02><05>'GG<00>http://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdfRSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (2013)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>-I {W'GG-http://www-ee.stanford.edu/~hellman/publications/24.pdfNew Directions in Cryptography (1976)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>>H {y'GGchttps://crypto.stanford.edu/~dabo/papers/RSA-survey.pdfTwenty Years of Attacks on the RSA Cryptosystem (1999)cryptography/2017-09-06T01:52:31.8072980962017-09-06T01:52:31.807298096<EFBFBD>JF
<01>'g#GGhhttps://www.usenix.org/legacy/event/osdi04/tech/full_papers/candea/candea.pdfMicroreboot -- A technique for cheap recoverycrash_only/2017-09-06T01:52:31.8070668952017-09-06T01:52:31.807066895<EFBFBD>2E
<01>+3#GGEhttps://www.usenix.org/legacy/events/hotos03/tech/full_papers/candea/candea.pdfCrash-Only Softwarecrash_only/2017-09-06T01:52:31.8070668952017-09-06T01:52:31.807066895<01><02> <09>/%GG<00>http://www.cs.rochester.edu/~scott/papers/1996_PODC_queues.pdfSimple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithmsconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>5C {i%GG[https://people.eecs.berkeley.edu/~brewer/cs262/Mesa.pdfExperience with Processes and Monitors in Mesaconcurrency/2017-09-06T01:52:31.8066899412017-09-06T01:52:31.806689941<EFBFBD>B o%GG<00>http://en.wikipedia.org/wiki/HOL_(proof_assistan<61>>W
<02>e#GG<00>http://cs-www.cs.yale.edu/homes/dna/papers/determinism-vldb10.pdfThe Case for Determinism in Database Systemsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>.V w_#GG<00>http://www-bcf.usc.edu/~wyattllo/papers/f4-osdi14.pdff4: Facebooks Warm BLOB Storage Systemdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>YU <02><0F>#GG<00>http://cs.yale.edu/homes/thomson/publications/calvin-sigmod12.pdfCalvin: Fast Distributed Transactions for Partitioned Database Systemsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>T w/-GGrhttp://mcg.cs.tau.ac.il/papers/disc2008-hopscotch.pdfHopscotch Hashingdata_structures/2017-09-06T01:52:31.8085471192017-09-06T01:52:31.808547119<EFBFBD>S w)-GG<00>http://www.it-c.dk/people/pagh/papers/cuckoo-jour.pdfCuckoo Hashingdata_structures/2017-09-06T01:52:31.8085471192017-09-06T01:52:31.808547119<EFBFBD>JN <02><07>%GG<00>https://www.cs.unc.edu/~welch/kalman/media/pdf/Kalman1960.pdfA New Approach to Linear Filtering and Prediction Problemsdata_fusion/2017-09-06T01:52:31.8079040532017-09-06T01:52:31.807904053 <0B>`` 
V z<08><07><06>M<04><03>32><0E> <0A> <0C><00>OX <02><03>#GG<00>http://cs-www.cs.yale.edu/homes/dna/papers/abadi-pacelc.pdfConsistency Tradeoffs in Modern Distributed Database System Designdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>~e <01>U<EFBFBD>#GGhttp://www.cs.duke.edu/courses/cps399.28/current/papers/sigmod07-YangDasdanEtAl-map_reduce_merge.pdfMap-Reduce-Merge: Simplified Relational Data Processing on Large Clustersdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>cd <02><0F>-#GG<00>http://zoo.cs.yale.edu/classes/cs422/2013/bib/terry95managing.pdfManaging Update Conflicts in Bayou, a Weakly Connected Replicated Storage Systemdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>Oc
}<7D>#GG<00>http://www.erlang.org/download/armstrong_thesis_2003.pdfMaking Reliable Distributed Systems in the Presence of Software Errorsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>-b W}#GG<00>http://www.few.vu.nl/~kgr700/sdd1.pdfIntroduction to a System for Distributed Databases SDD-1datastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>/a gs#GG^https://cs.uwaterloo.ca/~bernard/hyperdex.pdfHyperDex: A Distributed, Searchable Key-Value Storedatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>L` <01> <09>#GG:http://www.ics.uci.edu/~yingyib/papers/HaLoop_camera_ready.pdfHaLoop: Efficient Iterative Data Processing on Large Clustersdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>U_
<02>Aa#GG<00>http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41344.pdfF1: A Distributed SQL Database That Scalesdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>]^
<02>Aq#GG<00>http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/36632.pdfDremel: Interactive Analysis of Web-Scale Datasetsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>\]
s<>=#GG<00>http://www.cs.cmu.edu/~dga/papers/cops-sosp2011.pdfDont Settle for Eventual: Scalable Causal Consistency for Wide-Area Storage with COPSdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>D\
g<>#GG&http://www.ssrc.ucsc.edu/Papers/weil-sc06.pdfCRUSH: Controlled, Scalable, Decentralized Placement of Replicated Datadatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>Y[
<02>3w#GG<00>http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.161.6751&rep=rep1&type=pdfCassandra - A Decentralized Structured Storage Systemdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD><Z u#GG'http://cs-www.cs.yale.edu/homes/dna/papers/vll-vldb13.pdfLightweight Locking for Main Memory Database Systemsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>(Y uU#GG<00>http://sites.computer.org/debull/A13june/calvin1.pdfModularity and Scalability in Calvindatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049 <02>e#GG<00>http://cs-www.cs.yale.edu/homes/dna/papers/determinism-vldb10.pdfThe Case for Determinism in Database Systemsdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>.V w_#GG<00>http://www-bcf.usc.edu/~wyattllo/papers/f4-osdi14.pdff4: Face<63>ci <01> <0B>3#GGhttp://research.microsoft.com/pubs/79348/presto27-greenberg.pdfTowards a Next Generation Data Center Architecture: Scalability and Commoditizationdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>Lh
<02>1_#GG<00>http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.21.2707&rep=rep1&type=pdfThe Dangers of Replication and a Solutiondatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>:g
<02>39#GG<00>http://pages.cs.wisc.edu/~remzi/Classes/739/Spring2004/Papers/optimistic-survey.pdfOptimistic replicationdatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049<EFBFBD>?f
<01>%S#GGUhttps://amplab.cs.berkeley.edu/wp-content/uploads/2013/03/mdcc-eurosys13.pdfMDCC: Multi-Data Center Consistencydatastores/2017-09-06T01:52:31.8089250492017-09-06T01:52:31.808925049
1<02><03><03>3<02><02><0F><0F>^<0E><0E>g <0A> <0A> U # <0C> <0C> ^ % <0B> <0B> ] 
<EFBFBD>
<EFBFBD>
e
 <09> o '<08><08>_<07>t.<06><06>M<05>w5 <04><04>Sq,<01><01>Y<00><00>}7qhttp://www.gsd.inesc-id.pt/~ler/reports/srds07.pdf<00>)Whttp://www.few.vu.nl/~kgr700/sdd1.pdfb<}http://www.erlang.org/download/armstrong_thesis_2003.pdfc<}http://www.eecs.harvard.edu/~waldo/Readings/waldo-94.pdflE<04> http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdfnC<04>http://www.ee.columbia.edu/~dpwe/pubs/BarkCE05-sfd-spcomm.pdf
H<04>http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf<00>D<04> http://www.dna.caltech.edu/courses/cs191/paperscs191/turing.pdfH<04>http://www.diva-portal.org/smash/get/d6ohttp://trec.nist.gov/pubs/trec3/papers/city.ps.gz<00>_<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/43438.pdfq_<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41378.pdfu_<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41344.pdf__<04>Ahttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/36632.pdf^8uhttp://www.cse.psu.edu/~duo114/pubs/octeau-sec13.pdfA<04>http://www.csd.uoc.gr/~hy460/pdf/Dynamic%20Hash%20Tables.pdfP:whttp://www.cs.yale.edu/homes/zwan/papers/mcu/efrp.pdf<00>+Yhttp://www.cs.washington.edu/node/4749<00>A<04>http://www.cs.virginia.edu/~cs415/reading/bacon-garbage.pdf<00>@<04>http://www.cs.uvm.edu/~icdm/algorithms/10Algorithms-08.pdf<00>G<04>http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf<00>L<04>http://www.cs.utexas.edu/users/lorenzo/corsi/cs380d/papers/paper2-1.pdfxW<04>/http://www.cs.ucsb.edu/~veronika/MAE/spacecomplexityapproxfreqmoments_alon_99.pdf A<04>http://www.cs.ucf.edu/courses/cop4020/sum2009/CSP-hoare.pdf<00>F<04> http://www.cs.tufts.edu/~nr/cs257/archive/luc-maranget/jun08.pdf<00>E<04> http://www.cs.tufts.edu/~nr/cs257/archive/john-hughes/quick.pdf<00>O<04>http://www.cs.tufts.edu/~nr/cs257/archive/chris-okasaki/breadth-first.pdf<00>A<04>http://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdfJX<04>3http://www.cs.tau.ac.il/~dcor/articles/2013/3-Sweep-Extracting-Editable-Objects.pdf,S<04>)http://www.cs.rpi.edu/~cutler/classes/advancedgraphics/S08/lectures/kajiya.pdf(C<04> http://www.cs.rochester.edu/~scott/papers/1996_PODC_queues.pdfD/ahttp://www.cs.nyu.edu/~mohri/pub/csl01.pdf G<04>http://www.cs.northwestern.edu/~ago820/cs395/Papers/Phong_1975.pdf'@<04>http://www.cs.jhu.edu/~misha/Code/PoissonRecon/Version5.71/*i<04>Uhttp://www.cs.duke.edu/courses/cps399.28/current/papers/sigmod07-YangDasdanEtAl-map_reduce_merge.pdfeJ<04>http://www.cs.duke.edu/courses/cps296.4/spring04/papers/Adleman94.pdf=}http://www.cs.cornell.edu/~asdas/research/dsn02-swim.pdf<00>=}http://www.cs.cornell.edu/home/rvr/papers/flowgossip.pdf<00>7shttp://www.cs.cmu.edu/~dga/papers/cops-sosp2011.pdf]C<04>http://www.cs.berkeley.edu/~franklin/Papers/p315-franklin.pdf<00>B<04>http://www.cs.bell-labs.com/who/dmr/pdfs/shannoncryptshrt.pdfMA<04>http://www.crytek.com/download/Light_Propagation_Volumes.pdf0B<04>http://www.comp.lancs.ac.uk/~elkhatib//Docs/2014.06_Netw.pdf<00>8uhttp://www.cl.cam.ac.uk/~pes20/weakmemory/popl09.pdfAH<04>http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf<00>5mhttp://www.ccs.neu.edu/racket/pubs/icfp10-cf.pdf<00>E<04> http://www.cas.mcmaster.ca/~bill/best/algorithms/07Taxonomy.pdf1ghttp://www.bodden.de/pubs/far+14flowdroid.pdfO<04>http://www.berkkapicioglu.com/wp-content/uploads/2013/11/thesis_final.pdf<00>W<04>1http://www.andrew.cmu.edu/course/15-749/READINGS/required/resilience/lamport82.pdfi<04>Uhttp://www.ams.org/journals/tran/1965-117-00/S0002-9947-1965-0170805-7/S0002-9947-1965-0170805-7.pdf;{http://www-ee.stanford.edu/~hellman/publications/24.pdfI9whttp://www-bcf.usc.edu/~wyattllo/papers/f4-osdi14.pdfV4khttp://winsh.me/papers/erlang_workshop_2013.pdf<00>K<04>http://webcem01.cem.itesm.mx:8005/erlang/cd/downloads/hopl_erlang.pdf<00>:yhttp://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdfK3ihttp://user.it.uu.se/~kostis/Papers/ismm04.pdf<00>2ihttp://user.it.uu.se/~kostis/Papers/escape.pdf? <06>9 <0C> <0B>9
I x<08><07>9^j<02><01><00>
<00><00>:g
<02>39#<23>0l }K5GGhttp://www.eecs.harvard.edu/~waldo/Readings/waldo-94.pdfA Note on Distributed Computingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Mx
<02>e5GG<00>http://www.cs.utexas.edu/users/lorenzo/corsi/cs380d/papers/paper2-1.pdfPaxos Made Live - An Engineering Perspectivedistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>_w <01> <09>5GGshttp://research.microsoft.com/apps/pubs/default.aspx?id=210931Orleans: Distributed Virtual Actors for Programmability and Scalabilitydistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Iv
o<> 5GGhttp://research.google.com/pubs/archive/41684.pdfOmega: flexible, scalable schedulers for large compute clustersdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>qu <01>A<EFBFBD>5GGAhttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/41378.pdfMillWheel: Fault-Tolerant Stream Processing at Internet Scaledistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Xt <02><05>5GG<00>http://people.cs.umass.edu/~emery/pubs/berger-asplos2000.pdfHoard: A Scalable Memory Allocator for Multithreaded Applicationsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>bs
}<7D>/5GGWhttps://www.cs.cornell.edu/fbs/publications/SMSurvey.pdfImplementing Fault-Tolerant Services Using the State Machine Approach: A Tutorialdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Mr
u<> 5GG<00>http://cs.brown.edu/~mph/HerlihyW90/p463-herlihy.pdfLinearizability: A Correctness Condition for Concurrent Objectsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918 ?)<00>Aq5GGhttp://static.googleusercont<6E>;z oo5GG<00>http://kowshik.github.io/JPregel/pregel_paper.pdfPregel: A System for Large-Scale Graph Processingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>9p _}5GGhttp://notes.stephenholiday.com/Kafka.pdfKafka: a Distributed Messaging System for Log Processingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>do <02><11>5GG<00>http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_sigcomm.pdfChord: A Scalable Peer-to-peer Lookup Service for Internet Applicationsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Nn
<02> u5GG<00>http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdfAbove the Clouds: A Berkeley View of Cloud Computingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>sm
<01>kc5GGphttp://diyhpl.us/~bryan/papers2/distributed/distributed-systems/zab.totally-ordered-broadcast-protocol.2008.pdfA simple totally ordered broadcast protocoldistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918 <0A><00>}K5GGhttp://www.eecs.harvard.edu/~waldo/Readings/waldo-94.pdfA Note on Distributed Computingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>0k
<01>aGG*http://scg.unibe.ch/archive/papers/Duca06bTOPLASTraits.pdfTraits: A Mechanism for Fine-Grained Reusedesign/2017-09-06T01:52:31.8099409182017-09-06T01:52:31.809940918<EFBFBD>cj <02>3<EFBFBD>GG<00>http://faculty.salisbury.edu/~xswang/Research/Papers/SERelated/no-silver-bullet.pdfNo Silver Bullet — Essence and Accidents of Software Engineeringdesign/2017-09-06T01:52:31.8099409182017-09-06T01:52:31.809940918<00><01> <0B>3#GGhttp://research.microsoft.com/pubs/79348/presto27-greenberg.pdfTowards a Next Generation Data Center Architecture: Sca<63>y <01>q<EFBFBD>5GG(http://www.itu.dk/stud/speciale/bepjea/xwebtex/litt/practical-byzantine-fault-tolerance-and-proactive-recovery.pdfPractical Byzantine Fault Tolerance and Proactive Recoverydistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>fq
<02>Aq5GGhttp://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/43438.pdfLarge-scale cluster management at Google with Borgdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918 <00><0E>  k <0B>
<EFBFBD>
& Rm^k<05><04>'T<00><01><00>J<EFBFBD>
q<> 3GG<00>https://www.sics.se/~seif/DatalogiII/Book/train.psIncremental Mature Garbage Collection Using the Train Algorithmgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>L<EFBFBD>
o<>3GGhttp://home.pipeline.com/~hbaker1/NoMotionGC.htmlThe Treadmill: Real-Time Garbage Collection Without Motion Sicknessgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>Q<EFBFBD>
<02>s3GG<00>http://www.ssw.uni-linz.ac.at/General/Staff/TW/Wuerthinger05Train.pdfIncremental Garbage Collection: The Train Algorithmgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>O<EFBFBD>
<02>)]3GG<00>http://pdf.aminer.org/000/465/194/incremental_collection_of_mature_objects.pdfIncremental Collection of Mature Objectsgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>S<EFBFBD> <01> <09>3GGhttps://www.cs.purdue.edu/homes/hosking/690M/p611-fenichel.pdfA LISP Garbage-Collector for Virtual-Memory Computer Systemsgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>9<EFBFBD>
<01>Y3GG6http://www.cs.virginia.edu/~cs415/reading/bacon-garbage.pdfA Unified Theory of Garbage Collectiongarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102<EFBFBD>,<2C> ke'GGghttp://www.jennthom.com/papers/gamification.pdfRemoving Gamification from an Enterprise SNSgamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD>o<EFBFBD> <02> <0B>E'GG<00>http://www.ic.unicamp.br/~oliveira/doc/Ubicomp2010_MoviPill.pdfMoviPill: Improving Medication Compliance for Elders - Using a Mobile Persuasive Social Gamegamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD> <0B> <02>q<EFBFBD>'GG<00>http://dl.dropboxusercontent.com/u/220532/MindTrek_Gamification_PrinterReady_110806_SDE_accepted_LEN_changes_1.pdfFrom Game Design Elements to Gamefulness: Defining “Gamification”gamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD>a<EFBFBD> <02>!<21>'GG<00>http://gamification-research.org/wp-content/uploads/2011/04/12-Gerling.pdfExploring the Potential of Gamification Among Frail Elderly Personsgamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD>P<EFBFBD>
}<7D>'GG<00>http://www.katherineeveritt.com/papers/p457-consolvo.pdfDesign Requirements for Technologies that Encourage Physical Activitygamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD>N<EFBFBD>
<02>{'GG<00>http://www.rolandhubscher.org/courses/hf765/readings/p17-huotari.pdfDefining Gamification - A Service Marketing Perspectivegamification/2017-09-06T01:52:31.8148139652017-09-06T01:52:31.814813965<EFBFBD>O<EFBFBD>
i<>AGG<00>http://davidsjohnson.net/papers/experguide.pdfA Theoretician's Guide to the Experimental Analysis of Algorithmsexperimental_algorithmics/2017-09-06T01:52:31.8145791022017-09-06T01:52:31.814579102<EFBFBD><1C> s#AGGhttp://en.wikipedia.org/wiki/Empirical_algorithmics(Wikipedia)experimental_algorithmics/2017-09-06T01:52:31.8145791022017-09-06T01:52:31.814579102<EFBFBD>+<2B>
<01>GGGwhttp://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdfReflections on Trusting Trustethics/2017-09-06T01:52:31.8143940432017-09-06T01:52:31.814394043<EFBFBD>k<EFBFBD> <02>I<EFBFBD>!GG<00>http://www.sci.brooklyn.cuny.edu/~parsons/projects/mech-design/publications/bluffers-final.pdfAuctions and bidding: A guide for computer scientists (2011)economics/2017-09-06T01:52:31.8140310062017-09-06T01:52:31.814031006<EFBFBD>O<EFBFBD>
<01> }5GG7http://research.microsoft.com/pubs/255833/IronFleet-twocol.pdfIronFleet: Proving Practical Distributed Systems Correctdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD> <20> <01>#<23>5GGThttps://www.usenix.org/system/files/conference/osdi14/osdi14-paper-yuan.pdfSimple Testing Can Prevent Most Critical Failures:
An Analysis of Production Failures in Distributed
Data-Intensive Systemsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918 <00>  E k
<EFBFBD>
 Q<08><07>f<06><05>C<04><03><00>)<02><01><00>I<EFBFBD>-
<02> o1GG<00>http://www.cs.tufts.edu/~nr/cs257/archive/luc-maranget/jun08.pdfCompiling Pattern Matching to good Decision Treeslanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD>k<EFBFBD>0 <01><1F>!1GG2http://www.cs.tufts.edu/~nr/cs257/archive/chris-okasaki/breadth-first.pdfBreadth-First Numbering: Lessons from a Small Exercise in Algorithm Designlanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD><1A>/ g91GG<00>https://www.lri.fr/~filliatr/publis/enum2.pdfBacktracking Iteratorslanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD>4<EFBFBD>. U1GG<00>http://frenchy64.github.io/papers/typed-clojure-draft.pdfPractical Optional Types for Clojurelanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD><1C>, m53GG<00>http://www.msr-waypoint.com/pubs/64346/dwork.pdfDifferential Privacyinformation_theory/2017-09-06T01:52:31.8166140142017-09-06T01:52:31.816614014<EFBFBD>><3E>+ oq9GG<00>https://www.cs.cornell.edu/home/kleinber/auth.pdfAuthoritative Sources in a Hyperlinked Environmentinformation_retrieval/2017-09-06T01:52:31.8160620122017-09-06T01:52:31.816062012<EFBFBD><1A>* o)9GG<00>http://trec.nist.gov/pubs/trec3/papers/city.ps.gzOkapi at TREC3information_retrieval/2017-09-06T01:52:31.8160620122017-09-06T01:52:31.816062012<EFBFBD>C<EFBFBD>) o}9GGhttp://ilpubs.stanford.edu:8090/422/1/1999-66.pdfThe PageRank Citation Ranking: Bringing Order to the Webinformation_retrieval/2017-09-06T01:52:31.8160620122017-09-06T01:52:31.816062012<EFBFBD>:<3A>(
<02>=9GG<00>http://www.lix.polytechnique.fr/~rousseau/papers/rousseau-cikm2013.pdfGraph of Word and TW-IDFinformation_retrieval/2017-09-06T01:52:31.8160620122017-09-06T01:52:31.816062012<EFBFBD><11>' WMGG<00>http://ddg.jaist.ac.jp/pub/HDY+04.pdfThe ϕ Accrual Failure Detector gossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>8<EFBFBD>&
<02>]GG<00>https://ecommons.cornell.edu/bitstream/handle/1813/7341/98-1687.pdfA Gossip-Style Failure Detection Servicegossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD><16>% q=GG<00>http://www.gsd.inesc-id.pt/~ler/reports/srds07.pdfEpidemic Broadcast Treesgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>I<EFBFBD>$
}<7D>GG<00>http://www.cs.cornell.edu/home/rvr/papers/flowgossip.pdfEfficient Reconciliation and Flow Control for Anti-Entropy Protocolsgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD><12># y/GGGhttp://www.csl.mtu.edu/cs6461/www/Reading/Birman99.pdfBimodal Multicastgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>3<EFBFBD>" }kGG<00>http://www.soc.napier.ac.uk/~benp/dream/dreampaper17.pdfLarge-Scale Newscast Computing on the Internet gossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>V<EFBFBD>!
}<7D>1GG<http://www.cs.cornell.edu/~asdas/research/dsn02-swim.pdfSWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocolgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>F<EFBFBD>
y<>GG9http://asc.di.fct.unl.pt/~jleitao/pdf/dsn07-leitao.pdfHyParView: a membership protocol for reliable gossip-based broadcastgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>q<EFBFBD> <02><15>KGG<00>http://infoscience.epfl.ch/record/83409/files/neg--1184036295all.pdfThe Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementationsgossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD><0F>
<01>%{GGZhttp://bitsavers.informatik.uni-stuttgart.de/pdf/xerox/parc/techReports/CSL-89-1_Epidemic_Algorithms_for_Replicated_Database_Maintenance.pdfEpidemic Algorithms for Replicated Database Maintenancegossip/2017-09-06T01:52:31.8155930182017-09-06T01:52:31.815593018<EFBFBD>e<EFBFBD> <01><07>+3GGhttp://community.haskell.org/~simonmar/papers/parallel-gc.pdfParallel Generational-Copying Garbage Collection with a Block-Structured
Heapgarbage_collection/2017-09-06T01:52:31.8152041022017-09-06T01:52:31.815204102
\*<06>k|<05><05>E<04>~<03><03><03>X<07>x><0F>S<01><0E><0E>N<02> <0A> S # <0C> r 5 <0B> <0B><01> r
<EFBFBD>
<EFBFBD>
g<06>z7<05><00><05><05>k1<04><03>8<02>O<04>https://en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithmE<04> http://www.inf.ed.ac.uk/teaching/courses/exc/reading/morris.pdf 2http://www;yhttp://www.csl.mtu.edu/cs6461/www/Reading/Birman99.pdf<00>T<04>)http://www.kavrakilab.org/sites/default/files/kavraki1996prm-high-dim-conf.pdf5mhttp://www.roboticsproceedings.org/rss01/p36.pdf<00><07><00>https://arxiv.org/pdf/quant-ph/9605043.pdf<00>/ahttps://arxiv.org/pdf/quant-ph/9508027.pdf<00><07>&https://arxiv.org/abs/1512.02900<00><04>https://github.coC<04>http://www.msr-waypoint.net/en-us/groups/ese/nagappan_tdd.pdfE<04> http://www.ic.unicamp.br/~oliveira/doc/Ubicomp2010_MoviPill.pdf<00>7qhttp://www.gsd.inesc-id.pt/~ler/reports/srds07.pdf<00>)Whttp://www.few.vu.nl/~kgr700/sdd1.pdfb<}http://www.erlang.org/download/armstrong_thesis_2003.pdfc<66><04> http://www.elizabete.com.br/site/Outros/Entradas/2012/11/19_Revisao_Sistematica_files/ConceitosRevisaoSistematica_Biolchini.pdf<}http://www.eecs.harvard.edu/~waldo/Readings/waldo-94.pdflE<04> http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdfnC<04>http://www.ee.columbia.edu/~dpwe/pubs/BarkCE05-sfd-spcomm.pdf
H<04>http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf<00>D<04> http://www.dna.caltech.edu/courses/cs191/paperscs191/turing.pdfH<04>http://www.diva-portal.org/smash/get/diva2:392243/FULLTEXT01.pdfOn<00>_<04>Ahttp://www.disneyresearch.com/project/high-quality-single-shot-capture-of-facial-geometry/:d<04>Khttp://www.disneyresearch.com/project/coupled-3d-reconstruction-of-sparse-facial-hair-and-skin/9\<04>9http://www.csee.umbc.edu/courses/undergraduate/CMSC331/resources/papers/sammet1972.pdf<00>9whttp://www.it-c.dk/people/pagh/papers/cuckoo-jour.pdfSC<04> http://www.ics.uci.edu/~yingyib/papers/HaLoop_camera_ready.pdf`=}http://www.icg.tugraz.at/Members/steinber/scatteralloc-1<00>mhttp://www.thocp.net/biographies/papers/backus_turingaward_lecture.pdf<00>7qhttp://xlinux.nist.gov/dads//HTML/ahoCorasick.html<00>(Uhttps://arxiv.org/pdf/1703.07511.pdf.(Uhttps://arxiv.org/pdf/1609.03499.pdf<01>https://arxiv.org/abs/1510.00116<00>Q<04>%https://amplab.cs.berkeley.edu/wp-content/uploads/2013/03/mdcc-eurosys13.pdffF<04>http://zoo.cs.yale.edu/classes/cs422/2013/bib/terry95managing.pdfd<00>http://www.youtube.com/watch?v=2KoLnIwoZKU*Yhttp://www.vldb.org/conf/1994/P439.PDF0ehttp://www.turingarchive.org/browse.php/B/12Lhttp://www.ssw.uni-linz.ac.at/General/Staff/TW/Wuerthinger05Train.pdf<00>1ghttp://www.ssrc.ucsc.edu/Papers/weil-sc06.pdf\=}http://www.soc.napier.ac.uk/~benp/dream/dreampaper17.pdf<00>5ohttp://www.sci.utah.edu/~bsumma/projects/weaving/;d<04>Ihttp://www.sci.brooklyn.cuny.edu/~parsons/projects/mech-design/publications/bluffers-final.pdf<00>J<04>http://www.rolandhubscher.org/courses/hf765/readings/p17-huotari.pdf<00>?<04>http://www.research.ibm.com/people/m/michael/podc-1996.pdfQ7qhttp://www.reed.com/dpr/locus/Papers/EndtoEnd.html<00><{http://www.rdrop.com/users/paulmck/RCU/hart_ipdps06.pdf<00>Q<04>%http://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdf2^<04>=http://www.pps.univ-paris-diderot.fr/~saurin/Enseignement/LMFI/articles/Martin-Lof83.pdf<00>/ahttp://www.pmg.csail.mit.edu/papers/vr.pdf<00>h<04>Shttp://www.peterwonka.net/Publications/pdfs/2006.SG.Mueller.ProceduralModelingOfBuildings.final.pdf3[<04>9http://www.peterwonka.net/Publications/pdfs/2003.SG.Wonka.InstantArchitecture.high.pdf45mhttp://www.msr-waypoint.com/pubs/64346/dwork.pdf<00>6qhttp://www.mshah.org/papers/sosp_2007_aguilera.pdf}L<04>http://www.lix.polytechnique.fr/~rousseau/papers/rousseau-cikm2013.pdf<00>B<04>http://www.kdd.org/kdd2016/papers/files/rfp0573-ribeiroA.pdf<00>=}http://www.katherineeveritt.com/papers/p457-consolvo.pdf<00>4khttp://www.jennthom.com/papers/gamification.pdf<00>w<04>qhttp://www.itu.dk/stud/speciale/bepjea/xwebtex/litt/practical-byzantine-fault-tolerance-and-proactive-recovery.pdfy < t <0A> <0C>
X
x <09><08><<07>[<05><04> It<01><00>O<EFBFBD>:
<02> u9GG http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.524Purely Functional Lazy Non-deterministic Programminglogic_and_programming/2017-09-06T01:52:31.8182150882017-09-06T01:52:31.818215088<EFBFBD><04>D I1/GGhttp://arxiv.org/abs/1004.4240arXiv/cs/1004:4240machine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD>Y<EFBFBD>C <01><05>/GG8http://www.kdd.org/kdd2016/papers/files/rfp0573-ribeiroA.pdf"Why Should I Trust You?" Explaining the Predictions of Any Classifiermachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD>Q<EFBFBD>B
<02>o/GG<00>http://www.berkkapicioglu.com/wp-content/uploads/2013/11/thesis_final.pdfApplications of Machine Learning to Location Datamachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD><<3C>A
<01>_/GG{https://www.cs.princeton.edu/~chazelle/pubs/FJLT-sicomp09.pdfThe Fast Johnson-Lindenstrauss Transformsmachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD>(<28>@
<01>;/GGPhttp://rd.springer.com/content/pdf/10.1007%2FBF00994018.pdfSupport-Vector Networksmachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD><EFBFBD>? <01>+<2B>?/GGhttp://repository.upenn.edu/cgi/viewcontent.cgi?article=1162&context=cis_papersConditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Datamachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD><1F>>
<01>)/GGXhttps://www.stat.berkeley.edu/~breiman/randomforest2001.pdfRandom Forestsmachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD>@<40>= }q/GG<00>http://homes.cs.washington.edu/~pedrod/papers/cacm12.pdfA Few Useful Things to Know about Machine Learningmachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD>1<EFBFBD><
<02>M/GG<00>http://www.cs.uvm.edu/~icdm/algorithms/10Algorithms-08.pdfTop 10 algorithms in data miningmachine_learning/2017-09-06T01:52:31.8185358892017-09-06T01:52:31.818535889<EFBFBD><08>; <02>=<3D>39GG<00>http://www.pps.univ-paris-diderot.fr/~saurin/Enseignement/LMFI/articles/Martin-Lof83.pdfOn the Meanings of the Logical Constants and the Justifications of the Logical Lawslogic_and_programming/2017-09-06T01:52:31.8182150882017-09-06T01:52:31.818215088<EFBFBD>^<5E>9
<02>Cc1GG<00>http://research.microsoft.com/en-us/um/people/simonpj/papers/history-of-haskell/history.pdfA History of Haskell: Being Lazy With Classlanguages/haskell/2017-09-06T01:52:31.8177099612017-09-06T01:52:31.817709961<EFBFBD>2<EFBFBD>8 kg/GG<00>http://winsh.me/papers/erlang_workshop_2013.pdfOn the Scalability of the Erlang Term Storagelanguages/erlang/2017-09-06T01:52:31.8174230962017-09-06T01:52:31.817423096<EFBFBD>\<5C>7 <01><11>/GG.http://www.diva-portal.org/smash/get/diva2:392243/FULLTEXT01.pdfOnCharacterizing the Scalability of Erlang VM on Many-core Processorslanguages/erlang/2017-09-06T01:52:31.8174230962017-09-06T01:52:31.817423096<EFBFBD>.<2E>6
<01>3/GG,http://webcem01.cem.itesm.mx:8005/erlang/cd/downloads/hopl_erlang.pdfA History of Erlanglanguages/erlang/2017-09-06T01:52:31.8174230962017-09-06T01:52:31.817423096<EFBFBD>Q<EFBFBD>5
u<>/GG<00>http://erlang.org/download/armstrong_thesis_2003.pdfMaking reliable distributed systems in the presence of software errorslanguages/erlang/2017-09-06T01:52:31.8174230962017-09-06T01:52:31.817423096<EFBFBD><<3C>4 KyUEE<00>http://arxiv.org/abs/1507.02988Programmatic and Direct Manipulation, Together at Lastlanguages/domain-specific-languages/2017-09-06T01:52:31.817242922017-09-06T01:52:31.81724292<EFBFBD>Q<EFBFBD>3
<01>3[1GGhttps://www.youtube.com/watch?v=zi0rHwfiX1Q&list=PLZdCLR02grLp__wRg5OTavVj4wefg69hMTesting the Hard Stuff and Staying Sanelanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD>(<28>2 gW1GG
http://people.inf.elte.hu/center/fulltext.pdfQuickCheck Testing for Fun and Profitlanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957<EFBFBD>\<5C>1 <01> <0B>1GG?http://www.cs.tufts.edu/~nr/cs257/archive/john-hughes/quick.pdfQuickCheck: A Lightweight Tool for Random Testing of Haskell Programslanguages/clojure/2017-09-06T01:52:31.8168559572017-09-06T01:52:31.816855957 QQo<0E> <0A> <0C> <0B>
<EFBFBD>
 Pv<07><06>5<05><04>"o<02><01><00><00>%<25>E sYGGhttp://people.csail.mit.edu/jrb/Projects/dexprs.pdfD-Expressions: Lisp Power, Dylan Stylemacros/2017-09-06T01:52:31.8190180662017-09-06T01:52:31.819018066<EFBFBD>F<EFBFBD>X
<02>W1GG<00>https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdfJails: Confining the omnipotent root.operating_systems/2017-09-06T01:52:31.8203430182017-09-06T01:52:31.820343018<EFBFBD>:<3A>W
<01>O1GGNhttp://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdfXen and the Art of Virtualizationoperating_systems/2017-09-06T01:52:31.8203430182017-09-06T01:52:31.820343018<EFBFBD>i<EFBFBD>V <01><05>71GGohttps://people.csail.mit.edu/nickolai/papers/clements-sc.pdfThe Scalable Commutativity Rule: Designing Scalable Software for Multicore Processorsoperating_systems/2017-09-06T01:52:31.8203430182017-09-06T01:52:31.820343018<EFBFBD>/<2F>U ia1GG<00>http://plosworkshop.org/2013/preprint/kell.pdfThe operating system: should there be one?operating_systems/2017-09-06T01:52:31.8203430182017-09-06T01:52:31.820343018<EFBFBD>:<3A>T
<02>Q=GG<00>http://orbit.dtu.dk/files/102419168/abstract_ELB_trees.pdfEfficient Lock-free B+trees (2014)non_blocking_algorithms/2017-09-06T01:52:31.8200800782017-09-06T01:52:31.820080078<EFBFBD>9<EFBFBD>S eo=GGxhttp://chaoran.me/assets/pdf/wfq-ppopp16.pdfA Wait-free Queue as Fast as Fetch-and-Add (2016)non_blocking_algorithms/2017-09-06T01:52:31.8200800782017-09-06T01:52:31.820080078<EFBFBD><14>R M==GGhttps://arxiv.org/abs/1510.00116A Wait-Free Stack (2015)non_blocking_algorithms/2017-09-06T01:52:31.8200800782017-09-06T01:52:31.820080078<EFBFBD>/<2F>Q
<02>UGG<00>http://www.comp.lancs.ac.uk/~elkhatib//Docs/2014.06_Netw.pdfCan SPDY Really Make the Web Faster?networks/2017-09-06T01:52:31.8198520512017-09-06T01:52:31.819852051<EFBFBD>$<24>P qWGGuhttp://www.reed.com/dpr/locus/Papers/EndtoEnd.htmlEnd-to-End Arguments in System Designnetworks/2017-09-06T01:52:31.8198520512017-09-06T01:52:31.819852051<EFBFBD>b<EFBFBD>O
{<7B>51GG)http://www.rdrop.com/users/paulmck/RCU/hart_ipdps06.pdfMaking Lockless Synchronization Fast: Performance Implications of Memory Reclamationmemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>V<EFBFBD>N
}<7D>1GG<00>http://www.icg.tugraz.at/Members/steinber/scatteralloc-1ScatterAlloc: Massively Parallel Dynamic Memory Allocation for the GPUmemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>D<EFBFBD>M
<01>C11GG1https://www.usenix.org/legacy/publications/library/proceedings/bos94/full_papers/bonwick.psPOSTSCRIPT versionmemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>?<3F>L
<02>A'1GG<00>https://www.usenix.org/legacy/publications/library/proceedings/bos94/full_papers/bonwick.aASCII versionmemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>f<EFBFBD>K <01>/<2F>1GGHhttps://www.usenix.org/legacy/publications/library/proceedings/bos94/bonwick.htmlThe Slab Allocator: An Object-Caching Kernel Memory Allocatormemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD><03>J <01>'<27>I1GGhttp://researcher.watson.ibm.com/researcher/files/us-bacon/Bacon12AndThen.pdfAnd Then There Were None: A Stall-Free Real-Time Garbage Collector for Reconfigurable Hardwarememory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>]<5D>I
i<>=1GGOhttp://user.it.uu.se/~kostis/Papers/ismm04.pdfMessage Analysis Guided Allocation and Low Pause Incremental GC in a Concurrent Languagememory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>q<EFBFBD>H <01>+<2B>!1GG%https://cs.brown.edu/~sk/Publications/Papers/Published/cgkmf-teach-gc/paper.pdfTeaching Garbage Collection without Implementing Compilers or Interpretersmemory_management/2017-09-06T01:52:31.8194221192017-09-06T01:52:31.819422119<EFBFBD>I<EFBFBD>G
<02>M;%GG<00>https://github.com/papers-we-love/papers-we-love/blob/master/mathematics/transcendence-of-pi.pdfThe Transcendence of pimathematics/2017-09-06T01:52:31.8192089842017-09-06T01:52:31.819208984<EFBFBD> <0A>F m/GG<00>http://www.ccs.neu.edu/racket/pubs/icfp10-cf.pdfFortifying Macrosmacros/2017-09-06T01:52:31.8190180662017-09-06T01:52:31.819018066
<02>*<00>D<01>F<00>~<0E> <02><03>G <0C>L<02><04><04> <0C> c , <0B>b <0B> X 
<EFBFBD>
<EFBFBD>B
S <09><07><06> | 'M<05><05><08><08>u<07>i<04>Shttps://github.com/papers-we-love/papers-we-love/blob/master/plt/theory-in-programming-practice.pdf<00>}<04>{https://github.com/papers-we-love/papers-we-love/blob/master/plt/the-derivative-of-a-regular-type-one-hole-contexts.pdf<00><04>https://github.com/papers-we-love/papers-we-love/blob/master/plt/programming-languages-application-and-interpretation.pdf<00>y<04>shttps://github.com/papers-we-love/papers-we-love/blob/master/plt/principal-type-schemes-for-functional-programs.pdf<00><06>7qhttps://internetcensus2012.bitbucket.io/paper.htmlP<04>!https://rse-lab.cs.washington.edu/postscripts/3d-mapping-iser-10-final.pdfD<04> https://research.microsoft.com/en-us/um/people/nick/coqasm.pdf<00><><04> https://moodle.risc.jku.at/pluginfile.php/3407/mod_resource/content/1/A%20Calculus%20of%20Communicating%20Systems%5B1980%5D.pdf<00>:whttps://www.cs.utah.edu/plt/publications/macromod.pdf<00>S<04>'https://www.seas.harvard.edu/sites/default/files/files/archived/Czaplicki.pdf<00>O<04>https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf<00>O<04>https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf<00>B<04>https://people.csail.mit.edu/nickolai/papers/clements-sc.pdf<00>a<04>Chttps://www.usenix.org/legacy/publications/library/proceedings/bos94/full_papers/bonwick.ps<00>`<04>Ahttps://www.usenix.org/legacy/publications/library/proceedings/bos94/full_papers/bonwick.a<00>W<04>/https://www.usenix.org/legacy/publications/library/proceedings/bos94/bonwick.html<00> l'https://cs.brown.edu/~sk/PublicatiG<04>https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdfM<04>https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdfC<04>https://www.cs.princeton.edu/~chazelle/pubs/FJLT-sicomp09.pdf<00>A<04>https://www.stat.berkeley.edu/~breiman/randomforest2001.pdf<00>Y<04>3https://www.youtube.com/watch?v=zi0rHwfiX1Q&list=PLZdCLR02grLp__wRg5OTavVj4wefg69hM<00>2ghttps://www.lri.fr/~filliatr/publis/enum2.pdf<00>/chttps://www.youtube.com/watch?v=Oie1ZXWceqM-/chttps://www.youtube.com/watch?v=HScYuRhgEJw%Q<04>#https://www.usenix.org/system/files/conference/osdi14/osdi14-paper-yuan.pdf<00>T<04>+https://www.usenix.org/legacy/events/hotos03/tech/full_papers/candea/candea.pdfER<04>'https://www.usenix.org/legacy/event/osdi04/tech/full_papers/candea/candea.pdfF7qhttps://www.sics.se/~seif/DatalogiII/Book/train.ps<00>z<04>whttps://www.researchgate.net/publication/220080099_MEXICA_A_computer_model_of_a_cognitive_account_of_creative_writingR<04>'https://www.ics.uci.edu/~fielding/pubs/dissertation/fielding_dissertation.pdfD<04> https://www.eecs.berkeley.edu/~daw/papers/intents-mobisys11.pdf=https://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdfB<04>https://www.cs.unc.edu/~welch/kalman/media/pdf/Kalman1960.pdfND<04> https://www.cs.purdue.edu/homes/hosking/690M/p611-fenichel.pdf<00>K<04>https://www.cs.drexel.edu/~david/Classes/CS586/Papers/p343-whitted.pdf!6ohttps://www.cs.cornell.edu/home/kleinber/auth.pdf<00><}https://www.cs.cornell.edu/fbs/publications/SMSurvey.pdfs;yhttps://www.cs.cmu.edu/~dga/papers/epaxos-sosp2013.pdf<00>;{https://people.eecs.berkeley.edu/~brewer/cs262/Mesa.pdfCS<04>)https://homes.cs.washington.edu/~luisceze/publications/dnastorage-asplos16.pdfw%https://github.com/papers-we-love/papers-we-love/blob/master/caching/a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdf<17><04> https://github.com/papers-we-love/papers-we-love/blob/master/artificial_intelligence/3-bayesian-network-inference-algorithm.pdf9whttps://github.com/luanfujun/deep-photo-styletransfer/.ahttps://github.com/ibab/tensorfl<66><04>3https://github.com/papers-we-love/papers-we-love/blob/master/sublinear_algorithms/An-Elementary-Proof-of-a-Theorem-of-Johnson-and-Lindenstrauss.pdf<13><04>https://github.com/papers-we-love/papers-we-love/blob/master/sublinear_algorithms/1985-Flajolet-Probabilistic-counting.pdf e 7 y <0C> <0B>
<EFBFBD> <09>e #Cp<06><05><04>L<03><02><01><00>4<EFBFBD>` w-aGG http://www.cs.yale.edu/homes/zwan/papers/mcu/efrp.pdfEvent-Driven FRPparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>I<EFBFBD>k
<02>9_GG<00>http://www.csee.umbc.edu/courses/undergraduate/CMSC331/resources/papers/sammet1972.pdfProgramming Languages: History and Futureplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>C<EFBFBD>j
w<>GG<00>http://eb.host.cs.st-andrews.ac.uk/drafts/effects.pdfProgramming and Reasoning with Algebraic Effects and Dependent Typesplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>x<EFBFBD>i <02><19>[GGhttp://www.thocp.net/biographies/papers/backus_turingaward_lecture.pdfCan Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programsplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD><1B>h q5/GGQhttp://xlinux.nist.gov/dads//HTML/ahoCorasick.htmlAhoCorasick entrypattern_matching/2017-09-06T01:52:31.8222990722017-09-06T01:52:31.822299072s<EFBFBD>g ;/GG<00>http://racket-lang.org/Racketpattern_matching/2017-09-06T01:52:31.8222990722017-09-06T01:52:31.822299072<EFBFBD>X<EFBFBD>f
g<> YGGhttp://cseweb.ucsd.edu/~vahdat/papers/mop.pdfMetaobject protocols: Why we want them and what else they can doparadigms/object_oriented_programming/2017-09-06T01:52:31.8221020512017-09-06T01:52:31.822102051<EFBFBD>d<EFBFBD>e
<02>'[aGG<00>https://www.seas.harvard.edu/sites/default/files/files/archived/Czaplicki.pdfElm: Concurrent FRP for Functional GUIsparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>f<EFBFBD>d
<02>/WaGG<00>http://haskell.cs.yale.edu/wp-content/uploads/2012/08/Winograd-Cort-Wormholes.pdfWormholes: Introducing Effects to FRPparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>O<EFBFBD>c {_aGGhttp://conal.net/papers/push-pull-frp/push-pull-frp.pdfPush-Pull Functional Reactive Programmingparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>\<5C>b waGGhttp://people.seas.harvard.edu/~chong/pubs/pldi13-elm.pdfAsynchronous Functional Reactive Programming for GUIsparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>=<3D>a
<02> 'aGG<00>http://haskell.cs.yale.edu/wp-content/uploads/2011/02/rt-frp.pdfReal-Time FRPparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>_<EFBFBD>_
<02>aaGG<00>http://haskell.cs.yale.edu/wp-content/uploads/2011/02/workshop-02.pdfFunctional Reactive Programming, Continuedparadigms/functional_reactive_programming/2017-09-06T01:52:31.8214951172017-09-06T01:52:31.821495117<EFBFBD>k<EFBFBD>^
{<7B>)OGGahttp://dig.cs.illinois.edu/papers/lambdaRefactoring.pdfCrossing the Gap from Imperative to Functional Programming through Refactoringparadigms/functional_programming/2017-09-06T01:52:31.8209460452017-09-06T01:52:31.820946045<EFBFBD>O<EFBFBD>]
<02>UOGG<00>http://patrickthomson.ghost.io/an-introduction-to-recursion-schemes/An introduction to Recursion Schemesparadigms/functional_programming/2017-09-06T01:52:31.8209460452017-09-06T01:52:31.820946045<EFBFBD>l<EFBFBD>\ <01> <0B>OGGfhttp://eprints.eemcs.utwente.nl/7281/01/db-utwente-40501F46.pdfFunctional Programming with Bananas, Lenses, Envelopes and Barbed Wireparadigms/functional_programming/2017-09-06T01:52:31.8209460452017-09-06T01:52:31.820946045<EFBFBD>:<3A>[ qSOGGhttp://cs.au.dk/~hosc/local/LaSC-4-3-pp223-242.pdfOrganizing Programs Without Classesparadigms/functional_programming/2017-09-06T01:52:31.8209460452017-09-06T01:52:31.820946045<EFBFBD>Q<EFBFBD>Z
<02>mAGG<00>http://jeffreymbradshaw.net/publications/Common_Ground_Single.pdfCommon Ground and Coordination in Joint Activityorganizational_simulation/2017-09-06T01:52:31.8206870122017-09-06T01:52:31.820687012<EFBFBD>p<EFBFBD>Y <02><1F>)1GG<00>https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdfSolaris Zones: Operating System Support for Consolidating Commercial Workloadsoperating_systems/2017-09-06T01:52:31.8203430182017-09-06T01:52:31.820343018 <00>V<0E> <0A> <0C> <0B> 9
J OI{<00><06><05>[<03><02><01>C<00>-<2D>v
<02>Q!GG http://www.cs.ucf.edu/courses/cop4020/sum2009/CSP-hoare.pdfCommunicating Sequential Processesprocesses/2017-09-06T01:52:31.8239260252017-09-06T01:52:31.823926025<EFBFBD>%<25>~ YqGG0http://www.cs.washington.edu/node/4749The Dynamic Window Approach to Collision Avoidancerobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD>]<5D>}
s<>CGG<00>http://people.ee.duke.edu/~lcarin/Lihan4.21.06a.pdfDP-SLAM: Fast, Robust Simultaneous Localization and Mapping Without Predetermined Landmarksrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD>N<EFBFBD>|
m<>+GG<00>http://www.roboticsproceedings.org/rss01/p36.pdfAdaptive Road Following using Self-Supervised Learning and Reverse Optical Flowrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD>8<EFBFBD>{ a{1GG<00>https://arxiv.org/pdf/quant-ph/9605043.pdfA fast quantum mechanical algorithm for database searchquantum_computing/2017-09-06T01:52:31.8243449712017-09-06T01:52:31.824344971<EFBFBD>?<3F>z
a<> 1GGdhttps://arxiv.org/pdf/quant-ph/9508027.pdfShors algorithm for polynomial time prime factorization (1995)quantum_computing/2017-09-06T01:52:31.8243449712017-09-06T01:52:31.824344971<EFBFBD>!<21>y Mc1GG`https://arxiv.org/abs/1512.02900Advances in quantum machine learning (2015)quantum_computing/2017-09-06T01:52:31.8243449712017-09-06T01:52:31.824344971<EFBFBD>A<EFBFBD>x
<02> ]7GG<00>https://research.microsoft.com/en-us/um/people/nick/coqasm.pdfCoq: The worlds best macro assembler?program_verification/2017-09-06T01:52:31.8241640622017-09-06T01:52:31.824164062<EFBFBD>o<EFBFBD>w
<01> O!GGqhttps://moodle.risc.jku.at/pluginfile.php/3407/mod_resource/content/1/A%20Calculus%20of%20Communicating%20Systems%5B1980%5D.pdfCalculus of Communicating Systemsprocesses/2017-09-06T01:52:31.8239260252017-09-06T01:52:31.823926025<EFBFBD>J<EFBFBD>u
<01>SIGG5https://github.com/papers-we-love/papers-we-love/blob/master/plt/theory-in-programming-practice.pdfTheory in Programming Practiceplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD><02>t <01>{<7B>GG|https://github.com/papers-we-love/papers-we-love/blob/master/plt/the-derivative-of-a-regular-type-one-hole-contexts.pdfThe Derivative of a Regular Type is its Type of One-Hole Contextsplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>w<EFBFBD>s
<01>wGGBhttps://github.com/papers-we-love/papers-we-love/blob/master/plt/programming-languages-application-and-interpretation.pdfProgramming Languages: Application and Interpretationplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>k<EFBFBD>r
<02>siGG<00>https://github.com/papers-we-love/papers-we-love/blob/master/plt/principal-type-schemes-for-functional-programs.pdfPrincipal type-schemes for functional programsplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>8<EFBFBD>q
<01>A7GG!https://github.com/papers-we-love/papers-we-love/blob/master/plt/predicate-dispatching.pdfPredicate Dispatchingplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>~<7E>p <02><EFBFBD>GG<00>https://github.com/papers-we-love/papers-we-love/blob/master/plt/on-understanding-types-data-abstraction-polymorphism.pdfOn Understanding Types, Data Abstraction, and Polymorphismplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>i<EFBFBD>o
<02>qgGG<00>https://github.com/papers-we-love/papers-we-love/blob/master/plt/fundamental-concepts-in-programming-languages.pdfFundamental Concepts in Programming Languagesplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>:<3A>n
<02>C7GGhttp://homepages.inf.ed.ac.uk/wadler/papers/propositions-as-types/propositions-as-types.pdfPropositions as Typesplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>0<EFBFBD>m wsGGhttps://www.cs.utah.edu/plt/publications/macromod.pdfComposable and Compilable Macros: You Want it When?plt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975<EFBFBD>&<26>l
<01>1#GGhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.9333&rep=rep1&type=pdfSoft Typingplt/2017-09-06T01:52:31.8233239752017-09-06T01:52:31.823323975 <00> _ s <0B> 
. a<08><07><06>'V<00>j<03>\<01><00>L<EFBFBD>
w<>7GGhttp://algo.inria.fr/flajolet/Publications/FlMa85.pdfProbabilistic Counting Algorithms for Data Base Applicationsstreaming_algorithms/2017-09-06T01:52:31.8258159182017-09-06T01:52:31.825815918<EFBFBD>@<40>
<02>W%GG<00>https://en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithmBoyerMoore string search algorithmstringology/2017-09-06T01:52:31.8260590822017-09-06T01:52:31.826059082<EFBFBD>8<EFBFBD>
<01>17%GGvhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.9460&rep=rep1&type=pdfFast String Searchingstringology/2017-09-06T01:52:31.8260590822017-09-06T01:52:31.826059082<EFBFBD><07> _'%GG<00>http://en.wikipedia.org/wiki/Suffix_arraysuffix arraysstringology/2017-09-06T01:52:31.8260590822017-09-06T01:52:31.826059082<EFBFBD>C<EFBFBD>
<02> q%GG<00>http://www.cas.mcmaster.ca/~bill/best/algorithms/07Taxonomy.pdfA Taxonomy of Suffix Array Construction Algorithmsstringology/2017-09-06T01:52:31.8260590822017-09-06T01:52:31.826059082<EFBFBD>h<EFBFBD> <02>/<2F>7GG<00>http://www.cs.ucsb.edu/~veronika/MAE/spacecomplexityapproxfreqmoments_alon_99.pdfThe Space Complexity of Approximating the Frequency Momentsstreaming_algorithms/2017-09-06T01:52:31.8258159182017-09-06T01:52:31.825815918<EFBFBD>M<EFBFBD>
<02> s7GG<00>http://www.inf.ed.ac.uk/teaching/courses/exc/reading/morris.pdfCounting large numbers of events in small registersstreaming_algorithms/2017-09-06T01:52:31.8258159182017-09-06T01:52:31.825815918<EFBFBD>E<EFBFBD>
<01>m3GGhttp://www.ee.columbia.edu/~dpwe/pubs/BarkCE05-sfd-spcomm.pdfDecoding speech in the presence of other sourcesspeech_recognition/2017-09-06T01:52:31.8253969732017-09-06T01:52:31.825396973<EFBFBD>9<EFBFBD> a{3GGhttp://www.cs.nyu.edu/~mohri/pub/csl01.pdfWeighted Finite-State Transducers in Speech Recognitionspeech_recognition/2017-09-06T01:52:31.8253969732017-09-06T01:52:31.825396973<EFBFBD>q<EFBFBD> <01><19>13GGJhttp://luthuli.cs.uiuc.edu/~daf/courses/Signals%20AI/Papers/HMMs/0.pdfA tutorial on hidden Markov models and selected applications in speech recognitionspeech_recognition/2017-09-06T01:52:31.8253969732017-09-06T01:52:31.825396973<EFBFBD>;<3B>
<02>]GG<00>http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdfWhy Silent Updates Boost Security (2009)security/2017-09-06T01:52:31.8250319822017-09-06T01:52:31.825031982<EFBFBD>I<EFBFBD>
<02>1]GG<00>http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdfBreach: Reviving The Crime Attack (2013)security/2017-09-06T01:52:31.8250319822017-09-06T01:52:31.825031982<EFBFBD>U<EFBFBD> <02><0F>GG<00>https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdfMaking Programs Forget: Enforcing Lifetime For Sensitive Data (2011)security/2017-09-06T01:52:31.8250319822017-09-06T01:52:31.825031982<EFBFBD>9<EFBFBD>
<01>UGG https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdfLooking inside the (Drop) Box (2013)security/2017-09-06T01:52:31.8250319822017-09-06T01:52:31.825031982<EFBFBD>+<2B> qcGG<00>https://internetcensus2012.bitbucket.io/paper.htmlInternet Census via Insecure Routers (2012)security/2017-09-06T01:52:31.8250319822017-09-06T01:52:31.825031982<EFBFBD>h<EFBFBD> <01>!<21>+GGihttps://rse-lab.cs.washington.edu/postscripts/3d-mapping-iser-10-final.pdfRGB-D Mapping: Using Depth Cameras for Dense 3D Modeling of Indoor Environmentsrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD><<3C>
o<>GG<00>http://msl.cs.uiuc.edu/~lavalle/papers/Lav98c.pdfRapidly-Exploring Random Trees: A New Tool for Path Planningrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD>m<EFBFBD> <01>)<29>-GGzhttp://www.kavrakilab.org/sites/default/files/kavraki1996prm-high-dim-conf.pdfProbablistic Roadmaps for Path Planning in High-Dimensional Configuration Spacesrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939<EFBFBD>l<EFBFBD> <02> <0B>GGG<00>http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5350749Online Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Eventsrobotics/2017-09-06T01:52:31.8246379392017-09-06T01:52:31.824637939
8
f<0E>f <0C><05>N <0B><06> <09><08><00>+<2B> <01>3<EFBFBD>7GGVhttps://github.com/papers-we-love/papers-we-love/blob/master/sublinear_algorithms/An-Elementary-Proof-of-a-Theorem-of-Johnson-and-Lindenstrauss.pdfAn Elementary Proof of a Theorem of Johnson and Lindenstrausssublinear_algorithms/2017-09-06T01:52:31.8263291022017-09-06T01:52:31.826329102<EFBFBD>|<7C> <01><07>k%EEKhttp://www.msr-waypoint.net/en-us/groups/ese/nagappan_tdd.pdfRealizing quality improvement through test driven development: results and experiences of four industrial teamstesting/tdd/2017-09-06T01:52:31.827002932017-09-06T01:52:31.82700293<EFBFBD>5<EFBFBD> si-GGhttp://ordiecole.com/squeak/cardelli_squeak1985.pdfSqueak: a Language for Communicating with Miceuser_interfaces/2017-09-06T01:52:31.8274838872017-09-06T01:52:31.827483887<EFBFBD>0<EFBFBD> Y%GGhttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=208278Operators on Inhomogeneous Time Seriestime_series/2017-09-06T01:52:31.8272150882017-09-06T01:52:31.827215088<EFBFBD>M<EFBFBD>
g<>/GG<00>http://www.vmware.com/pdf/asplos235_adams.pdfA Comparison of Software and Hardware Techniques for x86
Virtualizationvirtual_machines/2017-09-06T01:52:31.8276831052017-09-06T01:52:31.827683105<EFBFBD>5<EFBFBD>
<01>;/GGthttp://lafo.ssw.uni-linz.ac.at/papers/2013_Onward_OneVMToRuleThemAll.pdfOne VM to Rule Them Allvirtual_machines/2017-09-06T01:52:31.8276831052017-09-06T01:52:31.827683105<EFBFBD>(<28> C-GG@http://www.voelter.de/data/pub/projectingModuleFuture.pdfProjecting a modular futureuser_interfaces/2017-09-06T01:52:31.8274838872017-09-06T01:52:31.827483887 <0A><01>
U<>G%GGhttp://futuredata.stanford.edu/asap/ASAP: Automatic Smoothing for Attention Prioritization in Streaming Time Series Visualizationtime_series/2017-09-06T01:52:31.8272150882017-09-06T01:52:31.827215088<EFBFBD>.<2E> Y%GGhttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=208278Operators on Inhomogeneous Time Seriestime_series/2017-09-06T01:52:31.8272150882017-09-06T01:52:31.827215088 <0A>( <00><07>k%EEhttp://www.msr-waypoint.n<>R<EFBFBD>
U<>G%GG\http://futuredata.stanford.edu/asap/ASAP: Automatic Smoothing for Attention Prioritization in Streaming Time Series Visualizationtime_series/2017-09-06T01:52:31.8272150882017-09-06T01:52:31.827215088<EFBFBD><EFBFBD>
<01> _1GGLhttp://www.elizabete.com.br/site/Outros/Entradas/2012/11/19_Revisao_Sistematica_files/ConceitosRevisaoSistematica_Biolchini.pdfSystematic Review in Software Engineeringsystematic_review/2017-09-06T01:52:31.8265869142017-09-06T01:52:31.826586914, <00>3<EFBFBD>7GGhttps://github.com/papers-we-love/papers-we-love/blob/master/sublinear_algorithms/An-Elementary-Proof-of-a-Theorem-of-Johnson-and-Lindenstrauss.pdfAn Elementary Proof of a Theorem of Johnson and Lindenstrausssublinear_algorithms/2017-09-06T01:52:31.8263291022017-09-06T01:52:31.8263291<EFBFBD><10> <02><01>7GG<00>https://github.com/papers-we-love/papers-we-love/blob/master/sublinear_algorithms/1985-Flajolet-Probabilistic-counting.pdfProbablistic Counting Algorithms for Database Applicationssublinear_algorithms/2017-09-06T01:52:31.8263291022017-09-06T01:52:31.826329102
<07><0F>h7 <07><07><0E><0E>^ <0A> <0A> <0A> n >  <0C> | J  <0B> m D 
<EFBFBD>
<EFBFBD>
+ <09> 1<08>82ghttp://www.vmware.com/pdf/asplos235_adams.pdf>http://www.voelter.de/data/pub/projectingModuleFuture.pdf<04>https://github.com/papers-we-love/papers-we-love/blob/master/plt/on-understanding-types-data-abstraction-polymorphism.pdf<00>x<04>qhttps://github.com/papers-we-love/papers-we-love/blob/master/plt/fundamental-concepts-in-programming-languages.pdf<00>f<04>Mhttps://github.com/papers-we-love/papers-we-love/blob/master/mathematics/transcendence-of-pi.pdfǁ<04>%https://github.com/papers-we-love/papers-we-love/blob/master/caching/a-constant-algorithm-for-implementing-the-lfu-cache-eviction-scheme.pdf<17><04> https://github.com/papers-we-love/papers-we-love/blob/master/artificial_intelligence/3-bayesian-network-inference-algorithm.pdf9whttps://github.com/luanfujun/deep-photo-styletransfer/.ahttps://github.com/ibab/tensorflow-wavenet)Whttps://github.com/basveeling/wavenet(Uhttps://eprint.iacr.org/2016/461.pdfLO<04>https://en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithmI<04>https://ecommons.cornell.edu/bitstream/handle/1813/7341/98-1687.pdf<00>B<04>https://deepmind.com/blog/wavenet-generative-model-raw-audio/1ghttps://cs.uwaterloo.ca/~bernard/hyperdex.pdfaU<04>+https://cs.brown.edu/~sk/Publications/Papers/Published/cgkmf-teach-gc/paper.pdf<00>;{https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdfH/ahttps://arxiv.org/pdf/quant-ph/9605043.pdf<00>/ahttps://arxiv.org/pdf/quant-ph/9508027.pdf<00>(Uhttps://arxiv.org/pdf/1703.07511.pdf.(Uhttps://arxiv.org/pdf/1609.03499.pdf%Mhttps://arxiv.org/abs/1512.02900<00>%Mhttps://arxiv.org/abs/1510.00116<00>Q<04>%https://amplab.cs.berkeley.edu/wp-content/uploads/2013/03/mdcc-eurosys13.pdffF<04>http://zoo.cs.yale.edu/classes/cs422/2013/bib/terry95managing.pdfd7qhttp://xlinux.nist.gov/dads//HTML/ahoCorasick.html<00>.ahttp://www.youtube.com/watch?v=2KoLnIwoZKU*Yhttp://www.vldb.org/conf/1994/P439.PDF0ehttp://www.turingarchive.org/browse.php/B/12L<04>http://www.thocp.net/biographies/papers/backus_turingaward_lecture.pdf<00>J<04>http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf <06>q k <0C> <0B> 0
e k~<07>q6%a|<03><02><00>A<EFBFBD> yq5GG<00>https://www.cs.cmu.edu/~dga/papers/epaxos-sosp2013.pdfThere Is More Consensus in Egalitarian Parliamentsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>c<EFBFBD> <02><07>#5GG<00>http://www.cs.berkeley.edu/~franklin/Papers/p315-franklin.pdfTransactional Client-Server Cache Consistency: Alternatives and Performancedistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>%<25>
<02> #5GG<00>http://en.wikipedia.org/wiki/Moving_magnet_and_conductor_problemasymmetriesdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>I<EFBFBD>
<01> m5GGbhttp://research.microsoft.com/pubs/80693/vl2-sigcomm09-final.pdfVL2: A Scalable and Flexible Data Center Networkdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>e<EFBFBD>
a<>Q5GG http://www.pmg.csail.mit.edu/papers/vr.pdfViewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systemsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>a<EFBFBD> <02><0F>5GG<00>http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdfUntraceable Electronic Mail, Return Addresses, and Digital Pseudonymsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>@<40> us5GG<00>http://anil.recoil.org/papers/2013-asplos-mirage.pdfUnikernels: Library Operating Systems for the Clouddistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>Q<EFBFBD>
<02>m5GG<00>http://db.disi.unitn.eu/pages/VLDBProgram/pdf/industry/p871-curtiss.pdfUnicorn: A System for Searching the Social Graphdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.8106909189<00> yq5GGhttps://www.cs.cmu.edu/~dga/papers/epaxos-sosp2013.pdfThere Is More Consensus in Egalitarian Parliamentsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>=<3D>
<01>%=5GGMhttp://research.microsoft.com/en-us/um/people/lamport/pubs/lamport-paxos.pdfThe Part-Time Parliamentdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>i<EFBFBD> <02>)<29> 5GG<00>http://research.microsoft.com/en-us/um/people/fournet/papers/join-tutorial.pdfThe Join Calculus: a Language for Distributed Mobile Programmingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>v<EFBFBD> <01>G<EFBFBD> 5GGjhttp://static.googleusercontent.com/media/research.google.com/en/us/archive/chubby-osdi06.pdfThe Chubby Lock Service for Loosely-Coupled Distributed Systemsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>H
<09>1I5GGhttp://www.andrew.cmu.edu/course/15-749/READINGS/required/resilience/lamport82.pdfThe Byzantine Generals Problemdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>D~
<02> e5GG<00>http://people.csail.mit.edu/matei/papers/2013/sosp_sparrow.pdfSparrow: Distributed, Low Latency Schedulingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>N}
q<>5GG<00>http://www.mshah.org/papers/sosp_2007_aguilera.pdfSinfonia: A New Paradigm for Building Scalable Distributed Systemsdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD> | iA5GG4http://nms.lcs.mit.edu/papers/ron-sosp2001.pdfResilient Overlay Networksdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>K{ 5GG<00>http://sigops.org/sosp/sosp13/papers/p151-mashtizadeh.pdfReplication, History, and Grafting in the Ori File Systemdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<01>oo5GG<00>http://kowshik.github.io/JPregel/pregel_paper.pdfPregel: A System for Large-Scale Graph Processingdistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918<EFBFBD>y <01>q<EFBFBD>5GG(http://www.itu.dk/stud/speciale/bepjea/xwebtex/litt/practical-byzantine-fault-tolerance-and-proactive-recovery.pdfPractical Byzantine Fault Tolerance and Proactive Recoverydistributed_systems/2017-09-06T01:52:31.8106909182017-09-06T01:52:31.810690918  <0A>
d<07><00>
i<02>/GGSqueak: a language for communicating with mice<07>Graphical user interfaces are difficult to implement because of the essential concurrency among multiple interaction devices, such as mice, buttons, and keyboards. <i>Squeak</i> is a user interface implementation language that exploits this concurrency rather than hiding it, helping the programmer to express interactions using multiple devices. We present the motivation, design and semantics of <i>squeak</i>. The language is based on concurrent programming constructs but can be compiled into a conventional sequential language; our implementation generates C code. We discuss how <i>squeak</i> programs can be integrated into a graphics system written in a conventional language to implement large but regular user interfaces, and close with a description of the formal semantics.SIGGRAPH02017-09-06T01:52:38.5045039062017-09-06T01:52:38.504503906<EFBFBD>

_<02>9GGSecurity Concerns in Android mHealth Apps<07>Mobile Health (mHealth) applications lie outside of regulatory protection such as HIPAA, which requires a baseline of privacy and security protections appropriate to sensitive medical data. However, mHealth apps, particularly those in the app stores for iOS and Android, are increasingly handling sensitive data for both professionals and patients. This paper presents a series of three studies of the mHealth apps in Google Play that show that mHealth apps make widespread use of unsecured Internet communications and third party servers. Both of these practices would be considered problematic under HIPAA, suggesting that increased use of mHealth apps could lead to less secure treatment of health data unless mHealth vendors make improvements in the way they communicate and store data.AMIA02017-09-06T01:52:37.6891340332017-09-06T01:52:37.689134033<EFBFBD>D
}<02> GGThe PageRank Citation Ranking: Bringing Order to the Web<07>The importance of a Web page is an inherently subjective matter, which depends on the readers interests, knowledge and attitudes. But there is still much that can be said objectively about the relative importance of Web pages. This paper describes PageRank, a method for rating Web pages objectively and mechanically, eeectively measuring the human interest and attention devoted to them. We compare PageRank to an idealized random Web surfer. We show how to eeciently compute PageRank for large numbers of pages. And, we showhow to apply PageRank to search and to user navigation.02017-09-06T01:52:36.1404409182017-09-06T01:52:36.140440918<EFBFBD>} <00> <02>kGGOmega: flexible, scalable schedulers for large compute clusters<07>Increasing scale and the need for rapid response to changing requirements are hard to meet with current monolithic cluster scheduler architectures. This restricts the rate at which new features can be deployed, decreases efficiency and utilization, and will eventually limit cluster growth. We present a novel approach to address these needs using parallelism, shared state, and lock-free optimistic concurrency control.
We compare this approach to existing cluster scheduler designs, evaluate how much interference between schedulers occurs and how much it matters in practice, present some techniques to alleviate it, and finally discuss a use case highlighting the advantages of our approach -- all driven by real-life Google production workloads.EuroSys02017-09-06T01:52:35.1995559082017-09-06T01:52:35.199555908<EFBFBD>
I<02>7KGGThe Byzantine Generals Problem<07>A definition • Byzantine (www.m-w.com): 1: of, relating to, or characteristic of the ancient city of Byzantium … 4b: intricately involved : labyrinthine <rules of Byzantine complexity> • Lamport's reason: " I have long felt that, because it was posed as a cute problem about philosophers seated around a table, Dijkstra's dining philosopher's problem received much more attention than it deserves. "ACM Trans. Program. Lang. Syst.02017-09-06T01:52:34.3018610842017-09-06T01:52:34.301861084 <01> <0C>!<04><01>o
W GGQuickCheck Testing for Fun and Profit<07>PADL02017-09-06T01:52:43.5654790042017-09-06T01:52:43.565479004<EFBFBD>r <00>/<02>7GGEverything you always wanted to know about synchronization but were afraid to ask<07>This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We do so on different types of architectures, from single-socket -- uniform and non-uniform -- to multi-socket -- directory and broadcast-based -- many-cores. We draw a set of observations that, roughly speaking, imply that scalability of synchronization is mainly a property of the hardware.SOSP02017-09-06T01:52:42.7891760252017-09-06T01:52:42.789176025<EFBFBD> <00>?<02>uGGConditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data<07>We present conditional random fields, a framework for building probabilistic models to segment and label sequence data. Conditional random fields offer several advantages over hidden Markov models and stochastic grammars for such tasks, including the ability to relax strong independence assumptions made in those models. Conditional random fields also avoid a fundamental limitation of maximum entropy Markov models (MEMMs) and other discrimi-native Markov models based on directed graph-ical models, which can be biased towards states with few successor states. We present iterative parameter estimation algorithms for conditional random fields and compare the performance of the resulting models to HMMs and MEMMs on synthetic and natural-language data.ICML02017-09-06T01:52:41.8810778812017-09-06T01:52:41.881077881<EFBFBD>x <00><02>CCEEThe effects of video games on laparoscopic simulator skills.<07>BACKGROUND
Recently, there has been a growth in studies supporting the hypothesis that video games have positive effects on basic laparoscopic skills. This review discusses all studies directly related to these effects.
DATA SOURCES
A search in the PubMed and EMBASE databases was performed using synonymous terms for video games and laparoscopy. All available articles concerning video games and their effects on skills on any laparoscopic simulator (box trainer, virtual reality, and animal models) were selected.
CONCLUSIONS
Video game experience has been related to higher baseline laparoscopic skills in different studies. There is currently, however, no standardized method to assess video game experience, making it difficult to compare these studies. Several controlled experiments have, nevertheless, shown that video games cannot only be used to improve laparoscopic basic skills in surgical novices, but are also used as a temporary warming-up before laparoscopic surgery.American journal of surgery02017-09-06T01:52:40.738877932017-09-06T01:52:40.73887793<EFBFBD>a
}<02>Q GGKafka: a Distributed Messaging System for Log Processing<07>Log processing has become a critical component of the data pipeline for consumer internet companies. We introduce Kafka, a distributed messaging system that we developed for collecting and delivering high volumes of log data with low latency. Our system incorporates ideas from existing log aggregators and messaging systems, and is suitable for both offline and online message consumption. We made quite a few unconventional yet practical design choices in Kafka to make our system efficient and scalable. Our experimental results show that Kafka has superior performance when compared to two popular messaging systems. We have been using Kafka in production for some time and it is processing hundreds of gigabytes of new data each day.02017-09-06T01:52:39.2719528812017-09-06T01:52:39.271952881 <02> F<08><02><00>q
k<02>{GGViewstamped Replication: A General Primary Copy<07>One of the potential benefits of distributed systems is their use in providing highly-available services that are likely to be usable when needed. Availabilay is achieved through replication. By having inore than one copy of information, a service continues to be usable even when some copies are inaccessible, for example, because of a crash of the computer where a copy was stored. This paper presents a new replication algorithm that has desirable performance properties. Our approach is based on the primary copy technique. Computations run at a primary. which notifies its backups of what it has done. If the primary crashes, the backups are reorganized, and one of the backups becomes the new primary. Our method works in a general network with both node crashes and partitions. Replication causes little delay in user computations and little information is lost in a reorganization; we use a special kind of timestamp called a viewstamp to detect lost information. 1 Introduction One of the potential benefits of distributed systems is their use in providing highly-available services, that is, services that are likely to be up and accessible when needed. Availability is essential to many computer-based services; for example, in airline reservation systems the failure of a single computer can prevent ticket sales for a considerable time, causing a loss of revenue and passenger goodwill.PODC02017-09-06T01:52:46.3349519042017-09-06T01:52:46.334951904<EFBFBD>7
m<02> GGEvaluating Generative Models for Text Generation<07>Generating human quality text is a challenging problem because of ambiguity of meaning and difficulty in modeling long term semantic connections. Recurrent Neural Networks (RNNs) have shown promising results in this problem domain, with the most common approach to its training being to maximize the log predictive likelihood of each true token in the training sequence given the previously observed tokens. Scheduled Sampling, proposed by Bengio et al. (2015), was proposed as an improvement to the maximum likelihood approach by stochastically introducing inference steps during training steps. More recently, Generative Adversarial Nets (GAN) that use a discriminative model to guide the training of the generative model have become popular in vision domain, and also reinterpreted as a reinforcement learning problem to adapt it to text generation by Yu et al. (2016). Here we test and compare these three approaches and thus hope to extend the evaluation presented for the SeqGAN model in Yu et al. (2016) using two additional datasets and an additional perplexity evaluation metric.02017-09-06T01:52:45.4431101072017-09-06T01:52:45.443110107<EFBFBD>7
5<02>#/GGInstant architecture<07>This paper presents a new method for the automatic modeling of architecture. Building designs are derived using split grammars, a new type of parametric set grammar based on the concept of shape. The paper also introduces an attribute matching system and a separate control grammar, which offer the flexibility required to model buildings using a large variety of different styles and design ideas. Through the adaptive nature of the design grammar used, the created building designs can either be generic or adhere closely to a specified goal, depending on the amount of data available.ACM Trans. Graph.02017-09-06T01:52:44.4610769042017-09-06T01:52:44.461076904 C 8 C<00>B
_<02>+GGMessage Analysis for Concurrent Languages<07>We describe an analysis-driven storage allocation scheme for concurrent languages that use message passing with copying semantics. The basic principle is that in such a language, data which is not part of any message does not need to be allocated in a shared data area. This allows for deallocation of thread-specific data without requiring global synchronization and often without even triggering garbage collection. On the other hand, data that is part of a message should preferably be allocated on a shared area, which allows for fast (O(1)) interprocess communication that does not require actual copying. In the context of a dynamically typed, higher-order, concurrent functional language, we present a static message analysis which guides the allocation. As shown by our performance evaluation, conducted using an industrial-strength language implementation , the analysis is effective enough to discover most data which is to be used as a message, and to allow the allocation scheme to combine the best performance characteristics of both a process-centric and a shared-heap memory architecture.SAS02017-09-06T01:52:49.3508120122017-09-06T01:52:49.350812012<EFBFBD>-
C<02># GGInteractive Horizon Mapping<07>Shadows play an important role in perceiving the shape and texture of an object. While some previous interactive shadowing methods are appropriate for casting shadows on other geometry they can not be applied to bump maps (which contain no explicit geometry.) Horizon Mapping is a technique used to compute shadows for bump-mapped surfaces. We map the technique into modern graphics API's and extend it to account more accurately for the geometry of the underlying surface. We also use it to represent limited self-shadowing for pure geometry. In mapping the algorithm to hardware, we use a novel method to interpolate orientation in tangent space over the surface. We show results of self-shadowing at frame rates.02017-09-06T01:52:48.3073278812017-09-06T01:52:48.307327881<EFBFBD>E <00> <02> GGMetaobject protocols: Why we want them and what else they can do<07>All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. Originally conceived a s a n e at idea that could help solve problems in the design and implementation of CLOS, the metaobject protocol framework now appears to have applicability to a wide range of problems that come up in high-level languages. This chapter sketches this wider potential, by drawing an analogy to ordinary language design, by presenting some early design principles, and by presenting an overview of three new metaobject protcols we have designed that, respectively, control the semantics of Scheme, the compilation of Scheme, and the static parallelization of Scheme programs.02017-09-06T01:52:47.4264470212017-09-06T01:52:47.426447021 % C%<00>
#<02>GGSoft Typing<07>Type systems are designed to prevent the improper use of program operations. They can be classified as either static or dynamic depending on when they detect type errors. Static type systems detect potential type errors at compile-time and prevent program execution. Dynamic type systems detect type errors at run-time and abort program execution. Static type systems have two important advantages over dynamic type systems. First, they help programmers detect a large class of program errors before exe-cut ion. Second, the y extract information that a compiler can exploit to produce more efficient code. The price paid for these advantages, however, is a loss of expressiveness, generality, and semantic simplicity. This paper presents a generalization of static and dynamic typing—called soft typing-that combines the best features of both approaches, The key idea underlying soft typing is that a static type checker need not reject programs that contain potential type errors. Instead, the type checker can insert explicit run-time checks around " suspect " arguments of p~imitive operations , converting dynamically typed programs into statically type-correct form. The inserted run-time checks identify program phrases that may be erroneous. For soft typing to be effective, the type system must avoid inserting unnecessary run-time checks. To accomplish this objective, we have developed an extension of the ML type system supporting union types and recursive types that assigns types to a wider class *The work of both authors was partially supported by NSF and DARPA. Permission to copy without fee ell or part of this material is granted provided that the copies are not made or distributed for direct commercial advantege, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission.PLDI02017-09-06T01:52:51.2714089362017-09-06T01:52:51.271408936<EFBFBD>: <00>I<02>-GGAnd then there were none: a stall-free real-time garbage collector for reconfigurable hardware<07>Programmers are turning to radical architectures such as reconfigurable hardware (FPGAs) to achieve performance. But such systems, programmed at a very low level in languages with impoverished abstractions, are orders of magnitude more complex to use than conventional CPUs. The continued exponential increase in transistors, combined with the desire to implement ever more sophisticated algorithms, makes it imperative that such systems be programmed at much higher levels of abstraction. One of the fundamental high-level language features is automatic memory management in the form of garbage collection.
We present the first implementation of a complete garbage collector in hardware (as opposed to previous "hardware-assist" techniques), using an FPGA and its on-chip memory. Using a completely concurrent snapshot algorithm, it provides single-cycle access to the heap, and never stalls the mutator for even a single cycle, achieving a deterministic mutator utilization (MMU) of 100%.
We have synthesized the collector to hardware and show that it never consumes more than 1% of the logic resources of a high-end FPGA. For comparison we also implemented explicit (malloc/free) memory management, and show that real-time collection is about 4% to 17% slower than malloc, with comparable energy consumption. Surprisingly, in hardware real-time collection is superior to stop-the-world collection on every performance axis, and even for stressful micro-benchmarks can achieve 100% MMU with heaps as small as 1.01 to 1.4 times the absolute minimum.PLDI02017-09-06T01:52:50.3004750982017-09-06T01:52:50.300475098  _<00>X
S<02>/GGGOrganizing Programs Without Classes<07>All organizational functions carried out by classes can be accomplished in a simple and natural way by object inheritance in classless languages, with no need for special mechanisms. A single model—dividing types into prototypes and traits—supports sharing of behavior and extending or replacing representations. A natural extension, dynamic object inheritance, can model behavioral modes. Object inheritance can also be used to provide structured name spaces for well-known objects. Classless languages can even express " class-based " encapsulation. These stylized uses of object inheritance become instantly recognizable idioms, and extend the repertory of organizing principles to cover a wider range of programs.Lisp and Symbolic Computation02017-09-06T01:52:53.2072490232017-09-06T01:52:53.207249023<EFBFBD>
g<02>[GGVEWS: A Wikipedia Vandal Early Warning System<07>We study the problem of detecting vandals on Wikipedia <i>before</i> any human or known vandalism detection system reports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a novel set of user editing patterns as features to classify some users as vandals. Our Wikipedia Transition Probability Matrix (WTPM) approach uses a set of features derived from a transition probability matrix and then reduces it via a neural net auto-encoder to classify some users as vandals. The VEWS approach merges the previous two approaches. Without using any information (e.g. reverts) provided by other users, these algorithms each have over 85% classification accuracy. Moreover, when temporal recency is considered, accuracy goes to almost 90%. We carry out detailed experiments on a new data set we have created consisting of about 33K Wikipedia users (including both a black list and a white list of editors) and containing 770K edits. We describe specific behaviors that distinguish between vandals and non-vandals. We show that VEWS beats ClueBot NG and STiki, the best known algorithms today for vandalism detection. Moreover, VEWS detects far more vandals than ClueBot NG and on average, detects them 2.39 edits before ClueBot NG when both detect the vandal. However, we show that the combination of VEWS and ClueBot NG can give a fully automated vandal early warning system with even higher accuracy.KDD02017-09-06T01:52:52.2344189452017-09-06T01:52:52.234418945 f<00>b
w<02>QGGComposable and compilable macros: : you want it when?<07>Many macro systems, especially for Lisp and Scheme, allow macro transformers to perform general computation. Moreover, the language for implementing compile-time macro transformers is usually the same as the language for implementing run-time functions. As a side effect of this sharing, implementations tend to allow the mingling of compile-time values and run-time values, as well as values from separate compilations. Such mingling breaks programming tools that must parse code without executing it. Macro implementors avoid harmful mingling by obeying certain macro-definition protocols and by inserting phase-distinguishing annotations into the code. However, the annotations are fragile, the protocols are not enforced, and programmers can only reason about the result in terms of the compiler's implementation. MzScheme---the language of the PLT Scheme tool suite---addresses the problem through a macro system that separates compilation without sacrificing the expressiveness of macros.ICFP02017-09-06T01:52:54.8656269532017-09-06T01:52:54.865626953<EFBFBD> <00><02>#GGA LISP garbage-collector for virtual-memory computer systems<07>In this paper a garbage-collection algorithm for list-processing systems which operate within very large virtual memo, ies is described. The object of the algorithm is more the compaction of active storage than the discovery of free storage. Because free storage is never really exhausted, the decision to garbage collect is not easily made; therefore, various criteria of this decision are discussed. Users of list processing are familiar with garbage-collectors of the sort first described by McCarthy [1]. Systems using collectors of this sort run freely until space is nearly exhausted. Then, all execution stops while a marking routine marks every free-storage cell which is reachable by program. Finally, a gathering routine scans the free-storage area, collecting the unmarked cells onto a free-storage list, and unmarking the marked cells. Garbage-collection has always been necessary because the computer's supply of addressable space has always been much less than the total space used during execution of a list-processing program. Garbage-collection makes it possible to reuse the system's limited supply of addressable space. (01). Reproduction in whole or in part is permitted for any purpose of the United States Government. With the coming of virtual-memory systems [2, 3], the problem of limited addressable space is hardly present. In MULTICS, for example, a LISP system might be made to operate with a potential free-storage list of billions of LISP cells. Such a system may run almost endlessly with no need for garbage-collection. As operation proceeds, however, performance degrades. This is because the active-list-storage becomes spread over a larger and larger region of virtual storage, and it becomes increasingly likely that a given reference to this virtual memory will require a reference to secondary storage. Bobrow and Murphy [4] faced a substantially similar problem, but the virtual memory of their system was not yet so large as to be effectively infinite. Many of their strategies for pointer enrichment and for data segmenta-tion are appropriate to an infinite memory system, but their garbage-collector is not. What is needed is a collector whose task is not so much the discovery of free storage as the compaction of active storage. It is especially clear that a routine will not do if its gathering phase must scan all potential storage. The procedure is shown in detail below. Briefly, it operates by dividing the potential storage space into two semispaces. Only one semispace is used for free storage (only one semispaee …Commun. ACM02017-09-06T01:52:54.0791999512017-09-06T01:52:54.079199951 Z <0B><02>Z<00>h <00><02>-+EEThe treadmill: real-time garbage collection without motion sickness<07>A simple real-time garbage collection algorithm is presented which does not copy, there
Commodity switching hardware is now becoming available with programmable control interfaces and with very high port speeds at very low port cost, making this the right time to redesign the data center networking infrastructure. In this paper, we describe monsoon, a new network architecture, which scales and commoditizes data center networking monsoon realizes a simple mesh-like architecture using programmable commodity layer-2 switches and servers. In order to scale to 100,000 servers or more,monsoon makes modifications to the control plane (e.g., source routing) and to the data plane (e.g., hot-spot free multipath routing via Valiant Load Balancing). It disaggregates the function of load balancing into a group of regular servers, with the result that load balancing server hardware can be distributed amongst racks in the data center leading to greater agility and less fragmentation. The architecture creates a huge, flexible switching domain, supporting any server/any service and unfragmented server capacity at low cost.PRESTO02017-09-06T01:52:56.7661550292017-09-06T01:52:56.766155029<EFBFBD>q <00><02>+/GGMap-reduce-merge: simplified relational data processing on large clusters<07>Map-Reduce is a programming model that enables easy development of scalable parallel applications to process a vast amount of data on large clusters of commodity machines. Through a simple interface with two functions, map and reduce, this model facilitates parallel implementation of many real-world tasks such as data processing jobs for search engines and machine learning.
However,this model does not directly support processing multiple related heterogeneous datasets. While processing relational data is a common need, this limitation causes difficulties and/or inefficiency when Map-Reduce is applied on relational operations like joins.
We improve Map-Reduce into a new model called Map-Reduce-Merge. It adds to Map-Reduce a Merge phase that can efficiently merge data already partitioned and sorted (or hashed) by map and reduce modules. We also demonstrate that this new model can express relational algebra operators as well as implement several join algorithms.SIGMOD Conference02017-09-06T01:52:55.8685910642017-09-06T01:52:55.868591064 5E<04>5<00>1
w<02>oGGAsynchronous functional reactive programming for GUIs<07>Graphical user interfaces (GUIs) mediate many of our interactions with computers. Functional Reactive Programming (FRP) is a promising approach to GUI design, providing high-level, declarative, compositional abstractions to describe user interactions and time-dependent computations. We present Elm, a practical FRP language focused on easy creation of responsive GUIs. Elm has two major features: simple declarative support for <i>Asynchronous FRP</i>; and purely functional graphical layout.
Asynchronous FRP allows the programmer to specify when the global ordering of event processing can be violated, and thus enables efficient concurrent execution of FRP programs; long-running computation can be executed asynchronously and not adversely affect the responsiveness of the user interface.
Layout in Elm is achieved using a purely functional declarative framework that makes it simple to create and combine text, images, and video into rich multimedia displays.
Together, Elm's two major features simplify the complicated task of creating responsive and usable GUIs.PLDI02017-09-06T01:53:00.7497880862017-09-06T01:53:00.749788086<EFBFBD>Y
m<02>)5GGDecoding speech in the presence of other sources<07>The statistical theory of speech recognition introduced several decades ago has brought about low word error rates for clean speech. However, it has been less successful in noisy conditions. Since extraneous acoustic sources are present in virtually all everyday speech communication conditions, the failure of the speech recognition model to take noise into account is perhaps the most serious obstacle to the application of ASR technology. Approaches to noise-robust speech recognition have traditionally taken one of two forms. One set of techniques attempts to estimate the noise and remove its effects from the target speech. While noise estimation can work in low-to-moderate levels of slowly-varying noise, it fails completely in louder or more variable conditions. A second approach utilises noise models and attempts to decode speech taking into account thei presence. Again, model-based techniques can work for simple noises, but they are computationally complex under realistic conditions and require models for all sources present in the signal. In this paper, we propose a statistical theory of speech recognition in the presence of other acoustic sources. Unlike earlier model-based approaches, our framework makes no assumptions about the noise background, although it can exploit such information if it is available. It does not require models for background sources, nor an estimate of their number. The new approach extends statistical ASR by introducing a segregation model in addition to the conventional acoustic and language models. While the conventional statistical ASR problem is to find the most likely sequence of speech models which generated a given observation sequence, the new approach additionally determines the most likely set of signal fragments which make up the speech signal. Although the framework is completely general, we provide one interpretation of the segregation model based on missing-data theory. We derive an efficient HMM decoder which searches both across subword state and across alternative segregations of the signal between target and interference. We call this modified system the speech fragment decoder. The value of the speech fragment decoder approach has been verified through experiments on small-vocabulary tasks in high-noise conditions. For instance, in a noise-corrupted connected digit task, the new approach decreases the word error rate in the condition of factory noise at 5 dB SNR from over 59% for a standard ASR system to less than 22%.Speech Communication02017-09-06T01:52:59.8031960452017-09-06T01:52:59.803196045<EFBFBD>8
<00> gGGExperiences with QuickCheck: Testing the Hard Stuff and Staying Sane<07>A List of Successes That Can Change the World02017-09-06T01:52:58.5945649412017-09-06T01:52:58.594564941 <03> f<03><00> <00><02>q GGPiranha: A scalable architecture based on single-chip multiprocessing<07>The microprocessor industry is currently struggling with higher development costs and longer design times that arise from exceedingly complex processors that are pushing the limits of instruction-level parallelism. Meanwhile, such designs are especially ill suited for important commercial applications, such as on-line transaction processing (OLTP), which suffer from large memory stall times and exhibit little instruction-level parallelism. Given that commercial applications constitute by far the most important market for high-performance servers, the above trends emphasize the need to consider alternative processor designs that specifically target such workloads. The abundance of explicit thread-level parallelism in commercial workloads, along with advances in semiconductor integration density, identify chip multiprocessing (CMP) as potentially the most promising approach for designing processors targeted at commercial servers. This paper describes the Piranha system, a research prototype being developed at Compaq that aggressively exploits chip multi-processing by integrating eight simple Alpha processor cores along with a two-level cache hierarchy onto a single chip. Piranha also integrates further on-chip functionality to allow for scalable multiprocessor configurations to be built in a glueless and modular fashion. The use of simple processor cores combined with an industry-standard ASIC design methodology allow us to complete our prototype within a short time-frame, with a team size and investment that are an order of magnitude smaller than that of a commercial microprocessor. Our detailed simulation results show that while each Piranha processor core is substantially slower than an aggressive next-generation processor, the integration of eight cores onto a single chip allows Piranha to outperform next-generation processors by up to 2.9 times (on a per chip basis) on important workloads such as OLTP. This performance advantage can approach a factor of five by using full-custom instead of ASIC logic. In addition to exploiting chip multiprocessing, the Piranha prototype incorporates several other unique design choices including a shared second-level cache with no inclusion, a highly optimized cache coherence protocol, and a novel I/O architecture.02017-09-06T01:53:02.5670129392017-09-06T01:53:02.567012939<EFBFBD> <00>'<02> GGParallel generational-copying garbage collection with a block-structured heap<07>We present a parallel generational-copying garbage collector implemented for the Glasgow Haskell Compiler. We use a block-structured memory allocator, which provides a natural granularity for dividing the work of GC between many threads, leading to a simple yet effective method for parallelising copying GC. The results are encouraging: we demonstrate wall-clock speedups of on average a
G<02>EELooking Inside the (Drop) Box<07>Dropbox is a cloud based file storage service used by more than 100 million users. In spite of its widespread popularity, we believe that Dropbox as a platform hasn't been analyzed extensively enough from a security standpoint. Also, the previous work on the security analysis of Dropbox has been heavily censored. Moreover, the existing Python bytecode reversing techniques are not enough for reversing hardened applications like Dropbox. This paper presents new and generic techniques, to reverse engineer frozen Python applications, which are not limited to just the Dropbox world. We describe a method to bypass Dropbox's two factor authentication and hijack Dropbox accounts. Additionally, generic techniques to intercept SSL data using code injection techniques and monkey patching are presented. We believe that our biggest contribution is to open up the Dropbox platform to further security analysis and research. Dropbox will / should no longer be a black box. Finally, we describe the design and implementation of an open-source version of Dropbox client (and yes, it runs on ARM too).WOOT02017-09-06T01:53:04.430872072017-09-06T01:53:04.43087207<EFBFBD>{
[<02>GGFlashNet: flash/network stack co-design<07>During the past decade, network and storage devices have undergone rapid performance improvements, delivering ultra-low latency and several Gbps of bandwidth. Nevertheless, current network and storage stacks fail to deliver this hardware performance to the applications, often due to the loss of IO efficiency from stalled CPU performance. While many efforts attempt to address this issue solely on either the network or the storage stack, achieving high-performance for networked-storage applications requires a holistic approach that considers both.
In this paper, we present FlashNet, a software IO stack that unifies high-performance network properties with flash storage access and management. FlashNet builds on RDMA principles and abstractions to provide a direct, asynchronous, end-to-end data path between a client and remote flash storage. The key insight behind FlashNet is to co-design the stack's components (an RDMA controller, a flash controller, and a file system) to enable cross-stack optimizations and maximize IO efficiency. In micro-benchmarks, FlashNet improves 4kB network IOPS by 38.6% to 1.22M, decreases access latency by 43.5% to 50.4 <i>&#181;</i>secs, and prolongs the flash lifetime by 1.6--5.9&#215; for writes. We illustrate the capabilities of FlashNet by building a Key-Value store, and porting a distributed data store that uses RDMA on it. The use of FlashNet's RDMA API improves the performance of KV store by 2&#215;, and requires minimum changes for the ported data store to access remote flash devices.SYSTOR02017-09-06T01:53:03.5151740722017-09-06T01:53:03.515174072 <02> *
i<02><00>E#
w<02>GGImaging vector fields using line integral convolution<07>Imaging vector fields has applications in science, art, image processing and special effects. An effective new approach is to use linear and curvilinear filtering techniques to locally blur textures along a vector field. This approach builds on several previous tex-It is, however, unique because it is local, one-dimensional and independent of any predefined geometry or texture. The technique is general and capable of imaging arbitrary two-and three-dimensional vector fields. The local one-dimensional nature of the algorithm lends itself to highly parallel and efficient implementations. Furthermore, the curvilinear filter is capable of rendering detail on very intricate vector fields. Combining this technique with other rendering and image processing techniques — like periodic motion filtering — results in richly informative and striking images. The technique can also produce novel special effects. 1. INTRODUCTION Upon first inspection, imaging vector fields appears to have limited application — confined primarily to scientific visualization. However, much of the form and shape in our environment is a function of not only image intensity and color, but also of directional information such as edges. Painters, sculptors, photographers , image processors[16] and computer graphics researchers[9] have recognized the importance of direction in the process of image creation and form. Hence, algorithms that can image such directional information have wide application across both scientific and artistic domains. Such algorithms should possess a number of desirable and sometimes conflicting properties including: accuracy, locality of calculation, simplicity, controllability and generality. Line Integral Convolution (LIC) is a new technique that possesses many of these properties. Its generality allows for the introduction of a comSIGGRAPH02017-09-06T01:53:07.1697209472017-09-06T01:53:07.169720947<EFBFBD>>"
<00>{ GGAnalysis of Three Bayesian Network Inference Algorithms: Variable Elimination, Likelihood Weighting, and Gibbs Sampling<07>02017-09-06T01:53:06.2057958982017-09-06T01:53:06.205795898<EFBFBD>S!
K<02>o CCEfficient Predicate Dispatching<07>The speed of method dispatching is an important issue in the overall performance of object-oriented programs. We have developed an algorithm for constructing efficient dispatch functions for the general predicate dispatching model, which generalizes single dispatching, multiple dispatching, predicate classes and classifiers, and pattern-matching. Our algorithm generates a lookup DAG each of whose nodes represents an N-way test of the class or value of a formal or other expression. Our algorithm implements each of these N-way tests with a binary decision tree blending class identity tests, class range tests, and table lookups. Our algorithm exploits any available static information (from type declarations or class analysis) to prune unreachable paths from the lookup DAG, and uses any available dynamic profile information to minimize the expected time to traverse the binary decision trees. We measure the effectiveness of our dispatching algorithms on a collection of large Cecil and Java programs, compiled by the Vortex optimizing compiler, showing improvements of up to 40% over already heavily optimized baseline versions.02017-09-06T01:53:05.21534792017-09-06T01:53:05.2153479 <00> 8 <09>Y<00><00>'
u<02>+GGLightweight Locking for Main Memory Database Systems<07>Locking is widely used as a concurrency control mechanism in database systems. As more OLTP databases are stored mostly or entirely in memory, transactional throughput is less and less limited by disk IO, and lock managers increasingly become performance bottlenecks. In this paper, we introduce very lightweight locking (VLL), an alternative approach to pessimistic concurrency control for main-memory database systems that avoids almost all overhead associated with traditional lock manager operations. We also propose a protocol called selective contention analysis (SCA), which enables systems implementing VLL to achieve high transactional throughput under high contention workloads. We implement these protocols both in a traditional single-machine multi-core database server setting and in a distributed database where data is partitioned across many commodity machines in a shared-nothing cluster. Our experiments show that VLL dramatically reduces locking overhead and thereby increases transactional through-put in both settings.PVLDB02017-09-06T01:53:10.7630949712017-09-06T01:53:10.763094971<EFBFBD>D& <00><02>kGGCRUSH: controlled, scalable, decentralized placement of replicated data<07>Emerging large-scale distributed storage systems are faced with the task of distributing petabytes of data among tens or hundreds of thousands of storage devices. Such systems must evenly distribute data and workload to efficiently utilize available resources and maximize system performance, while facilitating system growth and managing hardware failures. We have developed CRUSH, a scalable pseudorandom data distribution function designed for distributed object-based storage systems that efficiently maps data objects to storage devices without relying on a central directory. Because large systems are inherently dynamic, CRUSH is designed to facilitate the addition and removal of storage while minimizing unnecessary data movement. The algorithm accommodates a wide variety of data replication and reliability mechanisms and distributes data in terms of user-defined policies that enforce separation of replicas across failure domains.SC '0602017-09-06T01:53:09.6833540042017-09-06T01:53:09.683354004<EFBFBD>% <00>!<02> GGTeaching Garbage Collection without Implementing Compilers or Interpreters<07>Given the widespread use of memory-safe languages, students must understand garbage collection well. Following a constructivist philosophy, an effective approach would be to have them implement garbage collectors. Unfortunately, a full implementation depends on substantial knowledge of compilers and runtime systems, which many courses do not cover or cannot assume. This paper presents an instructive approach to teaching gc, where students implement it atop a simplified stack and heap. Our approach eliminates enormous curricular dependencies while preserving the essence of gc algorithms. We take pains to enable testability, comprehensibility, and facilitates debugging. Our approach has been successfully classroom-tested for several years at several institutions.02017-09-06T01:53:08.8318068852017-09-06T01:53:08.831806885<EFBFBD>E$ <00><02>yEEHeap architectures for concurrent languages using message passing<07>We discuss alternative heap architectures for languages that rely on automatic memory management and implement concurrency through asynchronous message passing. We describe how interprocess communication and garbage collection happens in each architecture, and extensively discuss the tradeoffs that are involved. In an implementation setting (the Erlang/OTP system) where the rest of the runtime system is unchanged, we present a detailed experimental comparison between these architectures using both synthetic programs and large commercial products as benchmarks.MSP/ISMM02017-09-06T01:53:08.083482912017-09-06T01:53:08.08348291 k<00><0F><0F><0F>dA<0E><0E><0E><0E>lK4 <0A> <0A> <0A> <0A> <0A> O  <0C> <0C> <0C> <0C> _ 0  <0B> <0B> <0B> ~ W 6 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
a
D
 <09> <09> <09> <09> S ( <08><08><08><08>g<<07><07><07><07>oC"<06><06><06><06>e@<05><05><05><05>wM* <04><04><04>nI$<03><03><03><03>eA"<02><02><02><02>xN+<01><01><01>jL(<00>#k+ Carlos MaltzahnCarlosMaltzahn"j+Ethan L. MillerEthanL.Miller"i+Scott A. BrandtScottA.Brandth%Sage A. WeilSageA.Weil,g5Robert Bruce FindlerRobertBruceFindlerf% Jay MccarthyJayMccarthy/e7 'Shriram KrishnamurthiShriramKrishnamurthid! Arjun GuhaArjunGuha&c/Gregory H. CooperGregoryH.Cooper!b) Erik JohanssonErikJohansson(a1Leith Casey LeedomLeithCaseyLeedom`% Brian CabralBrianCabral%_- Rusmin SoetjiptoRusminSoetjipto^#Rose F. LiuRoseF.Liu]# Weimin ChenWeiminChen)\1! Przemyslaw WegrzynPrzemyslawWegrzyn[% Dhiru KholiaDhiruKholia"Z+Thomas R. GrossThomasR.Gross'Y/ Kornilios KourtisKorniliosKourtis'X/ Ioannis KoltsidasIoannisKoltsidas#W+ Jonas PfefferleJonasPfefferle!V) Patrick StuediPatrickStuedi#U+ Bernard MetzlerBernardMetzler#T+ Nikolas IoannouNikolasIoannou#S+ Animesh TrivediAnimeshTrivedi.R7Simon L. Peyton JonesSimonL. PeytonJones"Q+Roshan P. JamesRoshanP.James&P/Timothy L. HarrisTimothyL.HarrisO% Simon MarlowSimonMarlowN' Stephen ChongStephenChong!M) Evan CzaplickiEvanCzaplicki(L1Daniel P. W. EllisDanielP. W.EllisK% Martin CookeMartinCookeJ%J. P. BarkerJ.P.Barker I)Henry G. BakerHenryG.Baker%H- Sudipta SenguptaSudiptaSenguptaG' Parveen PatelParveenPatel F)David A. MaltzDavidA.Maltz#E+ Parantap LahiriParantapLahiri*D3Albert G. GreenbergAlbertG.Greenberg,C5Douglas Stott ParkerDouglasStottParker#B+ Ruey-Lung HsiaoRuey-LungHsiaoA! Ali DasdanAliDasdan!@) Hung-Chih YangHung-ChihYang?' Matthew FlattMatthewFlatt*>3Jerome C. YochelsonJeromeC.Yochelson#=+ Robert FenichelRobertFenichel<# Urs HölzleUrsHölzle;' Bay-Wei ChangBay-WeiChang:# David UngarDavidUngar!9) Craig ChambersCraigChambers(81%V. S. SubrahmanianV.S.Subrahmanian)71 Francesca SpezzanoFrancescaSpezzano6% Srijan KumarSrijanKumar5! Mike FaganMikeFagan'4/ !Robert CartwrightRobertCartwright3% Sunil ShuklaSunilShukla2# Perry ChengPerryCheng 1)David F. BaconDavidF.Bacon)01 #Jesper WilhelmssonJesperWilhelmsson-/5% Konstantinos SagonasKonstantinosSagonas%.- Richard CarlssonRichardCarlsson$--Michael F. CohenMichaelF.Cohen*,3!Peter-Pike J. SloanPeter-PikeJ.Sloan!+) Michael AshleyMichaelAshley$*-Daniel G. BobrowDanielG.Bobrow)# Amin VahdatAminVahdat!() Luis RodriguezLuisRodriguez%'- J.michael AshleyJ.michaelAshley#&+ Gregor KiczalesGregorKiczales!%) Barbara LiskovBarbaraLiskov$%Brian M. OkiBrianM.Oki##+ Suvrat BhooshanSuvratBhooshan"' Raunaq RewariRaunaqRewari%!- Prasad KawthekarPrasadKawthekar% - William RibarskyWilliamRibarsky,5François X. SillionFrançoisX.Sillion!) Michael WimmerMichaelWimmer# Peter WonkaPeterWonka# John HughesJohnHughes-5 !Vasileios TrigonakisVasileiosTrigonakis%- Rachid GuerraouiRachidGuerraoui# Tudor DavidTudorDavid%- Fernando PereiraFernandoPereira#+ Andrew MccallumAndrewMccallum$-John D. LaffertyJohnD.Lafferty8A!!Henk O Ten Cate HoedemakerHenkO Ten CateHoedemaker09#Jean-Pierre E N PierieJean-PierreE NPierie' Erik HeinemanErikHeineman# Jetse GorisJetseGoris$-Maarten B JalinkMaartenBJalink Jun RaoJunRao' Neha NarkhedeNehaNarkhede Jay KrepsJayKreps  Rob PikeRobPike ' Luca CardelliLucaCardelli# + Klara NahrstedtKlaraNahrstedt
)Carl A. GunterCarlA.Gunter# + Muhammad NaveedMuhammadNaveed# Dongjing HeDongjingHe# John WilkesJohnWilkes-5 %Michael Abd-El-MalekMichaelAbd-El-Malek!) Andy KonwinskiAndyKonwinski'/ #Malte SchwarzkopfMalteSchwarzkopf&/Marshall C. PeaseMarshallC.Pease&/Robert E. ShostakRobertE.Shostak!) Leslie LamportLeslieLamport k<00><0F><0F><0F>}[5 <0E><0E><0E>uQ0 <0A> <0A> <0A> { \ =   <0C> <0C> <0C> ] ;  <0B> <0B> <0B> w U 8 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
b
5
 <09> <09> <09> v E + <08><08><08>|X4<07><07><07><07>`D(<06><06><06>~bD$<05><05><05>{]=<04><04><04><04>qQ1<03><03><03>~Z8<02><02><02>qC<01><01><01>r=<00><1B>V# Paul BarhamPaulBarham6<6D>U?Guilherme Horta TravassosGuilhermeHortaTravassos2<73>T;%Ana Candida Cruz NataliAnaCandida CruzNatali$<24>S-Paula Gomes MianPaulaGomesMian#<23>R+ Jorge BiolchiniJorgeBiolchini(<28>Q1Laurie A. WilliamsLaurieA.Williams%<25>P-# Thirumalesh BhatThirumaleshBhat.<2E>O7!E. Michael MaximilienE.MichaelMaximilien+<2B>N3! Nachiappan NagappanNachiappanNagappan(<28>M1Lawrence R RabinerLawrenceRRabiner,<2C>L5!Andrew W. FitzgibbonAndrewW.Fitzgibbon&<26>K/Andrew J. DavisonAndrewJ.Davison!<21>J) Dustin FreemanDustinFreeman<1D>I% Steve HodgesSteveHodges<1F>H' Jamie ShottonJamieShotton!<21>G) Pushmeet KohliPushmeetKohli*<2A>F3Richard A. NewcombeRichardA.Newcombe#<23>E+ David MolyneauxDavidMolyneaux!<21>D) Otmar HilligesOtmarHilliges<17>C David KimDavidKim<1F>B' Shahram IzadiShahramIzadi<1D>A% Jeff BonwickJeffBonwick<1D>@% Yaron MinskyYaronMinsky<1B>?# Mihai BudiuMihaiBudiu<17>> Zhen XiaoZhenXiao#<23>=+ Öznur ÖzkasapÖznurÖzkasap<1B><# Mark HaydenMarkHayden&<26>;/Kenneth P. BirmanKennethP.Birman$<24>:-Brian D. DavisonBrianD.Davison<1D>9% Xiaoguang QiXiaoguangQi<1B>8# Armando FoxArmandoFox<1F>7' George CandeaGeorgeCandea<1C>6%A. M. TuringA.M.Turing#<23>5+ Anton KaplanyanAntonKaplanyan<1B>4# Sam WhittleSamWhittle!<21>3) Paul NordstromPaulNordstrom<1D>2% Daniel MillsDanielMills<1B>1# Sam McveetySamMcveety<19>0! Reuven LaxReuvenLax<1F>/' Josh HabermanJoshHaberman!<21>.) Slava ChernyakSlavaChernyak!<21>-) Kaya BekirogluKayaBekiroglu<1D>,% Alex BalikovAlexBalikov<1D>+% Tyler AkidauTylerAkidau<19>*! Bernd KolbBerndKolb<19>)! Jos WarmerJosWarmer!<21>() Markus VölterMarkusVölter<1F>'' Koen ClaessenKoenClaessen<1F>&' Dennis ShashaDennisShasha%<25>%- Theodore JohnsonTheodoreJohnson<1B>$# Judea PearlJudeaPearl#<23>#+ Ashish MotivalaAshishMotivala!<21>") Indranil GuptaIndranilGupta!<21>!)! Abhinandan DasAbhinandanDas<1F> ' Adam ChlipalaAdamChlipala<19>! Ziv ScullyZivScully$<24>-Michael D. ErnstMichaelD.Ernst-<2D>5 !Magdalena BalazinskaMagdalenaBalazinska<17> Bill HoweBillHowe<17> Yingyi BuYingyiBu.<2E>7Luís E. T. RodriguesLuísE. T.Rodrigues.<2E>7José Orlando PereiraJoséOrlandoPereira<1F>' João LeitãoJoãoLeitão-<2D>5 #Emmanuel DellandréaEmmanuelDellandréa<1D>% Yoann BaveyeYoannBaveye<19>! Brian ZillBrianZill*<2A>3Srinath T. V. SettySrinathT. V.Setty(<28>1Michael L. RobertsMichaelL.Roberts<1B># Bryan ParnoBryanParno <20>)Jacob R. LorchJacobR.Lorch#<23>+ Manos KapritsosManosKapritsos<19>! Jon HowellJonHowell%<25>- !Chris HawblitzelChrisHawblitzel<1A> #V. T. RajanV.T.Rajan<1F> ' Jayadev MisraJayadevMisra<1F> ' Robert MorrisRobertMorris&<26>
/M. Frans KaashoekM.FransKaashoek'<27> / %Hari BalakrishnanHariBalakrishnan&<26>/David G. AndersenDavidG.Andersen#<23>+ Per-Åke LarsonPer-ÅkeLarson<1F>' Chris OkasakiChrisOkasaki*<2A>3!J. A. M. VermaserenJ.A. M.Vermaseren"<22>+John C. CollinsJohnC.Collins'<27>/ Sebastian ThrunyzSebastianThrunyz%<25>- Wolfram BurgardyWolframBurgardy<1B># Dieter FoxyDieterFoxy<1B># Bruce GoochBruceGooch% Elaine CohenElaineCohen~% Mark HartnerMarkHartner!}) Ashley HartnerAshleyHartner&|/Simon J. ThompsonSimonJ.Thompson{! Huiqing LiHuiqingLi&z/Martin E. HellmanMartinE.Hellman%y- Whitfield DiffieWhitfieldDiffiex' Joe ArmstrongJoeArmstrong"w+Andrew P. BlackAndrewP.Blackv! Roel WuytsRoelWuyts)u1 Nathanael SchärliNathanaelSchärli%t- !Oscar NierstraszOscarNierstrasz's/ Stéphane DucasseStéphaneDucasse(r1Angela Demke BrownAngelaDemkeBrown$q-Paul E. MckenneyPaulE.Mckenney p)Thomas E. HartThomasE.Harto' Miguel CastroMiguelCastro"n+Daniel J. AbadiDanielJ.Abadi'm/ Alexander ThomsonAlexanderThomsonl Kun RenKunRen <00> Zc<00><00>u*
a<02>WKGGTraits: A mechanism for fine-grained reuse<07>Inheritance is well-known and accepted as a mechanism for reuse in object-oriented languages. Unfortunately, due to the coarse granularity of inheritance, it may be difficult to decompose an application into an optimal class hierarchy that maximizes software reuse. Existing schemes based on single inheritance, multiple inheritance, or mixins, all pose numerous problems for reuse. To overcome these problems we propose <i>traits</i>, pure units of reuse consisting only of methods. We develop a formal model of traits that establishes how traits can be composed, either to form other traits, or to form classes. We also outline an experimental validation in which we apply traits to refactor a nontrivial application into composable units.ACM Trans. Program. Lang. Syst.02017-09-06T01:53:13.5098859862017-09-06T01:53:13.509885986<EFBFBD>t) <00>5<02><1D>+GGMaking lockless synchronization fast: performance implications of memory reclamation<07>Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking, require a memory reclamation scheme that reclaims nodes once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes -quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation - using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect memory reclamation performanceProceedings 20th IEEE International Parallel & Distributed Processing Symposium02017-09-06T01:53:12.5529060062017-09-06T01:53:12.552906006<EFBFBD>#( <00><02>=GGPractical byzantine fault tolerance and proactive recovery<07>Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability. BFT has been implemented as a generic program library with a simple interface. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. The BFT library and BFS perform well because the library incorporates several important optimizations, the most important of which is the use of symmetric cryptography to authenticate messages. The performance results show that BFS performs 2&percnt; faster to 24&percnt; slower than production implementations of the NFS protocol that are not replicated. This supports our claim that the BFT library can be used to build practical systems that tolerate Byzantine faults.ACM Trans. Comput. Syst.02017-09-06T01:53:11.7653420412017-09-06T01:53:11.765342041 <00> qJ<00><00>}.
y<02>o+GGMulticore profiling for Erlang programs using percept2<07>Erlang is a functional programming language with built-in support for concurrency based on share-nothing processes and asynchronous message passing. The design of Erlang makes it suitable for writing concurrent and parallel applications, taking full advantage of the computing power of modern multicore machines. However many existing Erlang applications are sequential, in need of parallelisation.
In this paper, we present the Erlang concurrency profiling tool Percept2,and demonstrate how the information provided by it can help the user to explore the potential parallelism in an Erlang application and how the system performs on the Erlang multicore system. Percept2 thus allows users improve the performance and scalability of their applications.Erlang Workshop02017-09-06T01:53:17.1514179692017-09-06T01:53:17.151417969<EFBFBD>$-
I<02>OIGGNew directions in cryptography<07>Two kinds of contemporary developments in cryp-communications over an insecure channel order to use cryptog-tography are examined. Widening applications of teleprocess-raphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key distribution one else. This is done by sending the key in advance over some channels and supply the equivalent of a written signature. This secure channel such a private courier or registered mail. A paper suggests ways to solve these currently open problems. private conversation between two people with no prior acquain-It also discusses how the theories of communication and compu-tance is a common occurrence in business, however, and it is tation are beginning to provide the tools to solve cryptographic unrealistic to expect initial business contacts to be postponed problems of long standing. long enough for keys to be transmitted by some physical means. The cost and delay imposed by this key distribution problem is a major barrier to the transfer of business communicationsIEEE Trans. Information Theory02017-09-06T01:53:16.2377180182017-09-06T01:53:16.237718018<EFBFBD>,
3<02>GGA history of Erlang<07>Erlang was designed for writing concurrent programs that "run forever." Erlang uses concurrent processes to structure the program. These processes have no shared memory and communicate by asynchronous message passing. Erlang processes are lightweight and belong to the language, not the operating system. Erlang has mechanisms to allow programs to change code "on the fly" so that programs can evolve and change as they run. These mechanisms simplify the construction of software for implementing non-stop systems.
This paper describes the history of Erlang. Material for the paper comes from a number of different sources. These include personal recollections, discussions with colleagues, old newspaper articles and scanned copies of Erlang manuals, photos and computer listings and articles posted to Usenet mailing lists.HOPL02017-09-06T01:53:15.3516411132017-09-06T01:53:15.351641113<EFBFBD>q+ <00><02>U GGOn computable numbers with an application to the Entscheidungsproblem<07>Many cyberneticists would agree that, had it not been for consistent hashing, the simulation of checksums might never have occurred. After years of essential research into replication, we prove the analysis of online algorithms, which embodies the confirmed principles of robotics. Our focus in our research is not on whether digital-to-analog converters and evolutionary programming can agree to accomplish this mission, but rather on constructing a novel framework for the construction of scatter/gather I/O (HOLLEE). while such a hypothesis is usually an intuitive objective, it is derived from known results.02017-09-06T01:53:14.3250700682017-09-06T01:53:14.325070068  <0A> <06>d <00>T3
3<02>k#GGDynamic Hash Tables<07>Linear hashing and spiral storage are two dynamic hashing schemes originally designed for external files. This paper shows how to adapt these two methods for hash tables stored in main memory. The necessary data structures and algorithms are described, the expected performance is analyzed mathematically, and actual execution times are obtained and compared with alternative techniques. Linear hashing is found to be both faster and easier to implement than spiral storage. Two alternative techniques are considered: a simple unbalanced binary tree and double hashing with periodic rehashing into a larger table. The retrieval time of linear hashing is similar to double hashing and substantially faster than a binary tree, except for very small trees. The loading times of double hashing (with periodic reorganization), a binary tree, and linear hashing are similar. Overall, linear hashing is a simple and efficient technique for applications where the cardinality of the key set is not known in advance.Commun. ACM02017-09-06T01:53:22.6234570312017-09-06T01:53:22.623457031<EFBFBD>?2 <00>!<02>_GGBreadth-first numbering: lessons from a small exercise in algorithm design<07>Every programmer has blind spots. Breadth-first numbering is an interesting toy problem that exposes a blind spot common to many---perhaps most---functional programmers.ICFP02017-09-06T01:53:21.7244960942017-09-06T01:53:21.724496094<EFBFBD>`1
/<02>GGAxodraw Version 2<07>We present version two of the L A T E X graphical style file Axodraw. It has a number of new drawing primitives and many extra options, and it can now work with pdflatex to directly produce output in PDF file format (but with the aid of an auxiliary program).ArXiv02017-09-06T01:53:19.9333510742017-09-06T01:53:19.933351074<EFBFBD>`0
q<02>[ GGThe Dynamic Window Approach to Collision Avoidance<07>This paper describes the dynamic window a p proach t o reactive collision avoidance for mobile robots equipped with synchro-drives. The a p proach i s d erived directly from the motion dynamics of the robot and i s t herefore particularly well-suited for robots o perating a t high speed. It diiers from previous approaches in that t he search for commands controlling t he translational a n d rotational velocity o f t he robot is carried out directly in the space of velocities. The advantage of our approach i s t hat it correctly and in an elegant w ay incorporatesthe dynamics of the robot. This is done by r e d ucing t he search space to t he dynamic window, which consists o f t he v elocities reachable within a short time i n terval. Within the dynamic window t he a p proach only considers admissible velocities yielding a trajectory on which t he robot is able to s t op safely. Among t hesevelocities the combination of translational and rotational velocity is chosen by m aximizing an objective f u nction. The objective f u nction includes a measure of progress towards a goal location, the forward velocity o f t he robot, and the d i s t ance to t he n ext obstacle on the trajectory. In extensive experiments t he approach presented here has been found t o safely control our mobile robot RHINO with speeds of up to 95 cmmsec, in populated and dynamic environments.02017-09-06T01:53:18.9818959962017-09-06T01:53:18.981895996<EFBFBD>/
S <0A>_ GGObject Space Silhouette AlgorithimsIn computer graphics, silhouette extraction and rendering has a critical role in a growing number of applications. This paper examines five object space silhouette extraction algorithms for polygonal models. The algorithms are applied to a variety of models and compared in terms of code complexity and run time performance. The purpose of this paper is to inform programmers who must choose from among these five algorithms.02017-09-06T01:53:18.0658879392017-09-06T01:53:18.065887939 <02><08>@<02><00>r6
Y<02> GGA unified theory of garbage collection<07>Tracing and reference counting are uniformly viewed as being fundamentally different approaches to garbage collection that possess very distinct performance properties. We have implemented high-performance collectors of both types, and in the process observed that the more we optimized them, the more similarly they behaved - that they seem to share some deep structure.
We present a formulation of the two algorithms that shows that they are in fact duals of each other. Intuitively, the difference is that tracing operates on live objects, or "matter", while reference counting operates on dead objects, or "anti-matter". For every operation performed by the tracing collector, there is a precisely corresponding anti-operation performed by the reference counting collector.
Using this framework, we show that all high-performance collectors (for example, deferred reference counting and generational collection) are in fact hybrids of tracing and reference counting. We develop a uniform cost-model for the collectors to quantify the trade-offs that result from choosing different hybridizations of tracing and reference counting. This allows the correct scheme to be selected based on system performance requirements and the expected properties of the target application.OOPSLA02017-09-06T01:53:26.5027380372017-09-06T01:53:26.502738037d5 I GGTheory in Programming Practice<07>02017-09-06T01:53:25.4782219242017-09-06T01:53:25.478221924<EFBFBD>W4
A<02>qGGResilient Overlay Networks<07>A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today's wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics.Results from two sets of measurements of a working RON deployed at sites scattered across the Internet demonstrate the benefits of our architecture. For instance, over a 64-hour sampling period in March 2001 across a twelve-node RON, there were 32 significant outages, each lasting over thirty minutes, over the 132 measured paths. RON's routing mechanism was able to detect, recover, and route around <i>all</i> of them, in less than twenty seconds on average, showing that its methods for fault detection and recovery work well at discovering alternate paths in the Internet. Furthermore, RON was able to improve the loss rate, latency, or throughput perceived by data transfers; for example, about 5% of the transfers doubled their TCP throughput and 5% of our transfers saw their loss probability reduced by 0.05. We found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases. These improvements, particularly in the area of fault detection and recovery, demonstrate the benefits of moving some of the control over routing into the hands of end-systems.SOSP02017-09-06T01:53:23.5202849122017-09-06T01:53:23.520284912 C C<00>G8
q<02>) GGAutomatic prediction of emotions induced by movies<07>N before have movies been as easily accessible to viewers, who can enjoy anywhere the almost unlimited potential of movies for inducing emotions. Thus, knowing in advance the emotions that a movie is likely to elicit to its viewers could help to improve the accuracy of content delivery, video indexing or even summarization. However, transferring this expertise to computers is a complex task due in part to the subjective nature of emotions. The present thesis work is dedicated to the automatic prediction of emotions induced by movies based on the intrinsic properties of the audiovisual signal. To computationally deal with this problem, a video dataset annotated along the emotions induced to viewers is needed. However, existing datasets are not public due to copyright issues or are of a very limited size and content diversity. To answer to this specific need, this thesis addresses the development of the LIRIS-ACCEDE dataset. The advantages of this dataset are threefold: (1) it is based on movies under Creative Commons licenses and thus can be shared without infringing copyright, (2) it is composed of 9,800 good quality video excerpts with a large content diversity extracted from 160 feature films and short films, and (3) the 9,800 excerpts have been ranked through a pair-wise video comparison protocol along the induced valence and arousal axes using crowdsourcing. The high inter-annotator agreement reflects that annotations are fully consistent, despite the large diversity of raters cultural backgrounds. Three other experiments are also introduced in this thesis. First, affective ratings were collected for a subset of the LIRIS-ACCEDE dataset in order to cross-validate the crowdsourced annotations. The affective ratings made also possible the learning of Gaussian Processes for Regression, modeling the noisiness from measurements, to map the whole ranked LIRIS-ACCEDE dataset into the 2D valence-arousal affective space. Second, continuous ratings for 30 movies were collected in order develop temporally relevant computational models. Finally, a last experiment was performed in order to collect continuous physiological measurements for the 30 movies used in the second experiment. The correlation between both modalities strengthens the validity of the results of the experiments. Armed with a dataset, this thesis presents a computational model to infer the emotions induced by movies. The framework builds on the recent advances in deep learning and takes into account the relationship between consecutive scenes. It is composed of two fine-tuned Convolutional Neural Networks. One is dedicated to the visual modality and uses as input crops of key frames extracted from video segments, while the second one is dedicated to the audio modality through the use of audio spectrograms. The activations of the last fully connected layer of both networks are con-02017-09-06T01:53:28.3382648932017-09-06T01:53:28.338264893<EFBFBD>p7
}<02>gGGIronFleet: proving practical distributed systems correct<07>Distributed systems are notorious for harboring subtle bugs. Verification can, in principle, eliminate these bugs a priori, but verification has historically been difficult to apply at full-program scale, much less distributed-system scale.
We describe a methodology for building practical and provably correct distributed systems based on a unique blend of TLA-style state-machine refinement and Hoare-logic verification. We demonstrate the methodology on a complex implementation of a Paxos-based replicated state machine library and a lease-based sharded key-value store. We prove that each obeys a concise safety specification, as well as desirable liveness requirements. Each implementation achieves performance competitive with a reference system. With our methodology and lessons learned, we aim to raise the standard for distributed systems from "tested" to "correct."SOSP02017-09-06T01:53:27.3402419432017-09-06T01:53:27.340241943 
:<06>
<00>; <00><02>;GGA program optimization for automatic database result caching<07>Most popular Web applications rely on persistent databases based on languages like SQL for declarative specification of data models and the operations that read and modify them. As applications scale up in user base, they often face challenges responding quickly enough to the high volume of requests. A common aid is caching of database results in the application&#039;s memory space, taking advantage of program-specific knowledge of which caching schemes are sound and useful, embodied in handwritten modifications that make the program less maintainable. These modifications also require nontrivial reasoning about the read-write dependencies across operations. In this paper, we present a compiler optimization that automatically adds sound SQL caching to Web applications coded in the Ur/Web domain-specific functional language, with no modifications required to source code. We use a custom cache implementation that supports concurrent operations without compromising the transactional semantics of the database abstraction. Through experiments with microbenchmarks and production Ur/Web applications, we show that our optimization in many cases enables an easy doubling or more of an application&#039;s throughput, requiring nothing more than passing an extra command-line flag to the compiler.POPL02017-09-06T01:53:31.3836750492017-09-06T01:53:31.383675049<EFBFBD> : <00><02>CCHaLoop: Efficient Iterative Data Processing on Large Clusters<07>The growing demand for large-scale data mining and data analysis applications has led both industry and academia to design new types of highly scalable data-intensive computing platforms. MapReduce and Dryad are two popular platforms in which the dataflow takes the form of a directed acyclic graph of operators. These platforms lack built-in support for iterative programs, which arise naturally in many applications including data mining, web ranking, graph analysis, model fitting, and so on. This paper presents HaLoop, a modified version of the Hadoop MapReduce framework that is designed to serve these applications. HaLoop not only extends MapReduce with programming support for iterative applications, it also dramatically improves their efficiency by making the task scheduler loop-aware and by adding various caching mechanisms. We evaluated HaLoop on real queries and real datasets. Compared with Hadoop, on average, HaLoop reduces query runtimes by 1.85, and shuffles only 4% of the data between mappers and reducers.PVLDB02017-09-06T01:53:30.05947292017-09-06T01:53:30.0594729<EFBFBD>C9 <00><02>E<EFBFBD>AGGHyParView: A Membership Protocol for Reliable Gossip-Based Broadcast<07>Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives. Due to scalability reasons, each participant in a gossip protocol maintains a partial view of the system. The reliability of the gossip protocol depends upon some critical properties of these views, such as degree distribution and clustering coefficient. Several algorithms have been proposed to maintain partial views for gossip protocols. In this paper, we show that under a high number of faults, these algorithms take a long time to restore the desirable view properties. To address this problem, we present HyParView, a new membership protocol to support gossip-based broadcast that ensures high levels of reliability even in the presence of high rates of node failure. The HyParView protocol is based on a novel approach that relies in the use of two distinct partial views, which are maintained with different goals by different strategies.37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)02017-09-06T01:53:29.2116130372017-09-06T01:53:29.211613037 l{l
Y<02>K GGCausal Diagrams for Empirical Research<07>The primary aim of this paper is to show how graphical models can be used as a mathematical language for integrating statistical and subject-matter information. In particular, the paper develops a principled, nonparametric framework for causal inference, in which diagrams are queried to determine if the assumptions available are suucient for identifying causal eeects from non-experimental data. If so the diagrams can be queried to produce mathematical expressions for causal eeects in terms of observed distributions; otherwise, the diagrams can be queried to suggest additional observations or auxiliary experiments from which the desired inferences can be obtained.02017-09-06T01:53:33.3790239262017-09-06T01:53:33.379023926<EFBFBD>< <00>1<02>WGGSWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocol<07>Several distributed peer-to-peer applications require weakly-consistent knowledge of process group membership information at all participating processes. SWIM is a generic software module that offers this service for large-scale process groups. The SWIM effort is motivated by the unscalability of traditional heart-beating protocols, which either impose network loads that grow quadratically with group size, or compromise response times or false positive frequency w.r.t. detecting process crashes. This paper reports on the design, implementation and performance of the SWIM subsystem on a large cluster of commodity PCs. Unlike traditional heartbeating protocols, SWIM separates the failure detection and membership update dissemination functionalities of the membership protocol. Processes are monitored through an efficient peer-to-peer periodic randomized probing protocol. Both the expected time to first detection of each process failure, and the expected message load per member, do not vary with group size. Information about membership changes, such as process joins, drop-outs and failures, is propagated via piggyback-ing on ping messages and acknowledgments. This results in a robust and fast infection style (also epidemic or gossip-style) of dissemination. The rate of false failure detections in the SWIM system is reduced by modifying the protocol to allow group members to suspect a process before declaring it as failed-this allows the system to discover and rectify false failure detections. Finally, the protocol guarantees a deterministic time bound to detect failures. Experimental results from the SWIM prototype are presented. We discuss the extensibility of the design to a WAN-wide scale. £ Author last names are in alphabetical order.DSN02017-09-06T01:53:32.2238759772017-09-06T01:53:32.223875977 (<00>? <00><02>GGQuickCheck: a lightweight tool for random testing of Haskell programs<07>Quick Check is a tool which aids the Haskell programmer in formulating and testing properties of programs. Properties are described as Haskell functions, and can be automatically tested on random input, but it is also possible to define custom test data generators. We present a number of case studies, in which the tool was successfully used, and also point out some pitfalls to avoid. Random testing is especially suitable for functional programs because properties can be stated at a fine grain. When a function is b
C<02>'GGProjecting a Modular Future<07>Two innovations are enhancing programming languages' capabilities. First, modularity lets you combine independently developed languages without changing their respective definitions. A language is no longer a fixed quantity; you can extend it with domain-specific constructs as needed. Second, projectional editing lets you build editors and IDEs that don't require parsers. Such editors and IDEs support a range of tightly integrated notations, including textual, symbolic, tabular, and graphical notations. In addition, by avoiding parsers, they avoid grammar composition's well-known limitations. Three examples illustrate how these two innovations affect programming-language design. A set of modular extensions of C for embedded programming enables efficient code generation and formal analysis. A language for requirements engineering flexibly combines structured and unstructured (prose) data. Finally, a language for defining insurance rules uses mathematical notation. These examples all rely on the open source JetBrains MPS (Meta Programming System) language workbench. This article is part of a special issue on Software Architecture.IEEE Software02017-09-06T01:53:36.6328369142017-09-06T01:53:36.632836914
B<00><0F>r6<0E><0E>G <0A> <0A> z 8 <0C> <0C> <0C> `  <0B> <0B> @
<EFBFBD>
<EFBFBD>
y
A <09> <09> <09> <09> H <08><08><08>c<07><07>^'<06><06>{K<05>}F<04>_<03><03>`&<02><02>\.<01><00><01><01>JV<04>-Back to the future: the story of Squeak, a practical Smalltalk written in itself<01>C<04>Beyond short snippets: Deep networks for video classification<00>a<04>CBeehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlaysj!EBayesian Network ClassifiersV9Backtracking iterators<00>-]BIG Cache Abstraction for Cache Networks /Axodraw Version 21-]Axiomatic Basis for Computer Programming16qAutomatic prediction of emotions induced by movies87qAuthoritative Sources in a Hyperlinked Environment<00>:wAuctions and bidding: A guide for computer scientists<00>CAttacks on the WEP protocolc9wAsynchronous functional reactive programming for GUIsP<04>#Architectural Styles and the Design of Network-based Software Architectures_I<04>Applications of Machine Learning in Cancer Prediction and Prognosis<00>c<04>IAnd then there were none: a stall-free real-time garbage collector for reconfigurable hardware9uAnalyzing inter-application communication in Android<00>|<04>{Analysis of Three Bayesian Network Inference Algorithms: Variable Elimination, Likelihood Weighting, and Gibbs Sampling"/aAn introduction to argumentation semantics<00>6oAn improved illumination model for shaded display<00>W<04>/An implementation and semantics for transactional memory introspection in HaskellmB<04>An elementary proof of a theorem of Johnson and LindenstraussV2gAn Industrial Strength Audio Search AlgorithmP/aAn Analysis of the Cryptocurrency Industry]U<04>+Adaptive Road Following using Self-Supervised Learning and Reverse Optical Flow<00>9Acoustic Cryptanalysis<00>9uAbove the Clouds: A Berkeley View of Cloud Computing<00>6oASAP: the Alternative Splicing Annotation ProjectCb<04>GASAP: Automatic Smoothing for Attention Prioritization in Streaming Time Series Visualization\.aA wait-free queue as fast as fetch-and-addx*YA unified theory of garbage collection6G<04>A theoretician's guide to the experimental analysis of algorithms<00>7qA taxonomy of suffix array construction algorithms<00>%MA survey on reactive programmingd'QA survey of network virtualization._A sparse Johnson: Lindenstrauss transformB/cA simple totally ordered broadcast protocolpA<04>A program optimization for automatic database result caching;+YA mathematical theory of communication50cA history of Haskell: being lazy with class<00>3A history of Erlang,A<04>A file undelete with Aho-Corasick algorithm in file recoveryQ7qA few useful things to know about machine learning<00>M<04>A comparison of software and hardware techniques for x86 virtualization<00>/A Wait-Free StackKa<04>CA Versatile Scheme for Routing Highly Variable Traffic in Service Overlays and IP BackboneshE<04> A Universal Modular ACTOR Formalism for Artificial Intelligence<01>W<04>1A Tutorial on Hidden Markov Models and Selected Applications in Speech RecognitionJ"IA Theory of Inferred Causation~^<04>=A Response to Cheriton and Skeen's Criticism of Causal and Totally Ordered Communication<01>#IA Poor Man's Concurrency Monadw$KA Note on Distributed ComputingA<04>A New Approach to Linear Filtering and Prediction Problems1<00>L<04>A Method for Obtaining Digital Signatures and Public-Key Cryptosystems<00>A<04>A LISP garbage-collector for virtual-memory computer systems=}A Hundred Impossibility Proofs for Distributed Computingy9uA History of the Virtual Synchrony Replication Model*-]A Gossip-Style Failure Detection Service<00>&OA Fast String Searching Algorithm<00><{A Fast Quantum Mechanical Algorithm for Database Search<00>`<04>AA Data-driven Method for the Detection of Close Submitters in Online Learning Environments<01>(SA DNA-Based Archival Storage System<00>'SA Calculus of Communicating Systemsq;yA Byzantine Fault Tolerant Distributed Commit Protocol<}3-Sweep: extracting editable objects from a single photoeP<04>#2Q: A Low Overhead High Performance Buffer Management Replacement Algorithm>
E<00><0F><0F><0F><0F>_<0E><0E><0E>E <0A> <0A> ` # <0C> <0C> <0C> G <0B> <0B> ^# '
<EFBFBD>
<EFBFBD>
<EFBFBD>
:
y <09> h ><08><08><08>V><07><07><07>H<00><06><06>bK <05><05><05>J0<04><04>P<04>U<03>rZ#<02>j=<01>c<04>GDai-depur: an Integrated Supervisory Multi-level Architecture for Wastewater Treatment Plants<01><0F>
Eludin,[Communication Theory of Secrecy Systems<01>(SDining Cryptographers are Practical<01>S<04>'Consistency and fault tolerance for erasure-coded distributed storage systems<01>K<04>Efficient Selectivity and Backup Operators in Monte-Carlo Tree Searcha#KEfficient Predicate Dispatching!,[Efficient Lock-free Binary Search Trees<00><><04>Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis<00>5mEM Algorithms for Probabilistic Mapping Networks<00>6oDynamo: amazon's highly available key-value store03Dynamic Hash Tables37qDremel: Interactive Analysis of Web-Scale Datasets<00>\<04>9Don't settle for eventual: scalable causal consistency for wide-area storage with COPS<00>M<04>Distributed Snapshots: Determining Global States of Distributed Systems<01>*WDistributed Authorization in VanadiumE CDirect and Indirect Effects<}Diminished reality for augmented reality interior designYQ<04>#Digital Video Stabilization and Rolling Shutter Correction using Gyroscopes<00>5Differential Privacy<00>K<04>Design requirements for technologies that encourage physical activity<00>'QDesign Principles Behind Smalltalkv%MDeprecating the Observer Pattern;;yDefining gamification: a service marketing perspective<00>*WDefending against network IDS evasionY/Deep Colorization
4mDecoding speech in the presence of other sources8sDavis's Poetic Dialogue with Leiris's AutobiographyF0cDatabase metatheory: asking the big queriesGF<04> Dapper, a Large-Scale Distributed Systems Tracing Infrastructureba<04>CDP-SLAM: Fast, Robust Simultaneous Localization and Mapping Without Predetermined Landmarks<00>+YD-Expressions: Lisp Power, Dylan Style)Cuckoo Hashing<00>S<04>)Crossing the gap from imperative to functional programming through refactoringa3Crash-Only SoftwareE=}Coupled 3D reconstruction of sparse facial hair and skin<00>8sCounting Large Numbers of Events in Small Registers<00>+YCoq: the world's best macro assembler?<00>D<04> Copysets: Reducing the Frequency of Data Loss in Cloud Storaget)WContinuous Shading of Curved SurfacesZ<04>5Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms[B<04>Consistency in Non-Transactional Distributed Storage Systems<00>3iConsensus in the presence of partial synchrony^<04>?Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data(UComputing Machinery and IntelligenceD*WCompressors with Vanes-Based Diffuser9wComposable and compilable macros: : you want it when?6oCompiling pattern matching to good decision trees<00>'QCommunicating Sequential Processes <{Commodifying Replicated State Machines with OpenReplica<01><{Comments on a problem in concurrent programming control-F<04> Cognitive Computing: A Brief Survey and Open Research Challenges<01>M<04>Chord: A scalable peer-to-peer lookup service for internet applications<00>7Chaotic bat algorithm4G<04>Chain Replication for Supporting High Throughput and AvailabilityR*YCausal Diagrams for Empirical Research=<{Cassandra A Decentralized Structured Storage System<00>)UCan SPDY really make the web faster?<00>m<04>[Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of ProgramsL<04>Calvin: fast distributed transactions for partitioned database systems<00>L<04>CRUSH: controlled, scalable, decentralized placement of replicated data& CByzantine Chain Replication7Buridans Principler@<04>Building global and scalable systems with atomic multicastpO<04>!Breadth-first numbering: lessons from a small exercise in algorithm design2&OBreach: Reviving the Crime Attack<00>/Blue native PAGE.R BitcoinT/Bimodal MulticastG'Bigtable: A Distributed Storage Sy5Bouvier's Conjecture<01> <03>O<06><03><00>F
m<02>/GGWeb page classification: Features and algorithms<07>Classification of Web page content is essential to many tasks in Web information retrieval such as maintaining Web directories and focused crawling. The uncontrolled nature of Web content presents additional challenges to Web page classification as compared to traditional text classification, but the interconnected nature of hypertext also provides features that can assist the process.
As we review work in Web page classification, we note the importance of these Web-specific features and algorithms, describe state-of-the-art practices, and track the underlying assumptions behind the use of information from neighboring pages.ACM Comput. Surv.02017-09-06T01:53:42.6610339362017-09-06T01:53:42.661033936^E 3 GGCrash-Only Software<07>HotOS02017-09-06T01:53:41.2371230472017-09-06T01:53:41.237123047<EFBFBD>.D
U<02> EEComputing Machinery and Intelligence<07>I propose to consider the question, "Can machines think?" This should begin with definitions of the meaning of the terms "machine" and "think." The definitions might be framed so as to reflect so far as possible the normal use of the words, but this attitude is dangerous, If the meaning of the words "machine" and "think" are to be found by examining how they are commonly used it is difficult to escape the conclusion that the meaning and the answer to the question, "Can machines think?" is to be sought in a statistical survey such as a Gallup poll. But this is absurd. Instead of attempting such a definition I shall replace the question by another, which is closely related to it and is expressed in relatively unambiguous words. The new form of the problem can be described in terms of a game which we call the 'imitation game." It is played with three people, a man (A), a woman (B), and an interrogator (C) who may be of either sex. The interrogator stays in a room apart front the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman. He knows them by labels X and Y, and at the end of the game he says either "X is A and Y is B" or "X is B and Y is A." The interrogator is allowed to put questions to A and B thus: C: Will X please tell me the length of his or her hair? Now suppose X is actually A, then A must answer. It is A's object in the game to try and cause C to make the wrong identification. His answer might therefore be: "My hair is shingled, and the longest strands are about nine inches long." In order that tones of voice may not help the interrogator the answers should be written, or better still, typewritten. The ideal arrangement is to have a teleprinter communicating between the two rooms. Alternatively the question and answers can be repeated by an intermediary. The object of the game for the third player (B) is to help the interrogator. The best strategy for her is probably to give truthful answers. She can add such things as "I am the woman, don't listen to him!" to her answers, but it will avail …02017-09-06T01:53:40.290007082017-09-06T01:53:40.29000708 
<EFBFBD><00>I <00>7<02>{GGKinectFusion: real-time 3D reconstruction and interaction using a moving depth camera<07>KinectFusion enables a user holding and moving a standard Kinect camera to rapidly create detailed 3D reconstructions of an indoor scene. Only the depth data from Kinect is used to track the 3D pose of the sensor and reconstruct, geometrically precise, 3D models of the physical scene in real-time. The capabilities of KinectFusion, as well as the novel GPU-based pipeline are described in full. Uses of the core system for low-cost handheld scanning, and geometry-aware augmented reality and physics-based interactions are shown. Novel extensions to the core GPU pipeline demonstrate object segmentation and user interaction directly in front of the sensor, without degrading camera tracking or reconstruction. These extensions are used to enable real-time multi-touch interactions anywhere, allowing any planar or non-planar reconstructed physical surface to be appropriated for touch.UIST02017-09-06T01:53:45.5883291022017-09-06T01:53:45.588329102<EFBFBD>`H <00><02>)'GGThe Slab Allocator: An Object-Caching Kernel Memory Allocator<07>This paper presents a comprehensive design overview of the SunOS 5.4 kernel memory allocator. This allocator is based on a set of object-caching primitives that reduce the cost of allocating complex objects by retaining their state between uses. These same primitives prove equally effective for managing stateless memory (e.g. data pages and temporary buffers) because they are space-efficient and fast. The allocator's object caches respond dynamically to global memory pressure, and employ an object-coloring scheme that improves the system's overall cache utilization and bus balance. The allocator also has several statistical and debugging features that can detect a wide range of problems throughout the system.USENIX Summer02017-09-06T01:53:44.2597199712017-09-06T01:53:44.259719971<EFBFBD>|G
/<02>%=GGBimodal Multicast<07>There are many methods for making a multicast protocol &#8220;reliable.&#8221; At one end of the spectrum, a reliable multicast protocol might offer tomicity guarantees, such as all-or-nothing delivery, delivery ordering, and perhaps additional properties such as virtually synchronous addressing. At the other are protocols that use local repair to overcome transient packet loss in the network, offering &#8220;best effort&#8221; reliability. Yet none of this prior work has treated stability of multicast delivery as a basic reliability property, such as might be needed in an internet radio, television, or conferencing application. This article looks at reliability with a new goal: development of a multicast protocol which is reliable in a sense that can be rigorously quantified and includes throughput stability guarantees. We characterize this new protocol as a &#8220;bimodal multicast&#8221; in reference to its reliability model, which corresponds to a family of bimodal probability distributions. Here, we introduce the protocol, provide a theoretical analysis of its behavior, review experimental results, and discuss some candidate applications. These confirm that bimodal multicast is reliable, scalable, and that the protocol provides remarkably stable delivery throughput.ACM Trans. Comput. Syst.02017-09-06T01:53:43.3883430182017-09-06T01:53:43.388343018
<01><00><01><0F><0F><0F><0F><0F><0F>dR?+<0E><0E><0E><0E><0E><0E><0E>xkZG3# <0A> <0A> <0A> <0A> <0A> <0A> <0A>  j [ O < -   <0C> <0C> <0C> <0C> <0C> <0C><01> n _ N = )<01>  <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> l S = ' 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>.
{
a
I
,
 <09> <09> <09> <09> <09> <09> <09> q ` I 5  <08><08><08><08><08><08>uaM:#<07><07><07><07><07><07><07>i@T?*<06><06><06><06><06><06><06>s]M8%<05><05><05>U<05><05><05><05>yhYH:" <04><04><04><04><04><04><04>~kZE3$<03><03><03><03><03><03>we<02><02><02><02><02><02><02>lZI8(<01><01><01><01> Alan Kay<05>'Adriaan Moors<05>fButler W. Larnpsonj/Butler W. Lampson+Bui Tuong Phong<02>#Bryan Parno<00>#Bruce Gooch<00>-Brianna Satinoffw!Brian Zill<00>#Brian Summa<01>%Brian M. Oki$%Brian Hempel<02>+Brian F. Cooper-Brian D. Davison<00>%Brian Cabral`)Brannon Batson<05>'Brandon Wiley$)Boris Dragovic<00>'Boon Thau Loo<05>!Bob Sumner<01> Bing Liu9Alejandro A. Schäffer %Amihood Amir
+Anthony Liguori !Avi Kivity%Bernard Wong +Bernard MetzlerU/Benoît Garbinato<05>1Benjamin Schneider'Benjamin Reed=-Benjamin Hindman<05>5Benjamin H. Sigelman<05>-Benjamin C. Reedh#Ben MoseleyBen Handy<02>'Bay-Wei Chang;+Baruch Awerbuchs#Bart Samwel<02>'Barmak ModrekY)Barbara Liskov%+Bapi Chatterjee<01>%Balraj Singh/#B. ÖztürkE B. Zhong<03> B. Weber<03> B. Veldt<04> B. Song<04> B. Son<04>-B. Mohar VitezicH1B. M. Santos Peixe<03> B. Kainz<01>#B. HolzmanniB. Hansenz#B. GrahovacMB. Foglia!B. Dreher+B. Arrizabalaga<03>%B. Angermayr<03>-Avinash Lakshman+!Avery Wangq1Austin T. Clements</Austin I. Eliazar<01>%Asim Shankar])Ashley Hartner}+Ashish Motivala<00>!Asaf Cidon<05>-Arvind Narayanan<02>#Arthur Guez<02>+Arnar Birgisson<05>#Armando Fox<00>'Arjun Narayan<05>!Arjun Guhad'Arif Merchanta%Ariel Shamir"%Ariel Rabkin<01>%Anupam Gupta<00>+Antony Rowstron<05>+Antony Courtneyy+Anton Kaplanyan<00>+Antoine Bossardg/Anthony D. Joseph<01>5Anne-Marie Kermarrec%Ann Wollrath<02>!Ankur Taly\-Anirban DasguptaT+Animesh TrivediS/Anil Madhavapeddy+)Angus F. M. Ng$%Angelo Pradom1Angela Demke Brownr)Andy Konwinski)Andrey Khorlin<05>)Andrey Gubarev=+Andrew Warfield<00>+Andrew W. Leung<05>5Andrew W. Fitzgibbon<00>'Andrew Turpinj'Andrew Tuckerf+Andrew P. Blackw+Andrew Mccallum1Andrew Lookingbill<01>-Andrew Konwinski<01>)Andrew Kennedy<01>/Andrew J. Davison<00>#Andrew HumeT)Andrew Handoko<00>%Andrew Fikeso%Andrej Bauer<02>-Andrei Z. Broder<02>'Andreas WößJ'Andreas Ulmer/Andreas Haeberlen<05>'Andrea Bittau<01>;Andoni Lombide Carreton<05>;Ana Candida Cruz Natali<00>1Amit Rahul Baishya?5Amir Hossein Gandomi7#Amin Vahdat)?Ambrose Bonnaire-Sergeant31Alistair C. Veitchc7Ali José Mashtizadeh<01>!Ali Ghodsi<05>!Ali DasdanA'Alfred Tarski<05>1Alexandre Karpenkon-Alexandre Bartelb/Alexander Thomsonm3Alexander Reinefeld<05>+Alexander Lloyd<05>%Alex Pilchin,%Alex Monràs Alex Ho<00>!Alex Gyori%Alex De Jong<05>%Alex Balikov<00>-Alberto Dainotti 3Albert G. GreenbergD+Albert Einstein<05>)Alan J. Demers<00>#Alan GellerE#Alan C. KayAja Huang<02>5Adrienne Porter Felt<01>!Adi Shamir|'Adam Chlipala<00>;Achilleas L. D. Buisman/Abraham Bernstein)Abhishek Verma<02>)Abhinandan Das<00>)Aart J. C. BikL%A. Yamaguchi<04>A. Yamada<04>'A. Winstanley<04> A. Vaz<03>A. Titovan+A. T. Abdelmoez<03>%A. SydorchukTA. Suzuki[A. Stepan/ A. Silva<03>+A. Shafigullinao%A. S. Hanafy2#A. Rizvanovv A. PreteN!A. Popescu,!A. PessionO!A. Peixoto<03>)A. P. Oliveira<03>'A. P. Kiyasovw#A. OliveiraZ A. Mori<04>!A. Martins<03>!A. Mansour%A. M. Turing<00>%A. L. Simão?#A. Kourikou
%A. Koukofiki 'A. Galyavieva<04>-A. G. G. Antunes<03>#A. Floreanis%A. Ferlitsch<03>)A. Facciorusso/'A. Eshraghianx%A. ColecchiaJ7A. Castiella Eguzkiza<03>)A. Castanheira<03> A. Alves<03>)A. Albuquerque<03> A. Aktas<03>)A. Abou Rached7+A. Abdulkhakova<04>)A. A. Gumerovat
<00>Z <04><04><04><04><04><04><04><04>oYD2!<03><03><03><03><03><03>nZ<0F><0F><0F><0F><0F><0F><0F>r`RA(<0E><0E><0E><0E><0E><0E><0E><0E><0E>p_OD6+ <0A> <0A> <0A> <0A> <0A> <0A> v V C 4 "
<0C> <0C> <0C> <0C> <0C> <0C> w d R < '  <0B> <0B> <0B> <0B> <0B> <0B> i N 4 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
o
Y
F
3

 <09> <09> <09> <09> <09> <09> <09> <09> <09> s g X H 8 $  <08><08><08><08><08><08><08>oZG1<07><07><07><07><07><07>u[L9! <06><06><06><06><06><06><06>p\J;#<05><05><05><05><05><05><05>nYC+6 <02><02><02><02><02><02><02>zl[F:*<01><01><01><01><01><01><01><01>E. Soares<03>#E. SklyarovQ!E. Shehata#E. Salvador<03>%E. S. Tharwa<03> E. Novo#!E. Morello7E. Michael Maximilien<00>)E. M. Abdelaal<03>!E. Liusina E. Kim<04>+E. I. Sharipovam#E. Garaninap E. Fuchs`!E. Cancela<03>%E. Bugianesi'E. Branco<03>E. Albano( E. Adel<03>)Dustin Freeman<00>)Dragan Gasevic<05>5Douglas Stott ParkerC1Douglas M. Carmean<01>-Douglas B. Terry<00>!Doug SimonO#Dongjing He')Byung-Gon Chun<01>-By C. E. Shannon<05>1Butler W. Larnpsonj/Butler W. Lampson+Bui Tuong Phong<02>#Bryan Parno<00>#Bruce Gooch<00>-Brianna Satinoffw!Brian Zill<00>#Brian Summa<01>%Brian M. Oki$%Brian Hempel<02>+Brian F. Cooper-Brian D. Davison<00>%Brian Cabral`)Brannon Batson<05>'Brandon Wiley$)Boris Dragovic<00>'Boon Thau Loo<05>!Bob Sumner<01> Bing Liu%#Binbin ChenxBin Sheng<02>Bill Howe<00>!Bernd Kolb<00>1David S. Rosenblum-David S. JohnsonH+David R. Millen)+David R. KargerW#David Pelegt+David Patterson<01>'David P. ReedR/David Oppenheimer<02>+David Molyneaux<00>-David Menestrina<02>+David Mazières<01>!David Lieb<01>1David Klaftenegger<01>David Kim<00>%David Jacobso)David J. Scott.'David J. Hand)#David Gregg/David G. Andersen<00>)David F. Bacon1+David D. Redell)David D. ClarkS#David Chaumv)David B. Fogel+David A. Wagner<01>1David A. Patterson<01>)David A. MaltzFDanny Dig5Daniel Winograd-Cort_'Daniel SundayU-Daniel S. MarcusN%Daniel Pricee#Daniel Peng51Daniel P. W. EllisL%Daniel Mills<00>3Daniel J. Bernstein<01>+Daniel J. Abadin5Daniel H. H. Ingalls<05>-Daniel H. Greene<00>'Daniel Genkin{-Daniel G. Bobrow*+Daniel Cohen-Or$3Daniel C. Swinehart<00>'Dan Steinberg*#Dan Ingalls<05>!Dan Geigerv%Dan DumitriuDan Dixon<01>'Damien OcteaueD. StimacL!D. Shapiro})D. Schmalstieg<01>!D. Orlandi&!D. Martins<03>D. KovačK D. Kim<04> D. Kang<04>!D. K. Jang<04>#D. Hartmannl!D. H. Sinn@D. H. Koh<04> D. Gomes<03>D. G. Kim<04> D. FestiP'D. BranquinhoY!D. Bonazza;!D. Akiyama<04>+Cédric Fournet'Cyril Crassinr'Cynthia Dwork<01>-Cristian Martín)Craig Chambers9Cory Hill<02>)Corinna Cortes<00>'Conor Mcbride]'Conal Elliott<02>/Claude E. Shannon9-Chung-Chieh Shan<02>;Christos T. Karamanolisd?Christos H. Papadimitriou_5Christopher Strachey<02>7Christopher M. Dawsonb5Christopher L. Reeve<02>1Christopher J. LeeW/Christopher ClarkA=Christine Van Vredendaal<01>-Christian WimmerI/Christian LimpachD+Christian Jacob +Christian HumerM+Christian Fritz`-Christian Franck<05>%Chris Thomas'Chris Okasaki<00>)Chris Jermaine<02>/Chris J. Maddison<02>-Chris Hawblitzel<00>!Chris Bond<05>AChitchanok Chuengsatiansup<01>-Chien-Chin HuangJ Chi Ho1Charalampos Rotsos-%Chaoran YangWChao Yang<01>'Changhoon KimAChandra Shekhar Chandrakar-Chandan Shanbhag<05>%Chad Whipkey<02>+Carlos Maltzahnk5Carlos Delgado Kloos<05>#Carl Hewitt )Carl H. Hauser<00>)Carl A. Gunter
-C.m.p. RodriguesB#C. Τsoulas
C. Yu<03> C. Yaghi3
C. Xu<03>!C. Vincenty#C. Triantos%C. Tiribelli=#C. Teixeira<03> C. Tang<04> C. Sofia\C. Pavlov )C. Meyenberger<04>!C. Messina%!C. Martins<03> C. Madlf5C. M. Chackelevicius5!C. Lérias<03>3C. Ivascu-Siegfried#C. Illiaschc C. Iancu=%C. Gregório[#C. Erdoğdu^ C. Choi<04>C. Bowluso1C. Borradori-Tolsa<01> C. Bocca$%C. Agostinho<03>)C. A. R. Hoare<02>+Béla Bollobás <05> <0C>B<07><05><00>>M
=<02>=GGThe Part-Time Parliament<07>Recent archaeological discoveries on the island of Paxos reveal that the parliament functioned despite the peripatetic propensity of its part-time legislators. The legislators maintained consistent copies of the parliamentary record, despite their frequent forays from the chamber and the forgetfulness of their messengers. The Paxon parliament's protocol provides a new way of implementing the state machine approach to the design of distributed systems.ACM Trans. Comput. Syst.02017-09-06T01:53:49.5185109862017-09-06T01:53:49.518510986oL _ GGSystematic Review in Software Engineering<07>02017-09-06T01:53:48.6601269532017-09-06T01:53:48.660126953<EFBFBD>YK <00>k<02>IGGRealizing quality improvement through test driven development: results and experiences of four industrial teams<07>Test-driven development (TDD) is a software development practice that has been used sporadically for decades. With this practice, a software engineer cycles minute-by-minute between writing failing unit tests and writing implementation code to pass those tests. Test-driven development has recently re-emerged as a critical enabling practice of agile software development methodologies. However, little empirical evidence supports or refutes the utility of this practice in an industrial context. Case studies were conducted with three development teams at Microsoft and one at IBM that have adopted TDD. The results of the case studies indicate that the pre-release defect density of the four products decreased between 40% and 90% relative to similar projects that did not use the TDD practice. Subjectively, the teams experienced a 1535% increase in initial development time after adopting TDD.Empirical Software Engineering02017-09-06T01:53:47.6354418952017-09-06T01:53:47.635441895<EFBFBD>_J <00>1<02> GGA Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition<07>Although initially introduced and studied in the late 1960s and early 1970s, statistical methods of Markov source or hidden Markov modeling have become increasingly popular in the last several years. There are two strong reasons why this has occurred. First the models are very rich in mathematical structure and hence can form the theoretical basis for use in a wide range of applications. Second the models, when applied properly, work very well in practice for several important applications. In this paper we attempt to carefully and methodically review the theoretical aspects of this type of statistical modeling and show how they have been applied to selected problems in machine recognition of speech.02017-09-06T01:53:46.6163190922017-09-06T01:53:46.616319092 <00>
O~<00><00>lP
;<02> -GGSupport-vector networks<07>Thesupport-vector network is a new learning machine for two-group classification problems. The machine conceptually implements the following idea: input vectors are non-linearly mapped to a very high-dimension feature space. In this feature space a linear decision surface is constructed. Special properties of the decision surface ensures high generalization ability of the learning machine. The idea behind the support-vector network was previously implemented for the restricted case where the training data can be separated without errors. We here extend this result to non-separable training data. High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated. We also compare the performance of the support-vector network to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.Machine Learning02017-09-06T01:53:53.3055668952017-09-06T01:53:53.305566895<EFBFBD>NO <00>]<02>AGGMessage analysis-guided allocation and low-pause incremental garbage collection in a concurrent language<07>We present a memory management scheme for a concurrent programming language where communication occurs using message-passing with copying semantics. The runtime system is built around process-local heaps, which frees the memory manager from redundant synchronization in a multithreaded implementation and allows the memory reclamation of process-local heaps to be a private business and to often take place without garbage collection. The allocator is guided by a static analysis which speculatively allocates data possibly used as messages in a shared memory area. To respect the (soft) real-time requirements of the language, we develop a generational, incremental garbage collection scheme tailored to the characteristics of this runtime system. The collector imposes no overhead on the mutator, requires no costly barrier mechanisms, and has a relatively small space overhead. We have implemented these schemes in the context of an industrial-strength implementation of a concurrent functional language used to develop large-scale, highly concurrent, embedded applications. Our measurements across a range of applications indicate that the incremental collector substantially reduces pause times, imposes only very small overhead on the total runtime, and achieves a high degree of mutator utilization.ISMM02017-09-06T01:53:51.5731088872017-09-06T01:53:51.573108887<EFBFBD>.N
O<02>GGXen and the art of virtualization<07>Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100% binary compatibility at the expense of performance. Others sacrifice security or functionality for speed. Few offer resource isolation or performance guarantees; most provide only best-effort provisioning, risking denial of service.This paper presents Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacrificing either performance or functionality. This is achieved by providing an idealized virtual machine abstraction to which operating systems such as Linux, BSD and Windows XP, can be <i>ported</i> with minimal effort.Our design is targeted at hosting up to 100 virtual machine instances simultaneously on a modern server. The virtualization approach taken by Xen is extremely efficient: we allow operating systems such as Linux and Windows XP to be hosted simultaneously for a negligible performance overhead --- at most a few percent compared with the unvirtualized case. We considerably outperform competing commercial and freely available solutions in a range of microbenchmarks and system-wide tests.SOSP02017-09-06T01:53:50.5508291022017-09-06T01:53:50.550829102 o<00><0F><0F><0F><0F>dJ$<0E><0E><0E>Z< <0A> <0A> <0A> <0A> g Q 1  <0C> <0C> <0C> <0C> l F & <0B> <0B> <0B> <0B> q N 4 
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
N
)
<09> <09> <09> t V < <08><08><08><08>f9<07><07><07><07>cI-<06><06><06><06>\<<05><05><05><05>nA<04><04><04>oM+ <03><03><03><03>gB<02><02><02><02>{U*<01><01><01>yW*
<00><1B>E# Alan GellerAlanGeller<1D>D% Sergey BykovSergeyBykov*<2A>C3Philip A. BernsteinPhilipA.Bernstein<1F>B' Moran TzafrirMoranTzafrir<19>A! Nir ShavitNirShavit#<23>@+ Maurice HerlihyMauriceHerlihy<1D>?% Robin MilnerRobinMilner*<2A>>3Flavio P. JunqueiraFlavioP.Junqueira<1F>=' Benjamin ReedBenjaminReed(<28><1Austin T. ClementsAustinT.Clements#<23>;+ Matti PitkänenMattiPitkänen<19>:! James GipsJamesGips<1D>9% George StinyGeorgeStiny<1C>8%Ulf T. WigerUlfT.Wiger<1B>7# Thomas ArtsThomasArts<1F>6' Hans SvenssonHansSvensson)<29>51 Nicholas SmallboneNicholasSmallbone"<22>4+Michal H. PalkaMichalH.Palka#<23>3+ Michael BurrowsMichaelBurrows<19>2! Dieter FoxDieterFox<1D>1% Xiaofeng RenXiaofengRen<1B>0# Evan HerbstEvanHerbst#<23>/+ Michael KraininMichaelKrainin<1B>.# Peter HenryPeterHenry<1F>-' Greg FriedmanGregFriedman<1F>,' Yuichi FujikiYuichiFujiki'<27>+/ Shinichi KawamotoShinichiKawamoto*<2A>*3Joan Morris DimiccoJoanMorrisDimicco"<22>)+David R. MillenDavidR.Millen1<6E>(9 'Jennifer Thom-SantelliJenniferThom-Santelli<1F>'' Ross PatersonRossPaterson*<2A>&3Maarten M. FokkingaMaartenM.Fokkinga<1B>%# Erik MeijerErikMeijer#<23>$+ Daniel Cohen-OrDanielCohen-Or<19>#! Shi-Min HuShi-MinHu<1D>"% Ariel ShamirArielShamir<13>! Zhe ZhuZheZhu<15>  Tao ChenTaoChen<1D>% Ákos SeressÁkosSeress<1D>% Robert BealsRobertBeals!<21>) László BabaiLászlóBabai<17> Erik TewsErikTews<1F>' Changhoon KimChanghoonKim%<25>- Srikanth KandulaSrikanthKandula<1D>% Navendu JainNavenduJain&<26>/James R. HamiltonJamesR.Hamilton<19>! Jan LahodaJanLahoda<17> Danny DigDannyDig<1F>' Lyle FranklinLyleFranklin<19>! Alex GyoriAlexGyori#<23>+ Hans-J. BriegelHans-J.Briegel"<22>+Jacob M. TaylorJacobM.Taylor<1F>' Vedran DunjkoVedranDunjko(<28>1David S. RosenblumDavidS.Rosenblum*<2A>3Roy Thomas FieldingRoyThomasFielding"<22>+Emin Gün SirerEminGünSirer<1D> % Bernard WongBernardWong!<21> ) Robert EscrivaRobertEscriva<1D> % Jade AlglaveJadeAlglave$<24>
-Magnus O. MyreenMagnusO.Myreen#<23> + Thomas BraibantThomasBraibant<17> Tom RidgeTomRidge<1B># Scott OwensScottOwens4<73>=Francesco Zappa NardelliFrancescoZappaNardelli<1D>% Peter SewellPeterSewell<1F>' Susmit SarkarSusmitSarkar<1D>% Peter BailisPeterBailis<19>! Kexin RongKexinRong"<22>+David D. RedellDavidD.Redell&<26>/Butler W. LampsonButlerW.Lampson$<24>-Douglas B. TerryDouglasB.Terry*<2A>~3Daniel C. SwinehartDanielC.Swinehart&<26>}/Howard E. SturgisHowardE.Sturgis<1F>|' Scott ShenkerScottShenker<1B>{# John LarsonJohnLarson<17>z Wes IrishWesIrish <20>y)Carl H. HauserCarlH.Hauser$<24>x-Daniel H. GreeneDanielH.Greene <20>w)Alan J. DemersAlanJ.Demers!<21>v) Sanni SiltanenSanniSiltanen<1B>u# Leo BreimanLeoBreiman&<26>t/Fred B. SchneiderFredB.Schneider<1D>s% Anupam GuptaAnupamGupta#<23>r+ Sanjoy DasguptaSanjoyDasgupta<1F>q' Samuel MaddenSamuelMadden*<2A>p3Michael J. FranklinMichaelJ.Franklin<17>o Gene PangGenePang<19>n! Tim KraskaTimKraska<1F>m' Michael StummMichaelStumm<1B>l# Pranay JainPranayJain<1D>k% Yongle ZhangYongleZhang<13>j Xu ZhaoXuZhao6<6F>i?Guilherme Renna RodriguesGuilhermeRennaRodrigues<19>h! Xin ZhuangXinZhuang<11>g Yu LuoYuLuo<17>f Ding YuanDingYuan'<27>e/ Hermann SchäggerHermannSchägger%<25>d-! Hans-Peter BraunHans-PeterBraun<1B>c# Ilka WittigIlkaWittig,<2C>b5Romi Fadillah RahmatRomiFadillahRahmat!<21>a) Andrew HandokoAndrewHandoko*<2A>`3Opim Salim SitompulOpimSalimSitompul#<23>_+ Vladimir VapnikVladimirVapnik!<21>^) Corinna CortesCorinnaCortes#<23>]+ Andrew WarfieldAndrewWarfield<17>\ Ian PrattIanPratt#<23>[+ !Rolf NeugebauerRolfNeugebauer<13>Z Alex HoAlexHo<1B>Y# Steven HandStevenHand<1B>X# Keir FraserKeirFraser!<21>W) Boris DragovicBorisDragovic <05> T?<05><00> S <00><02>wGGReverend Bayes on Inference Engines: A Distributed Hierarchical Approach<07>This paper presents generalizations of Bayes likelihood-ratio updating rule which facilitate an asynchronous propagation of the impacts of new beliefs and/or new evidence in hierarchically organized inference structures with multi-hypotheses variables. The computational scheme proposed specifies a set of belief parameters, communication messages and updating rules which guarantee that the diffusion of updated beliefs is accomplished in a single pass and complies with the tenets of Bayes calculus.AAAI02017-09-06T01:53:56.2922060552017-09-06T01:53:56.292206055<EFBFBD>R
/<02>a-GGBlue native PAGE.<07>Blue native PAGE (BN-PAGE) can be used for one-step isolation of protein complexes from biological membranes and total cell and tissue homogenates. It can also be used to determine native protein masses and oligomeric states and to identify physiological protein-protein interactions. Native complexes are recovered from gels by electroelution or diffusion and are used for 2D crystallization and electron microscopy or analyzed by in-gel activity assays or by native electroblotting and immunodetection. In this protocol, we describe methodology to perform BN-PAGE followed by (i) native extraction or native electroblotting of separated proteins, or (ii) a second dimension of tricine-SDS-PAGE or modified BN-PAGE, or (iii) a second dimension of isoelectric focusing (IEF) followed by a third dimension of tricine-SDS-PAGE for the separation of subunits of complexes. These protocols for 2D and 3D PAGE can be completed in 2 and 3 days.Nature protocols02017-09-06T01:53:55.3998291022017-09-06T01:53:55.399829102<EFBFBD>)Q <00><02>S<EFBFBD>GGA file undelete with Aho-Corasick algorithm in file recovery<07>In this research, a file undelete method is proposed by which the file recovery system retrieved the file metadata through a parsing process from the master file table (MFT) attributes. Using the Aho-Corasick algorithm, the process is then continued with a filtering process in which keywords are matched with file names. The result obtained shows that the proposed method is able to perform recovery of files that has been deleted from the file system. The experiment is performed four times with various file condition which had been overwritten 0%, 18.98%, 32.21% and 59.77% from their original size. The rate of the average file recovery success is 87.50% and the average time required is 0.32 second for string matching on file names.2016 International Conference on Informatics and Computing (ICIC)02017-09-06T01:53:54.0356779792017-09-06T01:53:54.035677979
<00>l<0F><0F><0F><0F><0F><0F>~jUG>.$<0E><0E><0E><0E><0E><0E><0E>|fSFT5  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> } d G *    <0C><02> <0C> <0C> <0C> <0C> <0C> <0C> <0C> q f Z D 5 ( <02>
<0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> z l ^ M 4 # 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>

s
e
Y
P
5
$
<09> <09> <09> <09> <09> <09> <09> <09> <09> <09> ~ t \ E / " <08><08><08><08><08><08><08><08>ufWN=4'<07><07><02><07><07><07><07><07><07><07>vj_T<02>D7' <06><06><06><06><06><06><06><06>b<06>{mVA7)<05><05><05><05><05><05><05>|kW+G: l <04><04><04>y<04><04><04><04>w[<02><02><02>9<02> <03>A<03><03><03><03><03><02><02><02>~kYP$<01><01><01><01>G<02>  cylinder- custom<03>
curse
curit<01>)cuckoo hashing<02> cuckooT+Ycsp communicating sequential processes-csf%cryptography<01>5computational effect<04> backend<04> aslry!ciphertextv conductj)chandy-lamporte1consensus protocold3consensus algorithmbconductor`;communication subsystem]-complex problemsT'constant timeL ancestorK/cluster computingA1computing hardware7#coordinator<02>%continuation<02>!contentioncontainer{9construction algorithm<02>1consistent hashingp7consistency semantics<02>3considerable amount<03>!Econsensus in an asynchronous<03>9concurrent programming 1concurrent programF!concurrent<01>#concurrency!conceptnetGconT-computer systems<03>1computer scientist<02>)computer model<02>/computer hardware<02>5computation resource<02> computa<00>!compromise`)complex object<00>#compilationJ commuterL commuteR'commutativityP command<00>9comfort and confidenceK comdroid<01>;combinatorial algorithm%colorization(3collision avoidance<00> collector3 coin<03>+code inspection<00>/co-representation<01> co-actor<03>cnn<01>'cluster state!cloud user<01>+cloud computings clojure;
clock<02>clo* clique clinical<01>/cleanup operation<03> classifi classic<03>#class-based@ clarityb!cityengine
cient
chunk chubbyt chrome<01>
chordk#choi matrixc
chessI'checkpointingu!checkpoint<03> checking; check:/chain replication<03>cga#certificate^cep<00> cent<00> censors
cde'#ccs and csp+cbr<02>causationycausality|1causal consistencyY causal<02> cation%catamorphism1#cardinality<03> carbonk/cancer prediction<01>'camera motion<02>-call-time choice1 calculus$ caching<02>/byzantine general/byzantine failureo3byzantine agreement bytebwt<02>!burstiness<01> bullet<02>bug<00> buffer<00> bucket<00>bst<01> browser<01> brdfY'bracket types%bp algorithm<00>7boyer-moore algorithm#boyer-moorea7boyer moore algorithm^bot<00> border boosting bollob9!board game<02>bnc<03>bms<03> blog blockin<02>#block layer` blob<02> blessing<03> blem<00> bitcoind3bisection bandwidth!'biotechnology<01>#binary tree<00>3binary search trees<01>#binary code<03> billions<01> bigtableF big dataM bidding<02>bid<02>%bft protocolxbft<00>1belief propagation<00> beehive
bcube"-bayesian network} bation<01>bad<02>+authority score auction<02>atomicityB-atomic multicast+ atomic]
ation<00>!Easynchronous message passing<00>=asynchronous environmentC%asynchronous<00> asyncXasymmetryast<00>assemblerasrVasd<03> asap<03>!artificial<02>
arrow0;argumentation semantics<02>;argumentation framework<02>3area of mathematics( archival<01>arc<00>5approximate counting<02>appapie%anti-entropyant+;anonymous communicationanonymity<01>ann<01>animationH3android applicationx#android appw analytic'analysis toolv-analysis threads<03>7analysis of algorithm]ams!amazon.com<03> alphago<02>allocator<00>/allocation scheme./algebraic effectsr algebra.alg<00>aic agendar afrpL!affordance<02>adl<02> adaboost+actual hardware)activity level<01>)activity class<01>1action recognition<01>acme acidy!accidental<02>9abstract argumentation<02>/3d reconstruction<00>
<01><00><01>{hSF2$<04><04><04><04><04><04><04><04><04>taOF<03><03><03><03><02><03><03><01><0F><0F><0F><0F><0F><0F><0F><03>3k[I5'<0E><0E><0E>H<0E><0E><0E><0E><0E><0E><0E>o[>*<02> <0A> <0A> <0A> <0A> <0A> <0A> <0A><03> <0A> r U I : $    <0C> <0C> <0C> <0C>o <0C> w<03> Y J A 1 '<02>   <0B> <0B> <0B> <0B>S <0B> <0B>f <0B> <0B> <0B> y m c Z Q H > 5 +   <02>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD><02>
<EFBFBD>
b
T
G
?
4


 <09> <09> <09> <09><02> <09> <09> <09> y o _ S E 9 0<01> ! <08><08><08><08><08><08><08>xodYM;,<07><07><07><07><07><07><07><03>wdZI5<06><06><06><06><06><06><06><06><06>viSKA8<05><05><05><05><05>}mYP<01>G1hdf,
essay*h-daily medication1<00>high-level operators<03>+high throughput<03>-high reliability<01>heap68hci<01>)hashing method<03>!hash table<00>'hash function<02> hash@ hard<01>har haneff<04>%eavesdropper!encryption~ defense{disruptorwcuth fifof forensicW/different systemsQ+data managementO
dbmssN'documentationIdos</different results:-design principle4data loss1fds/ dilemma.dag{ cylinder- custom<03>
curse
curit<01>)cuckoo hashing<02> cuckooT+Ycsp communicating sequential processes-csf%cryptography<01>'cryptographic<01>'cryptographer<01>)cryptocurrency<03> crushq
crowd<01> crisisf#crazy stone<03>)crash-recoveryk'crash failureD crash' cpus-cpu_cpl<02>
cover<03> counting<03>)counterfactualJ counter<02>+correct processl'correct model copyingmgame tree<03>%game element)future attacks<01>3fundamental concept<03>,[functional programming language haskell<01>9functional programming3functional languagefun<02> full<00>frpZ-frequency moment<02> freenetj free<01>'fragmentation<01>fpga5+formal semantic<01> formal<02> footnoteH#fm sketches?flowdroids%flow control-
flavor\fix0 fitting)/first-order logic)fingerprinting<03>#fingerprint<03> fine:'fetch-and-addf-feature engineer=fault-tolerant consensus<00>)fault-tolerantv+fault tolerance<00> fast])famous example<02> familiar<02>-failure detector~/failure detection<00>factoring<02>%factor graph<00> facial<01>
facet{
facade faab-expression graph<03>7experimental analysis_expensive<00>exp~ executor<02>5eventual consistency<03> eventual<02> evasion<03>ets)essential step<02>essential<02>ers<01> erlang<00> epidemic<00> epaxos<02>!enumerator<02> enum<02> enigmaG5end-to-end principle[/encryption method<02>)encryption key encoding<01>enceUenc<00>3employee engagement|embedding<00> elocity<00>+electronic mail
elder/eldg elastic<01> eighties<01>=efficient implementation effi<00>
eeect educator) edsl<01> editor<00> editing<01>edit=5economics literature<02>eccebr{ ebayt'early warning>e.g< dynamo<03> dyad<03>dwa<00> dual<00>dsl<03>dsg<03>dsa dryadG dropboxb
droid<01> dp-slam<01>dox$ downtime<03>+dominant threadTdofF;document classification<00>dns'dna computing<02>dlp<00>%dissertationO dissent disk<01>!disclosure<01>dis<02>directoryM=dimensionality reduction<03>%digital gameR!Ediffie-hellman key agreement<00>7different consistency<02>/different cluster<03>7different applicationdif<01>!dictionary<02>dht~ dhmm<00>-development team<00>developed<03> detour<00>;deterministic execution<02>#determinism<01>%design space<02>des<02>depth map<00>7dependent type theory)dependent types denali<00>#demographicQ!delegation<03>degreaser %definition 1<01>)defect density<00>;deep learning technique*)decryption key)decision trees<02> debuggingm deadlocky1de finetti theorem_dcsdcnM
dcell$ dc-netdatastore$!datacenterg+database theory<03>-database systemss data typeA)data structure %data storage<01>!data space)data operationz!data model<03>data item<02>data flow<02>3data center network##data centerL-data aggregation
darpa<01>dak<03> <00><0F><0F><0F><0F><0F><0F><0F><0F>{rYO<4( <0E><0E><0E><0E><0E><0E><0E><0E><0E>}WH*"  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> l U A )    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> x h Z J 4   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> x l V K C : 2 *   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
y
q
b
Q
3
#

<09> <09> <09> <09> <09> <09> <09> <09> } u d W O G 7 + !  <08><08><08><08><08><08><08>viTB8/"
<07><07><07><07><07><07><07><07>yjJ>)<06><06><06><06><06><06><06><06><06><06>|s\RH?5,#<05><05><05><05><05><05><05><05><05>hQG-$<04><04><04><04><04><04>~aWI;'<03><03><03><03><03><03><03><03>zqgR<(<02><02><02><02><02><02><02><02>~s^LC+<12>u+graphical model<0F>t%factor graph<15>s1belief propagation<06>rrbf<0F>q%maximization<12>p+kernel function<08>olkopf<08>nvoxel<07>mfull<15>l1paravirtualization <09>kdenali<06>jlso<06>ixen<06>hbft<11>g)paxos protocol<1B>f=fault-tolerant consensus<0F>e%asynchronous<06>dibm<06>ctdd<11>b)defect density<13>a-development team<12>`+code inspection<07>_dhmm<06>^isa<14>]/scaling procedure<06>\alg<07>[tsdf <0C>Zdepth map<14>Y/3d reconstruction<19>X9kinectfusion algorithm<06>Wgpu<07>Vslab <0C>Uallocator<10>T'kernel memory <09>Sbuffer<11>R)complex object <0B>Qscalable <0B>Pepidemic<07>Oties<1A>N;document classification <0C>Mhypertext<1A>L;web page classification<16>K3text classification <0B>Jrelevant <09>Ireboot <0C>Hexpensive<15>G1persistent storage <09>Fuptime<08>Ejudge<06>Dbot<06>Clos<17>B5machine intelligence<07>Acent<14>@/stream processing<14>?/programming model <0C>>millwheel <0C>=streaming<12><+fault tolerance <09>;editor <09>:mbeddr<06>9ast<06>8pes<11>7)random testing<08>6ation<06>5enc <0A>4!quickcheck <0C>3generator<06>2lfu<06>1lir<07>0lrfu<06>/arc<07>.ping<07>-swim<14>,/failure detection<06>+int<07>*effi<08>)rithm
<EFBFBD>(computa <0A>'!membership <09>&gossip<06>%tcp<0F>$%partial view <09>#random <0B>"liveness <0C>!ironfleet<06> bug<07>dual<15>1reference counting<12>+reference count <09>detour<1D>Aresilient overlay networks <0C>multicast<06>qos <09>ticast<14>/number of records<0E>#binary tree<11>)linear hashing <0A>!hash table <09>bucket<16>3collision avoidance<08>local<15>1obstacle avoidance
<EFBFBD>mission<06>dwa<07> void<0F> %mobile robot<12> +motion dynamics
<EFBFBD>
command
<EFBFBD> elocity<06>cep<07>blem<1F>Ediffie-hellman key agreement<06>dlp <0A>!public-key <0B>knapsack<1F>Easynchronous message passing <09>erlang<07>statplaid~mixin
}sch rli|#reclamation{ebrzrcu ydeadlockx%bft protocolwsmrv)fault-tolerantu?state machine replicationtvlls-database systemsrrushqcrushp1consistent hashingoosd nmetadata mdebugging lpreterk#interpreterj?line integral convolutioni%vector field h!streamlinegeldfodteapid#source-codec/generic technique
bdropboxa/security analysis`#block layer_cpu^ghc
]garbage \flavor[rpcZfrpYguiXasyncWpreVasrUenceTcon StationR/garbage collector
QpointerPlem OtreadmillN)load balancingMdcnL#data centerK5network architecture
JmonsoonImerge H!map-reduceGdryadFmod EmapreduceD=prototype-based languageC/natural extensionB#inheritance Adata type@#class-based?3vandalism detection>'early warning=edit <vandal ;checking:check 9static8#soft typing 7run-time6heap5fpga4mmu 3collector
2mutator13memory architecture0+message passing/1garbage collection./allocation scheme-lisp,mop+ant*clo);viewstamped replication(paxos'crash
&primary %!leadership
$grammar#split"mar !street facademcs?synchronization primitive !contention$Operformance and energy efficiencylock !sequence xsgd labels t#local model)vertices of g. messaging/messaging systems analytic linkedin log data#concurrency
mhealthapp )sensitive data hipaa 5security and privacy
yarn
schedul'cluster state schedulermeso3byzantine agreementreplilie/byzantine general#synchronous <00><01><0F><0F><0F><0F><0F><0F><0F><0F>vgYI;) <0E><0E><0E><0E><0E><0E><0E><0E>ubYG2 <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> q g ^ E : !  <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> x o ] N < ,   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> ~ o d P > & 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
d
Y
L
6
*

 <09> <09> <09> <09> <09> <09> <09> <09> ~ n ] T E : 1   <08><08><08><08><08><08><08><08>ypaWJ7& <07><07><07><07><07><07><07><07><07><07><07>{iK>4*<06><06><06><06><06><06><06><06>lcM0<05><05><05><05><05><05><05>vmOB6& <04><04><04><04><04><04><04><04>qgUD6)<03><03><03><03><03><03><03>saLA4( <02><02><02><02><02><02><02><02>qeWL=0& <01><01> <09>^stereo<06>]dif <09>\facial <09>[mosaic <0B>Zpanorama<07>Yseam
<EFBFBD>Xediting <0C>Wprivilege<08>Vdroid <0B>Ucomdroid <09>Tintent<10>S'fragmentation <09>Rmalloc<07>Qfree<15>P1message complexity <0C>Oprimitive<13>N-high reliability <0A>M!resilience<0F>L%data storage<10>K'biotechnology <0B>Jarchival <0B>Iencoding <09>Hchrome
<EFBFBD>Gbrowser<08>Fopera<12>E+mozilla firefox<0F>D%installation<11>C)others' action <0A>B!psychology<12>A+joint attention<18>@7shared representation<14>?/co-representation <0A>>!disclosure<07>=talk <09><puzzle<10>;'cryptographer<0F>:%social graph
<EFBFBD>9unicorn <0B>8billions<0E>7#millisecond<0F>6%life science<07>5read<0F>4%plementation <0A>3!concurrent<0F>2%non-blocking<07>1lstm<11>0)video analysis<15>/1action recognition<06>.cnn<11>-)activity class<0E>,#determinism<06>+svm<08>*curit<06>)saa <0A>(!cloud user <09>'techni
<EFBFBD>&elastic<1B>%=mobile phone application<06>$hci<11>#)social support<12>"+number of steps<11>!)activity level<08> laser<11>)slam algorithm
<EFBFBD>dp-slam <0B>grid map<13>-state estimation
<EFBFBD>overlay<07>ment<13>-sampling service<1A>;generational collection<13>-train algorithms<06>ers<1A>;machine learning method<06>ann <0B>clinical<14>/cancer prediction <09>mixnet <0C>anonymity<10>'cryptographic<08>crowd<0F> %cryptography<0E> #mix network <09> sender<08>
mixes<07> http<07>gpus
<EFBFBD>octrees<1B>=reconstruction algorithm<0F>%skin surface <0B>scanning<07>hair<06>lgd<06>prf <0A>!burstiness<06>les<06>~exp<13>}-bayesian network <0C>|causality<06>{dag<06>zsgs <0C>ycausation<16>x3android application<0E>w#android app<10>v'analysis tool
<EFBFBD>umalware<07>tleak <0C>sflowdroid<06>rows <0C>qlifecycle<10>p'goal position
<EFBFBD>oplanner<10>n'path planning <0C>mgeometric<12>l+motion planning <09>kcarbon<07>jnadp<11>i)ros production<07>hnadh<08>gnadph<10>f'fetch-and-add<06>eacm<08>dqueue <0C>cwait-free<06>bfaa<0E>a#boyer-moore <0A>`!compromise
<EFBFBD>_toolkit<18>^7boyer moore algorithm<07>]fast<06>\tem<17>[5end-to-end principle<06>Zhop
<EFBFBD>Yplement
<EFBFBD>Xhotspot<15>W1partial evaluation
<EFBFBD>Vtruffle <0C>Uhopscotch <09>Tcuckoo<13>S-interface design
<EFBFBD>Rcommute<08>Qposix<10>P'commutativity<0F>O%dissertation<1C>N?multithreaded application <0C>Mdirectory <0B>Lcommuter<19>K9comfort and confidence<11>J)counterfactual<13>I-little knowledge <0C>Hswiftness <09>Genigma<15>F1concurrent program<0F>E%unit testing<11>D)race condition<08>Cpulse <0C>Bzookeeper<12>A+google's chubby<10>@'rgb-d mapping<06>?icp<07>>rgbd<07>=slam<0F><%rgb-d camera<06>;rus<07>:fine<0E>9#microreboot<06>8ure<06>7sns <0B>6mechanic<10>5'user activity <0A>4!reputation<0F>3%gamification <0C>2recursion<0F>1%catamorphism<06>0fix<06>/jer
<EFBFBD>.algebra <0B>-cylinder<13>,-simple 3d shapes <0A>+!photograph<0F>*%single photo
<EFBFBD>)fitting <09>(oracle<0F>'%matrix group <0B>&quotient<06>%wep<08>$dcell<16>#3data center network<08>"bcube<16>!3bisection bandwidth<06> aic<07>sloc<0E>#refactoring<14>/lambda expression<07>soap<1B>=rest architectural style <09>cation<06>soa<06>dcs<07>pace <0A>!hyperspace <0B>hyperdex<12>+key-value store<13>-machine language<12>+actual hardware<0F>%memory model<06>hol<10>'correct model<15>1priority inversion <0C> operating<08> inter<14> /personal computer <0B>
handling<19> 9concurrent programming
<EFBFBD>monitor<07>push <0C>spreading<0F>%anti-entropy<06>rfs<0F>%randomforest <0B>boosting <0A>!out-of-bag <0B>adaboost <0C>embedding <0B>~subspace<08>}lemma <0A>|!well-known<18>{7johnson-lindenstrauss<07>zmdcc <09>ymaster <0C>xmegastore <0C>wwide-area<0F>v%bp algorithm <00><08><04><02><00><00> W <00>/<02>O/GGImplementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial<07>The state machine approach is a general method for implementing fault-tolerant services in distributed systems. This paper reviews the approach and describes protocols for two different failure models&#8212;Byzantine and fail stop. Systems reconfiguration techniques for removing faulty components and integrating repaired components are also discussed.ACM Comput. Surv.02017-09-06T01:54:00.0583090822017-09-06T01:54:00.058309082<EFBFBD>oV <00><02>/?GGAn elementary proof of a theorem of Johnson and Lindenstrauss<07>A result of Johnson and Lindenstrauss [13] shows that a set of n points in high dimensional Euclidean space can be mapped into an O(log n/⑀ 2)-dimensional Euclidean space such that the distance between any two points changes by only a factor of (1 Ϯ ⑀). In this note, we prove this theorem using elementary probabilistic techniques.Random Struct. Algorithms02017-09-06T01:53:59.1415839842017-09-06T01:53:59.141583984<EFBFBD>U
S<02>)GGMDCC: Multi-Data Center Consistency<07>Replicating data across multiple data centers allows using data closer to the client, reducing latency for applications, and increases the availability in the event of a data center failure. MDCC (Multi-Data Center Consistency) is an optimistic commit protocol for geo-replicated transactions, that does not require a master or static partitioning, and is strongly consistent at a cost similar to eventually consistent protocols. MDCC takes advantage of Generalized Paxos for transaction processing and exploits commutative updates with value constraints in a quorum-based system. Our experiments show that MDCC outperforms existing synchronous transactional replication protocols, such as Megastore, by requiring only a single message round-trip in the normal operational case independent of the master-location and by scaling linearly with the number of machines as long as transaction conflict rates permit.EuroSys02017-09-06T01:53:58.2243090822017-09-06T01:53:58.224309082<EFBFBD>OT <00><02>GGSimple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems<07>Large, production quality distributed systems still fail periodically , and do so sometimes catastrophically, where most or all users experience an outage or data loss. We present the result of a comprehensive study investigating 198 randomly selected, user-reported failures that occurred on Cassandra, HBase, Hadoop Distributed File System (HDFS), Hadoop MapReduce, and Redis, with the goal of understanding how one or multiple faults eventually evolve into a user-visible failure. We found that from a testing point of view, almost all failures require only 3 or fewer nodes to reproduce, which is good news considering that these services typically run on a very large number of nodes. However, multiple inputs are needed to trigger the failures with the order between them being important. Finally, we found the error logs of these systems typically contain sufficient data on both the errors and the input events that triggered the failure, enabling the diagnose and the reproduction of the production failures. We found the majority of catastrophic failures could easily have been prevented by performing simple testing on error handling code the last line of defense even without an understanding of the software design. We extracted three simple rules from the bugs that have lead to some of the catastrophic failures, and developed a static checker, Aspirator, capable of locating these bugs. Over 30% of the catastrophic failures would have been prevented had Aspirator been used and the identified bugs fixed. Running Aspirator on the code of 9 distributed systems located 143 bugs and bad practices that have been fixed or confirmed by the developers.OSDI02017-09-06T01:53:57.4324108892017-09-06T01:53:57.432410889 > <0B>]s><00>2[
i<02>y#CCExperience with Processes and Monitors in Mesa<07>The use of monitors for describing concurrency has been much discussed in the literature. When monitors are used in real systems of any size, however, a number of problems arise which have not been adequately dealt with: the semantics of nested monitor calls; the various ways of defining the meaning of WAIT; priority scheduling; handling of timeouts, aborts and other exceptional conditions; interactions with process creation and destruction; monitoring large numbers of small objects. These problems are addressed by the facilities described here for concurrent programming in Mesa. Experience with several substantial applications gives us some confidence in the validity of our solutions.Commun. ACM02017-09-06T01:54:04.06490212017-09-06T01:54:04.0649021<EFBFBD>gZ
{<02>WGGEpidemic Algorithms for Replicated Database Maintenance<07>When a database is replicated at many sites, maintaining mutual consistency among the sites in the face of updates is a significant problem. This paper describes several randomized algorithms for distributing updates and driving the replicas toward consistency. The algorithms are very simple and require few guarantees from the underlying communication system, yet they ensure that the effect of every update is eventually reflected in all replicas. The cost and performance of the algorithms are tuned by choosing appropriate distributions in the randomization step. The algorithms are closely analogous to epidemics, and the epidemiology literature aids in understanding their behavior. One of the algorithms has been implemented in the Clearinghouse servers of the Xerox Corporate Internet. solving long-standing problems of high traffic and database inconsistency.PODC02017-09-06T01:54:02.8968181152017-09-06T01:54:02.896818115<EFBFBD>LY
}<02>3EEDiminished reality for augmented reality interior design<07>A modular real-time diminished reality pipeline for indoor applications is presented. The pipeline includes a novel inpainting method which requires no prior information of the textures behind the object to be diminished. The inpainting method operates on rectified images and adapts to scene illumination. In typically challenging illumination situations, the method produces more realistic results in indoor scenes than previous approaches. Modularity enables using alternative implementations in different stages and adapting the pipeline for different applications. Finally, practical solutions to problems occurring in diminished reality applications, for example interior design, are discussed.The Visual Computer02017-09-06T01:54:01.972642092017-09-06T01:54:01.97264209<EFBFBD>QX
)<02>e-GGRandom Forests<07>Random forests are a combination of tree predictors such that each tree depends on the values of a random vector sampled independently and with the same distribution for all trees in the forest. The generalization error for forests converges a.s. to a limit as the number of trees in the forest becomes large. The generalization error of a forest of tree classifiers depends on the strength of the individual trees in the forest and the correlation between them. Using a random selection of features to split each node yields error rates that compare favorably to Adaboost (Y. Freund & R. Schapire, Machine Learning: Proceedings of the Thirteenth International conference, ***, 148156), but are more robust with respect to noise. Internal estimates monitor error, strength, and correlation and these are used to show the response to increasing the number of features used in the splitting. Internal estimates are also used to measure variable importance. These ideas are also applicable to regression.Machine Learning02017-09-06T01:54:00.9908378912017-09-06T01:54:00.990837891 z <09>z<00>n]
s<02>mGGThe semantics of x86-CC multiprocessor machine code<07>Multiprocessors are now dominant, but real multiprocessors do not provide the sequentially consistent memory that is assumed by most work on semantics and verification. Instead, they have subtle relaxed (or weak) memory models, usually described only in ambiguous prose, leading to widespread confusion.
We develop a rigorous and accurate semantics for x86 multiprocessor programs, from instruction decoding to relaxed memory model, mechanised in HOL. We test the semantics against actual processors and the vendor litmus-test examples, and give an equivalent abstract-machine characterisation of our axiomatic memory model. For programs that are (in some precise sense) data-race free, we prove in HOL that their behaviour is sequentially consistent. We also contrast the x86 model with some aspects of Power and ARM behaviour.
This provides a solid intuition for low-level programming, and a sound foundation for future work on verification, static analysis, and compilation of low-level concurrent code.POPL02017-09-06T01:54:05.7674279792017-09-06T01:54:05.767427979<EFBFBD>\ <00>G<02>]GGASAP: Automatic Smoothing for Attention Prioritization in Streaming Time Series Visualization<07>Time series visualization of streaming telemetry (i.e., charting of key metrics such as server load over time) is increasingly prevalent in recent application deployments. Existing systems simply plot the raw data streams as they arrive, potentially obscuring large-scale deviations due to local variance and noise. We propose an alternative: to better prioritize attention in time series exploration and monitoring visualizations, smooth the time series as much as possible to remove noise while still retaining large-scale structure. We develop a new technique for automatically smoothing streaming time series that adaptively optimizes this trade-off between noise reduction (i.e., variance) and outlier retention (i.e., kurtosis). We introduce metrics to quantitatively assess the quality of the choice of smoothing parameter and provide an efficient streaming analytics operator, ASAP, that optimizes these metrics by combining techniques from stream processing, user interface design, and signal processing via a novel autocorrelation-based pruning strategy and pixel-aware preaggregation. We demonstrate that ASAP is able to improve users' accuracy in identifying significant deviations in time series by up to 38.4% while reducing response times by up to 44.3%. Moreover, ASAP delivers these results several orders of magnitude faster than alternative optimization strategies.ArXiv02017-09-06T01:54:04.8971979982017-09-06T01:54:04.897197998 <00>
<EFBFBD> <09><05><00><00>ha <00>)<02>-GGCrossing the gap from imperative to functional programming through refactoring<07>Java 8 introduces two functional features: lambda expressions and functional operations like map or filter that apply a lambda expression over the elements of a Collection. Refactoring existing code to use these new features enables explicit but unobtrusive parallelism and makes the code more succinct. However, refactoring is tedious: it requires changing many lines of code. It is also error-prone: the programmer must reason about the control-, data-flow, and side-effects. Fortunately, refactorings can be automated. We designed and implemented LambdaFicator, a tool which automates two refactorings. The first refactoring converts anonymous inner classes to lambda expressions. The second refactoring converts for loops that iterate over Collections to functional operations that use lambda expressions. Using 9 open-source projects, we have applied these two refactorings 1263 and 1709 times, respectively. The results show that LambdaFicator is useful: (i) it is widely applicable, (ii) it reduces the code bloat, (iii) it increases programmer productivity, and (iv) it is accurate.ESEC/SIGSOFT FSE02017-09-06T01:54:09.3566770022017-09-06T01:54:09.356677002<EFBFBD>e`
O<02>Y;GGQuantum-enhanced machine learning<07>The emerging field of quantum machine learning has the potential to substantially aid in the problems and scope of artificial intelligence. This is only enhanced by recent successes in the field of classical machine learning. In this work we propose an approach for the systematic treatment of machine learning, from the perspective of quantum information. Our approach is general and covers all three main branches of machine learning: supervised, unsupervised, and reinforcement learning. While quantum improvements in supervised and unsupervised learning have been reported, reinforcement learning has received much less attention. Within our approach, we tackle the problem of quantum enhancements in reinforcement learning as well, and propose a systematic scheme for providing improvements. As an example, we show that quadratic improvements in learning efficiency, and exponential improvements in performance over limited time periods, can be obtained for a broad class of learning problems.Physical review letters02017-09-06T01:54:08.5553469242017-09-06T01:54:08.555346924<EFBFBD>_
<00># GGArchitectural Styles and the Design of Network-based Software Architectures<07>02017-09-06T01:54:07.6823510742017-09-06T01:54:07.682351074<EFBFBD>u^
s<02>uGGHyperDex: a distributed, searchable key-value store<07>Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance and scalability advantages compared to traditional databases, they achieve these properties through a restricted API that limits object retrieval---an object can only be retrieved by the (primary and only) key under which it was inserted. This paper presents HyperDex, a novel distributed key-value store that provides a unique <b>search</b> primitive that enables queries on secondary attributes. The key insight behind HyperDex is the concept of <i>hyperspace hashing</i> in which objects with multiple attributes are mapped into a multidimensional hyperspace. This mapping leads to efficient implementations not only for retrieval by primary key, but also for partially-specified secondary attribute searches and range queries. A novel chaining protocol enables the system to achieve strong consistency, maintain availability and guarantee fault tolerance. An evaluation of the full system shows that HyperDex is 12-13x faster than Cassandra and MongoDB for finding partially specified objects. Additionally, HyperDex achieves 2-4x higher throughput for <b>get</b>/<b>put</b> operations.SIGCOMM02017-09-06T01:54:06.6491931152017-09-06T01:54:06.649193115 <07>
/<07><00>c
C<02>-IGGAttacks on the WEP protocol<07>WEP is a protocol for securing wireless networks. In the past years, many attacks on WEP have been published, totally breaking WEP's security. This thesis summarizes all major attacks on WEP. Additionally a new attack, the PTW attack, is introduced, which was partially developed by the author of this document. Some advanced versions of the PTW attack which are more suiteable in certain environments are described as well. Currently, the PTW attack is fastest publicly known key recovery attack against WEP protected networks.IACR Cryptology ePrint Archive02017-09-06T01:54:11.2723898932017-09-06T01:54:11.272389893<EFBFBD>Nb
m<02>%#GGVL2: a scalable and flexible data center network<07>To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to be assigned to any service. To meet these goals, we present VL2, a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services, and Ethernet layer-2 semantics. VL2 uses (1) flat addressing to allow service instances to be placed anywhere in the network, (2) Valiant Load Balancing to spread traffic uniformly across network paths, and (3) end-system based address resolution to scale to large server pools, without introducing complexity to the network control plane. VL2's design is driven by detailed measurements of traffic and fault data from a large operational cloud service provider. VL2's implementation leverages proven network technologies, already available at low cost in high-speed hardware implementations, to build a scalable and reliable network architecture. As a result, VL2 networks can be deployed today, and we have built a working prototype. We evaluate the merits of the VL2 design using measurement, analysis, and experiments. Our VL2 prototype shuffles 2.7 TB of data among 75 servers in 395 seconds - sustaining a rate that is 94% of the maximum possible.Commun. ACM02017-09-06T01:54:10.3730490722017-09-06T01:54:10.373049072 OkWO<00>f <00><02>sGGFunctional Programming with Bananas, Lenses, Envelopes and Barbed Wire<07>We develop a calculus for lazy functional programming based on recursion operators associated with data type deenitions. For these operators we derive various algebraic laws that are useful in deriving and manipulating programs. We shall show that all example functions in Bird and Wadler's \Introduction to Functional Programming" can be expressed using these operators.FPCA02017-09-06T01:54:13.9276760252017-09-06T01:54:13.927676025<EFBFBD>e
}<02>/GG3-Sweep: extracting editable objects from a single photo<07>We introduce an interactive technique for manipulating simple 3D shapes based on extracting them from a single photograph. Such extraction requires understanding of the components of the shape, their projections, and relations. These simple cognitive tasks for humans are particularly difficult for automatic algorithms. Thus, our approach combines the cognitive abilities of humans with the computational accuracy of the machine to solve this problem. Our technique provides the user the means to quickly create editable 3D parts---human assistance implicitly segments a complex object into its components, and positions them in space. In our interface, three strokes are used to generate a 3D component that snaps to the shape's outline in the photograph, where each stroke defines one dimension of the component. The computer reshapes the component to fit the image of the object in the photograph as well as to satisfy various inferred geometric constraints imposed by its global 3D structure. We show that with this intelligent interactive modeling tool, the daunting task of object extraction is made simple. Once the 3D object has been extracted, it can be quickly edited and placed back into photos or 3D scenes, permitting object-driven photo editing tasks which are impossible to perform in image-space. We show several examples and present a user study illustrating the usefulness of our technique.ACM Trans. Graph.02017-09-06T01:54:13.0747419432017-09-06T01:54:13.074741943<EFBFBD>d
[<02>MGGPolynomial-time theory of matrix groups<07>We consider matrix groups, specified by a list of generators, over finite fields. The two most basic questions about such groups are membership in and the order of the group. Even in the case of abelian groups it is not known how to answer these questions without solving hard number theoretic problems (factoring and discrete log); in fact, constructive membership testing in the case of 1 &#215; 1 matrices is precisely the discrete log problem. So the reasonable question is whether these problems are solvable in randomized polynomial time using number theory oracles. Building on 25 years of work, including remarkable recent developments by several groups of authors, we are now able to determine the order of a matrix group over a finite field of odd characteristic, and to perform constructive membership testing in such groups, in randomized polynomial time, using oracles for factoring and discrete log. One of the new ingredients of this result is the following. A group is called semisimple if it has no abelian normal subgroups. For matrix groups over finite fields, we show that the order of the largest semisimple quotient can be determined in randomized polynomial time (no number theory oracles required and no restriction on parity). As a by-product, we obtain a natural problem that belongs to BPP and is not known to belong either to RP or to coRP. No such problem outside the area of matrix groups appears to be known. The problem is the decision version of the above: Given a list A of nonsingular d &#215; d matrices over a finite field and an integer N, does the group generated by A have a semisimple quotient of order &gt; N? We also make progress in the area of constructive recognition of simple groups, with the corollary that for a large class of matrix groups, our algorithms become Las Vegas.STOC02017-09-06T01:54:12.1485119632017-09-06T01:54:12.148511963 <07> <0C><07><00>th
e<02>GGMicroreboot - A Technique for Cheap Recovery<07>A significant fraction of software failures in large-scale Internet systems are cured by rebooting, even when the exact failure causes are unknown. However, rebooting can be expensive, causing nontrivial service disruption or downtime even when clusters and failover are employed. In this work we separate process recovery from data recovery to enable microrebooting a fine-grain technique for surgically recovering faulty application components, without disturbing the rest of the application. We evaluate microrebooting in an Internet auction system running on an application server. Microreboots recover most of the same failures as full reboots, but do so an order of magnitude faster and result in an order of magnitude savings in lost work. This cheap form of recovery engenders a new approach to high availability: microreboots can be employed at the slightest hint of failure, prior to node failover in multi-node clusters, even when mistakes in failure detection are likely; failure and recovery can be masked from end users through transparent call-level re-tries; and systems can be rejuvenated by parts, without ever being shut down.OSDI02017-09-06T01:54:15.5722810062017-09-06T01:54:15.572281006<EFBFBD>ug
e<02> GGRemoving gamification from an enterprise SNS<07>Gamification, the use of game mechanics in non-gaming applications, has been applied to various systems to encourage desired user behaviors. In this paper, we examine patterns of user activity in an enterprise social network service after the removal of a points-based incentive system. Our results reveal that the removal of the incentive scheme did reduce overall participation via contribution within the SNS. We also describe the strategies by point leaders and observe that users geographically distant from headquarters tended to comment on profiles outside of their home country. Finally, we describe the implications of the removal of extrinsic rewards, such as points and badges, on social software systems, particularly those deployed within an enterprise.CSCW02017-09-06T01:54:14.7561608892017-09-06T01:54:14.756160889 <01>(<01><00>;j <00> <02>mGGThe Chubby Lock Service for Loosely-Coupled Distributed Systems<07>We describe our experiences with the Chubby lock service, which is intended to provide coarse-grained locking as well as reliable (though low-volume) storage for a loosely-coupled distributed system. Chubby provides an interface much like a distributed file system with advisory locks, but the design emphasis is on availability and reliability, as opposed to high performance. Many instances of the service have been used for over a year, with several of them each handling a few tens of thousands of clients concurrently. The paper describes the initial design and expected use, compares it with actual use, and explains how the design had to be modified to accommodate the differences.OSDI02017-09-06T01:54:17.3337971192017-09-06T01:54:17.333797119<EFBFBD>Ui <00>+<02>GGRGB-D Mapping: Using Depth Cameras for Dense 3D Modeling of Indoor Environments<07>1 Problem Statement and Related Work RGB-D cameras are novel sensing systems that capture RGB images along with per-pixel depth information. RGB-D cameras rely on either structured light patterns combined with stereo sensing [6, 10] or time-of-flight laser sensing [1] to generate depth estimates that can be associated with RGB pixels. Very soon, small, high-quality RGB-D cameras developed for computer gaming and home entertainment applications will become available at cost below $100. In this paper we investigate how such cameras can be used in the context of robotics, specifically for building dense 3D maps of indoor environments. Such maps have applications in robot navigation, manipulation, semantic mapping, and telepresence. The robotics and computer vision communities have developed a variety of techniques for 3D mapping based on laser range scans [8, 11], stereo cameras [7], monocular cameras [3], and unsorted collections of photos [4]. While RGB-D cameras provide the opportunity to build 3D maps of unprecedented richness, they have drawbacks that make their application to 3D mapping difficult: They provide depth only up to a limited distance (typically less than 5m), depth values are much noisier than those provided by laser scanners, and their field of view ( 60 •) is far more constrained than that of specialized cameras or laser scanners typically used for 3D mapping ( 180 •). In our work, we use a camera developed by PrimeSense [10]. The key insights of this investigation are: first, that existing frame matching techniques are not sufficient to provide robust visual odometry with these cameras; second, that a tight integration of depth and color information can yield robust frame matching and loop closure detection; third, that building on best p
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
m
c
Z
Q
G
=
3
)


 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> v l b X N D : 0 &   <08><08><08><08><08><08><08><08><08><08><08><08><08>~tj`VLB8.$<07><07><07><07><07><07><07><07><07><07><07><07><07>{qg]SI?5+!<06><06><06><06><06><06><06><06><06><06><06><06><06>{qh^TJ@6-#<05><05><05><05><05><05><05><05><05><05><05><05><05>{qg]SI?5+! <04><04><04><04><04><04><04><04><04><04><04><04><04>xndZPG=3) <03><03><03><03><03><03><03><03><03><03><03><03>ukaWMC9/%<02><02><02><07>lAj<06>k(j<06>jwj<07>i<00>j<07>h@i<07>g?i<07>f>i<07>e=i<07>d<i<07>c;h<07>b:h<07>a9h<07>`8h<07>_<00>h<07>^7g<07>]6g<07>\5g<07>[4g<07>Z3g<07>Y2f<07>X1f<07>W0f<07>V/f<07>U.f<07>T-e<07>S,e<07>R+e<07>Q*e<07>P)e<07>O(d<07>N'd<07>M&d<07>L<00>d<07>K<00>d<07>J%c<06>IMb<07>H$b<07>G#b<07>F"b<07>E!b<07>D a<07>C<00>a<07>Ba<07>Aa<07>@a<07>?_<07>>_<07>=_<06><e_<07>;_<07>:^<07>9^<07>8^<07>7^<07>6^<07>5]<07>4]<07>3]<07>2]<07>1]<07>0[<07>/ [<07>. [<07>- [<07>,
[<07>+ [<07>*[<06>)[<06>([<07>'Z<07>&<00>Z<07>%<00>Z<07>$Z<07>#Z<07>"X<07>!X<07> X<07>X<07>X<07><00>V<07><00>V<07><00>V<07><00>V<07><00>V<06>(U<07><00>U<07><00>U<07><00>U<07><00>U<07><00>S<06>0S<07><00>S<07><00>S<07><00>S<07><00>P<07> <00>P<07> <00>P<07> <00>P<07>
<00>P<06> 2O<06>3O<06>/O<07><00>N<07><00>N<07><00>N<07><00>N<07><00>N<06>'M<07><00>M<07><00>M<07>~<00>M<07>}<00>M<07>|<00>K<07>{<00>K<07>z<00>K<07>y<00>K<07>x<00>K<07>w<00>J<06>vVJ<07>u<00>J<07>t<00>J<07>s<00>J<07>r<00>I<07>q<00>I<07>p<00>I<07>o<00>I<07>n<00>I<07>m<00>H<07>l<00>H<07>k<00>H<07>j<00>H<07>i<00>H<07>h<00>G<07>g<00>G<07>f<00>G<07>e<00>G<07>d<00>G<07>c<00>F<07>b<00>F<07>a<00>F<07>`<00>F<07>_<00>F<07>^<00>E<07>]<00>E<06>\'E<07>[<00>E<07>Z<00>E<07>Y<00>D<07>X<00>D<07>W<00>D<07>V<00>D<07>U<00>D<06>TkB<07>S<00>A<07>R<00>A<07>Q<00>A<07>P<00>A<07>O<00>A<07>N<00>@<07>M<00>@<07>L<00>@<07>K<00>@<07>J<00>?<07>I<00>?<07>H<00>?<07>G<00>?<07>F<00>?<07>E<00>><07>D<00>><07>C<00>><07>B<00>><07>A<00><<07>@<00><<07>?<00><<07>><00><<07>=<00><<07><<00>:<07>;<00>:<07>:<00>:<07>9<00>:<06>8P:<07>7<00>9<07>6<00>9<07>5<00>9<07>4<00>9<07>3<00>9<07>2<00>7<07>1<00>7<07>0<00>7<07>/<00>6<07>.<00>6<06>-/6<06>,36<07>+<00>6<07>*<00>4<07>)<00>4<07>(<00>4<07>'<00>4<07>&<00>4<07>%<00>3<07>$<00>3<07>#<00>3<07>"<00>3<07>!<00>3<07> <00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<07><00>0<06>.<07><00>.<07><00>.<07><00>-<07><00>-<07><00>-<07><00>-<07><00>-<07><00>,<07> <00>,<07> <00>*<06> *<06>
B*<06> ~*<06>}*<06>|)<06>{)<06>z)<06>)<06>y)<06>((<06>x(<06>w(v(~u(}'|t'{'zs'y'xr&wq&vp&uo&tn&sm%rl%q/%p3%ok%n$m0$lj#ki#jh#ig#hf#ge fd ec db ca b`a_`^_]^\][\Z[YZXYWXVWUVTUSTRSQR/QPPOONNMMLLKKJJIIHHGGFFEEDDCCBBAA@@??>>==<<;;::99887766554433221100//..--,,++**)) (( '' && %% $$ ## "" !!              

       A<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>~tj`VMC:0& <0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>~tj`VLB8.$ <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> { q g ] S H = 2 '    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> w l a V K @ 5 *   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> } r g \ Q F ; 0 %   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
x
m
b
W
L
A
6
+

<09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> { p e Z O D 9 . #  <08><08><08><08><08><08><08><08><08><08><08><08>uj_TI>4)<07><07><07><07><07><07><07><07><07><07><07><07>zodYNC8-" <06><06><06><06><06><06><06><06><06><06><06>ti^SH=2'<05><05><05><05><05><05><05><05><05><05><05><05>wlaWMC8-" <04><04><04><04><04><04><04><04><04><04><04>~sh]RG<1&<03><03><03><03><03><03><03><03><03><03><03><03>wlaVK@5*
<02><02><02><02><02><02><02><02><02><02><02><08>-P<00><08>,O<00><08>+N<00><08>*M<00><07>)E<00><07>(Z<00><08>'L<00><08>&I<00><08>%K<00><07>$Y<00><08>#2<00><07>"Z<00><08>!J<00><08> I<00><08>H<00><08>G<00><08>F<00><08>E<00><08>D<00><08>C<00><08>B<00><08>d<00><08>A<00><07><00><08>@<00><08>?<00><08>><00><08>=<00><08><<00><08>;<00><08>:<00><08>9<00><08> 8<00><08> 7<00><08> 6<00><08>
5<00><08> 4<00><08>3<00><08>2<00><08>1<00><08>0<00><08>/<00><08>.<00><08>-<00><08>,<00><08>+<00><08>*<00><08>~)<00><08>}(<00><08>|'<00><08>{&<00><08>z%<00><08>y$<00><08>x#<00><08>w"<00><08>v!<00><07>u<00><08>t <00><08>s<00><08>r<00><08>q<00><08>p<00><08>o<00><07>n$<00><07>m"<00><07>l <00><08>k<00><08>j<00><08>i<00><08>h<00><08>g<01><00><08>f<00><08>e<00><08>d<00><08>c<00><08>b<00><08>a6<00><08>`<00><08>_<00><08>^<00><08>]<00><08>\ <00><08>[ <00><08>Z <00><08>Y
<00><08>X <00><08>W<00><08>V<00><08>U<00><08>T<00><08>S<00><08>R<00><08>Q<00><08>P<00><08>O<00><08>N<01><00><08>M<01><00><08>L<01><00><08>K <00><08>J<01><00><08>I<01><00><07>H<00><07>Gy<00><08>F<01><00><08>E<01><00><08>D<01><00><08>C<01><00><08>B<01><00><08>A<01><00><08>@<01><00><08>?<01><00><08>><01><00><08>=<01><00><08><<01><00><08>;<01><00><08>:<01><00><08>9<01><00><08>8<01><00><08>7<01><00><08>6<01><00><08>5<01><00><08>4<01><00><08>3<01><00><08>2<01><00><08>1<01><00><08>0<01><00><08>/<01><00><07>. <00><08>-<01><00><08>,<01><00><08>+<01><00><08>*<01><00><07>)<00><08>(<01><00><08>'<01><00><08>&<01><00><08>%<01><00><08>$<01><00><08>#<01><00><08>"<01><00><08>!<01><00><08> <01><00><08><01><00><08><01><00><08><01><00><07><00><08><01><00><08><01><00><08><01><00><07>_<00><08><01><00><08><00><00><08><01><00><08><01><00><08><01><00><08><01><00><08><00><00><08><01><00><08><01><00><08>e<00><08> <01><00><08> <01><00><08> <01><00><08>
<01><00><08> <01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08>~<01><00><08>}<01><00><08>|<01><00><08>{<01><00><08>z<01><00><08>y<01><00><08>x<01><00><08>w<01><00><08>v<01><00><08>u<01><00><08>t<01><00><08>sd<00><08>r<01><00><08>q<01><00><08>p<01><00><08>o<01><00><08>n<01><00><08>m<01><00><08>l<01><00><08>k<01><00><08>j<01><00><07>i<00><07>hs<00><07>g<00><08>f<01><00><08>e<01><00><08>d<01><00><08>c<01><00><08>b<01><00><08>a<01><00><08>`<01><00><08>_<01><00><08>^<01><00><08>]<01><00><08>\<01><00><08>[<01><00><08>Z<01><00><08>Y<01><00><08>X<01><00><08>W<01><00><08>V<00><00><08>U<01><00><08>T<01><00><08>S<00><00><07>R6<00><08>Q<01><00><08>P<01><00><07>O3<00><07>N]<00><08>M<01><00><08>L<01><00><08>K<01><00><08>J<01><00><08>I<01><00><08>H<01><00><08>G<01><00><08>F<01><00><08>E<01><00><08>D<01><00><08>C<01><00><08>B<01><00><08>A<01><00><08>@<01><00><08>?<01><00><08>><01><00><08>=<00><00><08><<00><00><08>;<00><00><08>:<01><00><08>9<01><00><08>8<01><00><08>7<01><00><08>6<01><00><08>5<01><00><08>4<01><00><08>3<00><08>2~<00><07>1}~<07>0|~<07>/{~<07>.z~<07>-y~<07>,x}<07>+w}<07>*v}<07>)u}<07>(t}<07>'s}<06>&}<07>%r}<07>$q}<07>#pz<07>"oz<07>!nz<07> mz<07>lz<07>ky<07>jy<07>iy<07>hy<07>gy<07>fx<07>ex<07>dx<07>cx<07>bx<07>av<07>`v<07>_v<07>^v<07>]v<07>\u<07>[u<07> <00>u<07> Zu<07> Yu<07>
Xt<07> Wt<06>kt<07>Vt<07><00>r<07>Ur<06>r<07><00>r<07>Tr<07>So<06>eo<07>Ro<06>~o<07>}Qo<07>|Po<07>{Oo<07>zNo<07>yMo<07>xLo<07>wKm<07>vJm<07>uIm<07>tHm<07>sGm<07>r<00>k<07>qFk<07>pEk<07>oDk<07>nCk<07>mBj J ' <0B><08> <03><01>J<00>
q S OGGA Calculus of Communicating Systems<07>Lecture Notes in Computer Science02017-09-06T01:54:23.6494619142017-09-06T01:54:23.649461914<EFBFBD>Jp
c<02>+GGA simple totally ordered broadcast protocol<07>This is a short overview of a totally ordered broadcast protocol used by ZooKeeper, called Zab. It is conceptually easy to understand, is easy to implement, and gives high performance. In this paper we present the requirements ZooKeeper makes on Zab, we show how the protocol is used, and we give an overview of how the protocol works.LADIS '0802017-09-06T01:54:22.6862319342017-09-06T01:54:22.686231934<EFBFBD>fo <00>7<02>GGThe scalable commutativity rule: designing scalable software for multicore processors<07>Developing software that scales on multicore processors is an inexact science dominated by guesswork, measurement, and expensive cycles of redesign and reimplementation. Current approaches are workload-driven and, hence, can reveal scalability bottlenecks only for known workloads and available software and hardware. This paper introduces an <i>interface-driven</i> approach to building scalable software. This approach is based on the <i>scalable commutativity rule</i>, which, informally stated, says that whenever interface operations commute, they can be implemented in a way that scales. We formalize this rule and prove it correct for any machine on which conflict-free operations scale, such as current cache-coherent multicore machines. The rule also enables a better design process for scalable software: programmers can now reason about scalability from the earliest stages of interface definition through software design, implementation, and evaluation.SOSP02017-09-06T01:54:21.8678190922017-09-06T01:54:21.867819092rn e GGMathematical Aspects of Consciousness Theory<07>02017-09-06T01:54:21.0845529792017-09-06T01:54:21.084552979<EFBFBD>m
[<02>UoGGThe algorithmization of counterfactuals<07>Recent advances in causal reasoning have given rise to a computation model that emulates the process by which humans generate, evaluate and distinguish counterfactual sentences. Though compatible with the “possible worlds” account, this model enjoys the advantages of representational economy, algorithmic simplicity and conceptual clarity. Using this model, the paper demonstrates the processing of counterfactual sentences on a classical example due to Ernest Adam. It then gives a panoramic view of several applications where counterfactual reasoning has benefited problem areas in the empirical sciences.Annals of Mathematics and Artificial Intelligence02017-09-06T01:54:20.2099250492017-09-06T01:54:20.209925049<EFBFBD>l
<00> 'GGShape Grammars and the Generative Specification of Painting and Sculpture<07>IFIP Congress02017-09-06T01:54:19.1031201172017-09-06T01:54:19.103120117<EFBFBD>Vk <00><02>+GGFinding race conditions in Erlang with QuickCheck and PULSE<07>We address the problem of testing and debugging concurrent, distributed Erlang applications. In concurrent programs, race conditions are a common class of bugs and are very hard to find in practice. Traditional unit testing is normally unable to help finding all race conditions, because their occurrence depends so much on timing. Therefore, race conditions are often found during system testing, where due to the vast amount of code under test, it is often hard to diagnose the error resulting from race conditions. We present three tools (QuickCheck, PULSE, and a visualizer) that in combination can be used to test and debug concurrent programs in unit testing with a much better possibility of detecting race conditions. We evaluate our method on an industrial concurrent case study and illustrate how we find and analyze the race conditions.ICFP02017-09-06T01:54:18.2435458982017-09-06T01:54:18.243545898 <01>
<EFBFBD><05><01><00>~t
;<02>?GGOne VM to rule them all<07>Building high-performance virtual machines is a complex and expensive undertaking; many popular languages still have low-performance implementations. We describe a new approach to virtual machine (VM) construction that amortizes much of the effort in initial construction by allowing new languages to be implemented with modest additional effort. The approach relies on abstract syntax tree (AST) interpretation where a node can rewrite itself to a more specialized or more general node, together with an optimizing compiler that exploits the structure of the interpreter. The compiler uses speculative assumptions and deoptimization in order to produce efficient machine code. Our initial experience suggests that high performance is attainable while preserving a modular and layered architecture, and that new high-performance language implementations can be obtained by writing little more than a stylized interpreter.Onward!02017-09-06T01:54:26.6036989752017-09-06T01:54:26.603698975<EFBFBD>Es <00><02>y GGOrleans: Distributed Virtual Actors for Programmability and Scalability<07>High-scale interactive services demand high throughput with low latency and high availability, difficult goals to meet with the traditional stateless 3-tier architecture. The actor model makes it natural to build a stateful middle tier and achieve the required performance. However, the popular actor model platforms still pass many distributed systems problems to the developers. The Orleans programming model introduces the novel abstraction of virtual actors that solves a number of the complex distributed systems problems, such as reliability and distributed resource management, liberating the developers from dealing with those concerns. At the same time, the Orleans runtime enables applications to attain high performance, reliability and scalability. This paper presents the design principles behind Orleans and demonstrates how Orleans achieves a simple programming model that meets these goals. We describe how Orleans simplified the development of several scalable production applications on Windows Azure, and report on the performance of those production systems.02017-09-06T01:54:25.2260419922017-09-06T01:54:25.226041992<EFBFBD>Br
/<02>YGGHopscotch Hashing<07>We present a new resizable sequential and concurrent hash map algorithm directed at both uni-processor and multicore machines. The algorithm is based on a novel hopscotch multi-phased probing and displacement technique that has the flavors of chaining, cuckoo hashing, and linear probing, all put together, yet avoids the limitations and overheads of these former approaches. The resulting algorithm provides a table with very low synchronization overheads and high cache hit ratios. In a series of benchmarks on a state-of-the-art 64-way Niagara II multicore machine, a concurrent version of the new algorithm proves to be highly scalable, delivering in some cases 2 or even 3 times the throughput of today's most efficient concurrent hash algorithm, Lea's ConcurrentHashMap from java.concurr.util. Moreover, in tests on both Intel and Sun uni-processor machines, a sequential version of the algorithm consistently outperforms the most effective sequential hash table algorithms including cuckoo hashing and bounded linear probing. The most interesting feature of the new hopscotch algorithm is that it continues to deliver good performance when the table is more than 90% full, increasing its advantage over other algorithms as the table density grows.DISC02017-09-06T01:54:24.3819760742017-09-06T01:54:24.381976074 k<00><0F><0F><0F>hF$<0E><0E><0E>vM, <0A> <0A> <0A> <0A> V 5  <0C> <0C> <0C> <0C> \ 6  <0B> <0B> <0B> <0B> ^ > 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
b
9
 <09> <09> <09> <09> Y 5 <08><08><08>}[?!<07><07><07>{];<06><06><06><06>qG(<05><05><05>oG-<04><04><04><04>b?<03><03><03>jC<02><02><02><02>hJ"<01><01><01><01>sY=<00>!<21>0) Natalie SebanzNatalieSebanz#<23>/+ Phillip RogawayPhillipRogaway<19>.! Ning ZhangNingZhang<17>- Chao YangChaoYang<1F>,' Gintaras WossGintarasWoss<1F>+' Guanghao ShenGuanghaoShen<1F>*' Sriram SankarSriramSankar<1F>)' Philip ProninPhilipPronin$<24>(-Søren B. LassenSørenB.Lassen%<25>'- Sandhya KunnaturSandhyaKunnatur<1B>&# Tom JacksonTomJackson#<23>%+ Lucian GrijincuLucianGrijincu'<27>$/ !Sergey DoroshenkoSergeyDoroshenko<1D>#% Tudor BosmanTudorBosman<1B>"# Iain BeckerIainBecker#<23>!+ Michael CurtissMichaelCurtiss$<24> -Michael L. ScottMichaelL.Scott$<24>-Maged M. MichaelMagedM.Michael#<23>+ George TodericiGeorgeToderici<1B># Rajat MongaRajatMonga<1F>' Oriol VinyalsOriolVinyals;<3B>C! -Sudheendra VijayanarasimhanSudheendraVijayanarasimhan.<2E>7!Matthew J. HausknechtMatthewJ.Hausknecht <20>)Joe Yue-Hei NgJoeYue-HeiNg#<23>+ David PattersonDavidPatterson<19>! Randy KatzRandyKatz<1F>' Matei ZahariaMateiZaharia<19>! Ion StoicaIonStoica<1D>% Ariel RabkinArielRabkin(<28>1David A. PattersonDavidA.Patterson<17> Gunho LeeGunhoLee%<25>- Andrew KonwinskiAndrewKonwinski<1E>'Randy H. KatzRandyH.Katz&<26>/Anthony D. JosephAnthonyD.Joseph<1F>' Rean GriffithReanGriffith%<25> - Michael ArmbrustMichaelArmbrust"<22> +James A. LandayJamesA.Landay<1C> %Ian E. SmithIanE.Smith'<27>
/ Katherine EverittKatherineEveritt!<21> ) Sunny ConsolvoSunnyConsolvo<17> R. ShireyR.Shirey%<25>- Jonathan BorweinJonathanBorwein%<25>- Lennart BerggrenLennartBerggren<19>! Rob ArthanRobArthan<1D>% Konrad SlindKonradSlind<1F>' John HarrisonJohnHarrison<1B># Ronald ParrRonaldParr&<26>/Austin I. EliazarAustinI.Eliazar&<26>/Maarten Van SteenMaartenVanSteen-<2D>5! Anne-Marie KermarrecAnne-MarieKermarrec!<21>~) Márk JelasityMárkJelasity<1B>}# Eran TromerEranTromer<19>|! Adi ShamirAdiShamir<1F>{' Daniel GenkinDanielGenkin$<24>z-J. Eliot B. MossJ.Eliot B.Moss&<26>y/Richard L. HudsonRichardL.Hudson$<24>x-David S. WishartDavidS.Wishart <20>w)Joseph A. CruzJosephA.Cruz<1B>v# David ChaumDavidChaum!<21>u) Elmar EisemannElmarEisemann%<25>t- Sylvain LefebvreSylvainLefebvre!<21>s) Fabrice NeyretFabriceNeyret<1F>r' Cyril CrassinCyrilCrassin"<22>q+Markus H. GrossMarkusH.Gross$<24>p-Robert W. SumnerRobertW.Sumner#<23>o+ Steve MarschnerSteveMarschner&<26>n/Paul A. BeardsleyPaulA.Beardsley%<25>m-! Gioacchino NorisGioacchinoNoris<1D>l% Bernd BickelBerndBickel<1D>k% Thabo BeelerThaboBeeler!<21>j) Éric GaussierÉricGaussier+<2B>i3 Stéphane ClinchantStéphaneClinchant<1F>h' Henri GouraudHenriGouraud<1D>g% Thomas VermaThomasVerma*<2A>f3Patrick D. McdanielPatrickD.Mcdaniel<1F>e' Damien OcteauDamienOcteau<1E>d'Yves Le TraonYvesLeTraon<1F>c' Jacques KleinJacquesKlein%<25>b- Alexandre BartelAlexandreBartel<1B>a# Eric BoddenEricBodden#<23>`+ Christian FritzChristianFritz+<2B>_3 Siegfried RasthoferSiegfriedRasthofer<1B>^# Steven ArztStevenArzt<1F>]' Conor McbrideConorMcbride!<21>\) John ThickstunJohnThickstun&<26>[/Steven M. LavalleStevenM.Lavalle<1B>Z# Helmut SiesHelmutSies<1E>Y'Dean P. JonesDeanP.Jones0<73>X9)John M. Mellor-CrummeyJohnM.Mellor-Crummey<1D>W% Chaoran YangChaoranYang<1D>V% Ken ThompsonKenThompson<1F>U' Daniel SundayDanielSunday<1B>T# Andrew HumeAndrewHume <20>S)David D. ClarkDavidD.Clark<1E>R'David P. ReedDavidP.Reed&<26>Q/Jerome H. SaltzerJeromeH.Saltzer<1F>P' Mario WolczkoMarioWolczko<19>O! Doug SimonDougSimon#<23>N+ Gregor RichardsGregorRichards#<23>M+ Christian HumerChristianHumer!<21>L) Gilles DuboscqGillesDuboscq<1F>K' Lukas StadlerLukasStadler<1F>J' Andreas WößAndreasWöß%<25>I- Christian WimmerChristianWimmer)<29>H1 #Thomas WürthingerThomasWürthinger<1F>G' Jorgen ThelinJorgenThelin<1F>F' Gabriel KliotGabrielKliot <02> 
<08><02><00>/x
a<02>GGA wait-free queue as fast as fetch-and-add<07>Concurrent data structures that have fast and predictable performance are of critical importance for harnessing the power of multicore processors, which are now ubiquitous. Although wait-free objects, whose operations complete in a bounded number of steps, were devised more than two decades ago, wait-free objects that can deliver scalable high performance are still rare.
In this paper, we present the first wait-free FIFO queue based on fetch-and-add (FAA). While compare-and-swap (CAS) based non-blocking algorithms may perform poorly due to work wasted by CAS failures, algorithms that coordinate using FAA, which is guaranteed to succeed, can in principle perform better under high contention. Along with FAA, our queue uses a custom epoch-based scheme to reclaim memory; on x86 architectures, it requires no extra memory fences on our algorithm's typical execution path. An empirical study of our new FAA-based wait-free FIFO queue under high contention on four different architectures with many hardware threads shows that it outperforms prior queue designs that lack a wait-free progress guarantee. Surprisingly, at the highest level of contention, the throughput of our queue is often as high as that of a microbenchmark that only performs FAA. As a result, our fast wait-free queue implementation is useful in practice on most multi-core systems today. We believe that our design can serve as an example of how to construct other fast wait-free objects.PPOPP02017-09-06T01:54:31.7463840332017-09-06T01:54:31.746384033<EFBFBD>w
G<02>i#==Reflections on Trusting Trust<07><italic>To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.</italic>Commun. ACM02017-09-06T01:54:30.98452017-09-06T01:54:30.9845<EFBFBD>
v
7<02>?7GGFast String Searching<07>SUMMARY Since the Boyer-Moore algorithm was described in 1977, it has been the standard benchmark for the practical string search literature. Yet this yardstick compares badly with current practice. We describe two algorithms that perform 47% fewer comparisons and are about 4.5 times faster across a wide range of architectures and compilers. These new variants are members of a family of algorithms based on the skip loop structure of the preferred , but often neglected, fast form of Boyer-Moore. We present a taxonomy for this family, and describe a toolkit of components that can be used to design an algorithm most appropriate for a given set of requirements.Softw., Pract. Exper.02017-09-06T01:54:29.6986340332017-09-06T01:54:29.698634033<EFBFBD>eu
W<02>O=GGEnd-To-End Arguments in System Design<07>This paper presents a design principle that helps guide placement of functions among the modules of a distributed computer system. The principle, called the end-to-end argument, suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level. Examples discussed in the paper include bit error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement. Low level mechanisms to support these functions are justified only as performance enhancements.ACM Trans. Comput. Syst.02017-09-06T01:54:28.7029919432017-09-06T01:54:28.702991943 k<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|tld\TLD<4,$ <0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>|tld\TLD<4,$  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> | t l d \ T L D < 4 , $    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> | t l d \ T L D < 4 , $    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> { q g ] T K A 7 - #   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
y
o
e
[
Q
G
=
4
*

 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> w m c Y O E ; 1 '   <08><08><08><08><08><08><08><08><08><08><08><08><08>}si_WMC9/&<07><07><07><07><07><07><07><07><07><07><07><07><07>~tj`VLB8.$<06><06><06><06><06><06><06><06><06><06><06><06><06>zpf\RH>4*  <05><05><05><05><05><05><05><05><05><05><05><05><05>wmd[RI?5+! <04><04><04><04><04><04><04><04><04><04><04><04><04>wmcYOE;1'
<03><03><03><03><03><03><03><03><03><03><03><03>~tj`VLB8.$<02><02><02><07>kSu<07>jRu<07>iQu<07>hPt<07>gOt<07>fNt<07>eMt<07>dLt<07>cKt<07>bJt<07>aIt<07>`Ht<07>_Gs<07>^Fs<07>]Es<07>\Ds<07>[Cs<07>ZBr<07>YAr<07>X@r<07>W?q<07>V>p<07>U=p<07>T<o<07>S;n<07>R<00>m<07>Q:l<07>P9l<07>O8k<07>N7k<07>M6k<06>Lk<07>K5k<07>J4k<07>I<00>k<07>H3j<07>G2i<07>F1i<07>E0i<07>D/i<07>C.i<07>B<00>h<07>A-h<07>@,h<07>?+h<07>><00>h<07>=*g<07><)g<07>;(g<07>:'f<07>9&f<07>8%f<07>7$e<07>6#e<07>5"e<07>4!e<07>3 e<07>2d<07>1d<07>0d<07>/c<06>.Hb<06>-Gb<06>,Fb<06>+Eb<07>*b<07>)b<07>(b<07>'b<06>&Db<07>%a<07>$a<07>#a<07>"a<07>!`<07> `<07>`<07>_<07>_<07>^<07> ^<07> ^<07> ]<07>
]<07> ]<07>]<07>]<07>]<07>]<07>]<07>\<07>\<07>[<07>[<07> <00>Z<07> <00>Z<07> <00>Z<07>
<00>Z<07> <00>Z<07><00>Z<07><00>Z<07><00>Z<07><00>Z<07><00>Y<07><00>X<07><00>W<07><00>V<07><00>V<07><00>U<07>~<00>U<07>}<00>U<07>|<00>U<07>{<00>T<07>z<00>T<07>y<00>T<07>x<00>T<07>w<00>T<07>v<00>T<07>u<00>T<07>t<00>T<07>s<00>S<07>r<00>R<07>q<00>R<07>p<00>R<07>o<00>Q<07>n<00>Q<07>m<00>Q<07>l<00>P<07>k<00>P<06>j0O<06>i/O<07>h<00>N<07>g<00>N<07>f<00>N<07>e<00>N<06>dPN<07>c<00>N<07>b<00>N<07>a<00>N<07>`<00>N<05>_ M<07>^<00>L<07>]<00>L<07>\<00>L<07>[<00>L<07>Z<00>K<07>Y<00>K<07>X<00>K<07>W<00>K<07>V<00>J<07>U<00>I<07>T<00>I<07>S<00>I<07>R<00>I<07>Q<00>I<07>P<00>I<07>O<00>I<07>N<00>I<07>M<00>I<07>L<00>I<07>K<00>I<07>J<00>H<07>I<00>G<07>H<00>G<07>G<00>G<07>F<00>G<07>E<00>G<07>D<00>G<07>C<00>F<07>B<00>F<07>A<00>E<07>@<00>E<07>?<00>D<07>><00>C<06>=eB<07><<00>A<07>;<00>A<07>:<00>A<07>9<00>A<07>8<00>A<07>7<00>A<07>6<00>A<07>5<00>A<07>4<00>A<07>3<00>A<07>2<00>@<07>1<00>@<07>0<00>@<06>/?<07>.<00>?<07>-<00>><07>,<00>><07>+<00>=<07>*<00><<07>)<00><<07>(<00><<07>'<00>;<07>&<00>;<07>%<00>:<07>$<00>:<07>#<00>:<07>"<00>:<07>!<00>9<07> <00>9<07><00>9<07><00>8<07><00>8<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>7<07><00>6<06>26<06>16<07><00>5<07><00>4<07><00>4<07><00>4<07> <00>4<07> <00>3<07> <00>2<07>
<00>1<07> <00>1<07><00>0<07><00>0<07><00>0<07><00>/<06>/<06>~/<06>}/<06>|.<06>{.z-~y-}x,|w*{v*zu*yt*xs*wr)vq)up)t%(so(rn'qm'pl'ok&nj&mi&lh&kg%jf%ie%hd%gc%f0$e/$db$ca#b`#a_"`^"_]!^9!]\ \[ [ZZYYXXWWVVUUTTSSRRQQPPOONNMMLLKKJJIIHHGGFFEEDDCCBBAA@@??>>==<<;;::99887766554433221100//..--,,++**))((''&&%% $$ ## "" !!      
         

     =<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>~tj`VLB8.$<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>ti^SH=2( <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> y n c X M B 7 , !  <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C>  t i ^ S H = 2 '    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> w l a V K @ 5 *  
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
z
o
d
Y
N
C
8
-
"

 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09>  t i ^ S H = 2 '   <08><08><08><08><08><08><08><08><08><08><08><08>xmbWLA6+ 
<07><07><07><07><07><07><07><07><07><07><07><07>|qf[PE:/$<06><06><06><06><06><06><06><06><06><06><06>ti^SH=2'<05><05><05><05><05><05><05><05><05><05><05><05>wlaVK@5* <04><04><04><04><04><04><04><04><04><04><04><04>{peZOD9.# <03><03><03><03><03><03><03><03><03><03><03>~sh]RG<1&<02><02><02><02><02><02><02><02><02><02><02><02><08>(i<00><08>'h<00><07>&n<00><07>%m<00><08>$g<00><08>#<00><00><08>"<00><00><08>!<00><08> f<00><08>e<00><08>d<00><08>c<00><08>b<00><08>a<00><08>`<00><08><01><00><08>_<00><08>^<00><08>]<00><08>\<00><08>[<00><08>?<00><08>Z<00><08>Y<00><08>X<00><08><00><00><08><00><00><08> W<00><08> <00><00><08> <01><00><08>
V<00><08> U<00><08>T<00><08>S<00><08>R<00><08>Q<00><08>[<00><08>P<00><08>O<00><08>N<00><08>M<00><08>L<00><08>~K<00><08>}J<00><08>|I<00><08>{H<00><08>zG<00><08>yF<00><08>xE<00><08>wD<00><08>vC<00><08>uB<00><08>tA<00><08>s@<00><08>r?<00><08>q><00><08>p=<00><08>o<<00><07>nM<00><08>m<01><00><08>l;<00><08>k:<00><08>j9<00><08>i8<00><08>h7<00><08>g<01><00><08>f~<00><08>e6<00><08>d@<00><08>c5<00><08>b4<00><08>a3<00><08>`2<00><08>_<00><00><08>^1<00><08>]0<00><08>\/<00><08>[.<00><08>Z-<00><08>Y,<00><08>X+<00><08>W*<00><08>V)<00><08>U(<00><08>T'<00><08>S&<00><08>R%<00><08>Q$<00><08>P#<00><08>O"<00><08>N!<00><08>M <00><08>L<00><08>K<00><08>J<00><08>I<00><08>H<00><08>G<00><08>F<00><08>E<00><08>D<00><08>C<00><08>B<00><08>A<00><08>@<00><08>?<00><08>><00><08>=<00><08><<00><08>;<00><08>: <00><08>9 <00><08>8 <00><08>7
<00><08>6 <00><08>5<00><08>4<00><08>3<00><08>2<00><08>1<00><07>0<00><08>/<00><08>.<01><00><08>-<00><08>,<00><08>+<00><08>*<01><00><08>)<01><00><08>(<01><00><08>'<01><00><08>&<01><00><08>%<01><00><08>$<01><00><08>#<01><00><08>"<01><00><08>!<01><00><08> <01><00><08><01><00><08><01><00><08><01><00><08><00><00><08><01><00><08><01><00><08><01><00><08><01><00><07>/<00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08> <01><00><08> <01><00><08> <01><00><08>
<01><00><08> <00><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08>~<01><00><08>}<01><00><07>|R<00><07>{<00><08>z<01><00><08>y<01><00><08>x<01><00><08>w<01><00><08>v<01><00><08>u<01><00><08>t<01><00><08>s<01><00><08>r<01><00><08>q<01><00><08>pq<00><08>o<01><00><08>nn<00><08>ml<00><08>lk<00><08>k<01><00><08>j<01><00><08>i<01><00><08>h<01><00><08>g<01><00><08>f<01><00><08>e<01><00><08>d<01><00><08>c<01><00><08>b<01><00><08>a<01><00><08>`<01><00><08>_<01><00><08>^<01><00><08>]<01><00><08>\<00><00><08>[<00><00><08>Z<00><00><08>Y<01><00><08>X<01><00><08>W<01><00><08>V<01><00><08>U<01><00><08>T<01><00><08>S<01><00><08>R<01><00><08>Q<01><00><08>P<01><00><08>O<01><00><08>N<01><00><08>M<01><00><08>L<01><00><08>K<01><00><08>J<01><00><08>I<01><00><08>H<01><00><08>G<01><00><08>F<01><00><08>E<01><00><08>D<01><00><08>C<01><00><08>B<01><00><08>A<01><00><08>@<01><00><08>?<01><00><08>><01><00><08>=<01><00><08><<01><00><08>;<01><00><08>:<01><00><08>9<01><00><08>8<01><00><07>7n<00><07>6m<00><08>5<01><00><07>4<00><08>3<01><00><08>2<01><00><08>1<01><00><08>0<01><00><08>/<01><00><08>.<01><00><08>-<01><00><08>,<01><00><08>+<01><00><08>*<01><00><08>)<00><00><08>(<01><00><08>'<01><00><08>&<01><00><08>%<01><00><08>$<01><00><07>#x<00><08>"<01><00><08>!<01><00><08> <01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><01><00><08><00><07><00><08>~<00><08>}<00><08>|<00><08>{<00><08>z<00><08>y<00><08>x<00><08>w<00><08>v<00><08>u<00><08> t<00><08> s<00><08> r<00><08>
q<00><08> p<00><08>o<00><08>n<00><08>m<00><08>l<00><08>k<00><08>j<00><08>i<00><07>h<07>g~<07><00>~<07>~f}<07>}e}<07>|d}<07>{c}<07>zb}<07>ya}<07>x`}<07>w_}<07>v^}<07>u]|<07>t\{<07>s[z<07>rZy<07>qYy<07>pXx<07>oWx<07>nVw<07>mUv<07>lTv 
:
:<00>Cy
)<02>-IGGThe Redox Code<07>SIGNIFICANCE
The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease.
RECENT ADVANCES
Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics.
CRITICAL ISSUES
Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned.
FUTURE DIRECTIONS
Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.Antioxidants & redox signaling02017-09-06T01:54:32.8116188962017-09-06T01:54:32.811618896 <00><04><00><00> | <00><02> GGThe Derivative of a Regular Type is its Type of One-Hole Contexts<07>Polymorphic regular types are tree-like datatypes generated by polynomial type expressions over a set of free variables and closed under least fixed point. The 'equal-ity types' of Core ML can be expressed in this form. Given such a type expression T with x free, this paper shows a way to represent the one-hole contexts for elements of x within elements of T, together with an operation which will plug an element of x into the hole of such a context. One-hole contexts are given as inhabitants of a regular type @ x T, computed generically from the syntactic structure of T by a mechanism better known as partial differentiation. The relevant notion of containment is shown to be appropriately characterized in terms of derivatives and plugging in. The technology is then exploited to give the one-hole contexts for sub-elements of recursive types in a manner similar to Huet's 'zippers'[Hue97].02017-09-06T01:54:36.2332380372017-09-06T01:54:36.233238037n{ ] GGThe Fast Johnson-lindenstrauss Transform<07>02017-09-06T01:54:34.9879130862017-09-06T01:54:34.987913086<EFBFBD>dz <00><02>A CCMotion Planning 5.1 Motion Planning Concepts 5.1.1 Configuration Space<07>A fundamental robotics task is to plan collision-free motions for complex bodies from a start to a goal position among a collection of static obstacles. Although relative simple, this geometric path planning problem is provably computationally hard [84]. Extensions of this formulation take into account additional constraints that are inherited from mechanical and sensor limitations of real robots such as uncertainties, feedback and differential constraints, which further complicate the development of automated planners. Modern algorithms have been fairly successful in addressing hard instances of the basic geometric problem and a lot of effort is devoted to extend their capabilities to more challenging instances. These algorithms have had widespread success in applications beyond robotics, such as computer animation, virtual prototyping, and computational biology. There are many available surveys [36, 70, 91] and books [23, 57, 60] that cover modern motion planning techniques and applications. This chapter first provides a formulation of the geometric path planning problem in Section 5.1 and then introduces sampling-based planning in Section 5.2. Sampling-based planners are general techniques applicable to a wide set of problems and have been successful in dealing with hard planning instances. For specific, often simpler planning instances, alternative approaches exist and are presented in Section 5.3. These approaches provide theoretical guarantees and for simple planning instances they outperform sampling-based planners. Section 5.4 considers problems that involve differential constraints , while Section 5.5 overviews several other extensions of the basic problem formulation and proposed solutions. Finally, Section 5.7 addresses some important and more advanced topics related to motion planning. This section provides a description of the fundamental motion planning problem or else the geometric path planning problem. Extensions of this basic formulation to more complicated instances will be discussed later in the chapter and they will be revisited throughout this book. In path planning, a complete description of the geometry of a robot A and of a workspace W is provided. The workspace W = R N , in which N = 2 or N = 3, is a static environment populated with
Y<02>1GGInformation-based models for ad hoc IR<07>We introduce in this paper the family of information-based models for <i>ad hoc</i> information retrieval. These models draw their inspiration from a long-standing hypothesis in IR, namely the fact that the difference in the behaviors of a word at the document and collection levels brings information on the significance of the word for the document. This hypothesis has been exploited in the 2-Poisson mixture models, in the notion of eliteness in BM25, and more recently in DFR models. We show here that, combined with notions related to burstiness, it can lead to simpler and better models.SIGIR02017-09-06T01:54:40.0890668952017-09-06T01:54:40.089066895<EFBFBD> W 7GGContinuous Shading of Curved Surfaces<07>IEEE Trans. Computers02017-09-06T01:54:39.2207561042017-09-06T01:54:39.220756104<EFBFBD>~~
I<02>;GGA Theory of Inferred Causation<07>This paper concerns the empirical basis of causation, and addresses the following issues: 1. the clues that might prompt people to perceive causal relationships in uncontrolled observations. 2. the task of inferring causal models from these clues, and 3. whether the models inferred tell us anything useful about the causal mechanisms that underly the observations. We propose a minimal-model semantics of causation, and show that, contrary to common folklore, genuine causal innuences can be distinguished from spurious covariations following standard norms of inductive reasoning. We also establish a sound characterization of the conditions under which such a distinction is possible. We provide an effective algorithm for inferred causation and show that, for a large class of data the algorithm can uncover the direction of causal innuences as deened above. Finally, we address the issue of non-temporal causation.KR02017-09-06T01:54:38.2534089362017-09-06T01:54:38.253408936<EFBFBD>} <00>g<02>=GGFlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps<07>Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by carelessly programmed apps that leak important data by accident, and by malicious apps that exploit their given privileges to copy such data intentionally. While existing static taint-analysis approaches have the potential of detecting such data leaks ahead of time, all approaches for Android use a number of coarse-grain approximations that can yield high numbers of missed leaks and false alarms.
In this work we thus present FlowDroid, a novel and highly precise static taint analysis for Android applications. A precise model of Android's lifecycle allows the analysis to properly handle callbacks invoked by the Android framework, while context, flow, field and object-sensitivity allows the analysis to reduce the number of false alarms. Novel on-demand algorithms help FlowDroid maintain high efficiency and precision at the same time.
We also propose DroidBench, an open test suite for evaluating the effectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DroidBench, and a set of well-known Android test applications, FlowDroid finds a very high fraction of data leaks while keeping the rate of false positives low. On DroidBench, FlowDroid achieves 93% recall and 86% precision, greatly outperforming the commercial tools IBM AppScan Source and Fortify SCA. FlowDroid successfully finds leaks in a subset of 500 apps from Google Play and about 1,000 malware apps from the VirusShare project.PLDI02017-09-06T01:54:37.1429560552017-09-06T01:54:37.142956055 ;
<EFBFBD><04>;<00><00> <00><02>]#GGUntraceable Electronic Mail, Return Addresses, and Digital Pseudonyms<07>A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication-in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceble return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym which appears in a roster of acceptable clients.Commun. ACM02017-09-06T01:54:42.9028269042017-09-06T01:54:42.902826904<EFBFBD> <20> <00>#<02>GGGigaVoxels: ray-guided streaming for efficient and detailed voxel rendering<07>We propose a new approach to efficiently render large volumetric data sets. The system achieves interactive to real-time rendering performance for several billion voxels.
Our solution is based on an adaptive data representation depending on the current view and occlusion information, coupled to an efficient ray-casting rendering algorithm. One key element of our method is to guide data production and streaming directly based on information extracted during rendering.
Our data structure exploits the fact that in CG scenes, details are often concentrated on the interface between free space and clusters of density and shows that volumetric models might become a valuable alternative as a rendering primitive for real-time applications. In this spirit, we allow a quality/performance trade-off and exploit temporal coherence. We also introduce a mipmapping-like process that allows for an increased display rate and better quality through high quality filtering. To further enrich the data set, we create additional details through a variety of procedural methods.
We demonstrate our approach in several scenarios, like the exploration of a 3D scan (8192<sup>3</sup> resolution), of hypertextured meshes (16384<sup>3</sup> virtual resolution), or of a fractal (theoretically infinite resolution). All examples are rendered on current generation hardware at 20--90 fps and respect the limited GPU memory budget.SI3D02017-09-06T01:54:41.9238120122017-09-06T01:54:41.923812012<EFBFBD><19>
}<02>/GGCoupled 3D reconstruction of sparse facial hair and skin<07>Although facial hair plays an important role in individual expression, facial-hair reconstruction is not addressed by current face-capture systems. Our research addresses this limitation with an algorithm that treats hair and skin surface capture together in a coupled fashion so that a high-quality representation of hair fibers as well as the underlying skin surface can be reconstructed. We propose a passive, camera-based system that is robust against arbitrary motion since all data is acquired within the time period of a single exposure. Our reconstruction algorithm detects and traces hairs in the captured images and reconstructs them in 3D using a multiview stereo approach. Our coupled skin-reconstruction algorithm uses information about the detected hairs to deliver a skin surface that lies underneath all hairs irrespective of occlusions. In dense regions like eyebrows, we employ a hair-synthesis method to create hair fibers that plausibly match the image data. We demonstrate our scanning system on a number of individuals and show that it can successfully reconstruct a variety of facial-hair styles together with the underlying skin surface.ACM Trans. Graph.02017-09-06T01:54:40.9861330572017-09-06T01:54:40.986133057 <00><08><05><00><00>]<5D>
9<02>c7GGAcoustic Cryptanalysis<07>Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: They can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations. In a preliminary presentation (Eurocrypt04 rump session), we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits. The main problem was the very low bandwidth of the acoustic side channel (under 20  kHz using common microphones, and a few hundred kHz using ultrasound microphones), and several orders of magnitude below the GHz-scale clock rates of the attacked computers. In this paper, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPGs implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate such attacks, using a plain mobile phone placed next to the computer, or a more sensitive microphone placed 10 meters away.Journal of Cryptology02017-09-06T01:54:46.1316259772017-09-06T01:54:46.131625977<EFBFBD><1A>
]<02>[GGIncremental Collection of Mature Objects<07>We present a garbage collection algorithm that extends generational scav-enging to collect large older generations (mature objects) non-disruptively. The al-gorithm's approach is to process bounded-size pieces of mature object space at each collection; the subtleties lie in guaranteeing that it eventually collects any and all garbage. The algorithm does not assume any special hardware or operating system support, e.g., for forwarding pointers or protection traps. The algorithm copies objects, so it naturally supports compaction and reclustering.IWMM02017-09-06T01:54:45.3109460452017-09-06T01:54:45.310946045<EFBFBD>l<EFBFBD> <00><02>+1GGApplications of Machine Learning in Cancer Prediction and Prognosis<07>Machine learning is a branch of artificial intelligence that employs a variety of statistical, probabilistic and optimization techniques that allows computers to "learn" from past examples and to detect hard-to-discern patterns from large, noisy or complex data sets. This capability is particularly well-suited to medical applications, especially those that depend on complex proteomic and genomic measurements. As a result, machine learning is frequently used in cancer diagnosis and detection. More recently machine learning has been applied to cancer prognosis and prediction. This latter approach is particularly interesting as it is part of a growing trend towards personalized, predictive medicine. In assembling this review we conducted a broad survey of the different types of machine learning methods being used, the types of data being integrated and the performance of these methods in cancer prediction and prognosis. A number of trends are noted, including a growing dependence on protein biomarkers and microarray data, a strong bias towards applications in prostate and breast cancer, and a heavy reliance on "older" technologies such artificial neural networks (ANNs) instead of more recently developed or more easily interpretable machine learning methods. A number of published studies also appear to lack an appropriate level of validation or testing. Among the better designed and validated studies it is clear that machine learning methods can be used to substantially (15-25%) improve the accuracy of predicting cancer susceptibility, recurrence and mortality. At a more fundamental level, it is also evident that machine learning is also helping to improve our basic understanding of cancer development and progression.Cancer informatics02017-09-06T01:54:44.3208349612017-09-06T01:54:44.320834961
<01><00><01><01>K7<04>9<04><0E><0E><0E><0E><0E><0E><04><0E>rdS@- I <0A> <0A> <0A> <0A> <0A><02> <0A> <0A> n ^ P ? *   <0C> <0C> <0C> <0C> <0C> <0C> <0C> ~ o `<01><01><01><02><02>q]K6
<03><03><03><03><03><03>p^K:+ <02><02><08><08><08><08>p]L9,[<02><07><07><07>j<07><07>p<04>Y<04><01>A(<06><02><06><06><06><06><06><06><06>lZK;*<05><05><05><05><05><05><05>ucQB1<0F><0F><0F><0F><0F><0F>gQ<04> <0B> <0B> <0B> <0B> <0B> <0B>  k T B 3  
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
v
e<02>
S
D
7
(

 <09><04> <09> <09>2 <09> <09> <09> t b O > - ! <08><08><08><01><01>!H'!E. Zehnter)Frank Piessens<05>2Ha%David Silver<02>1Edsger W. DijkstraR7Edmund B. Nightingale<05>Emma Fulu<05>3Emmanuel Lopez-Neri<05>+Emery D. Berger<01>%Eman Ramadan<02>)Elmar Eisemannu%Elaine Cohen#Edwin Brady[-Edward J. Rykiel7-Fredrik Lindsten<05>+Fernando Pedone<05> E. Adel<03>+Ethan L. Millerj-Ernesto Jiménez!Ernest Lin<02>!Erika Chin<01>Erik Tews#Erik Meijer%)Erik Johanssonb'Erik HeinemanEric Tune<02>%Eric Rollins<02> Eric JulC#Eric Boddena)Eric A. Brewer[#Eran Tromer}7Engineer Bainomugisha<05>5Emmanuel Dellandréa<00>+Emin Gün Sirer'Emilia Thiuri<08>I)David W. Corne#David Ungar:Fay Changk9Flavio Paiva Junqueirag!Dieter Fox29Gerth Stølting BrodalE#Frank Dabek63Francisca Ogwueleka1)Demis Hassabis<02>'Dean P. JonesY1Dawn Xiaodong Song<05>-David W. Shipman<02>#Geoff Wyant<02>Gene Pang<00>%Gareth TysonE%Gael Sentís'Gabriel KliotF!G. Villano%7G. V. Papatheodoridis!G. Umefune<04>G. Teuber<03> G. StormF#G. Semadeni<04>+G. R. BurganovasG. Pevnevr+G. Nigel Martin#G. Mazzellam!G. MarascoKG. Macedo<03>%G. Letamendi<03>-G. J. M. Webster<04> G. GwakD'G. E. Tontini#G. Di Leo'!G. Dalekos !G. Chiriac<03>!G. A. Nagy<03>/Friedrich M. Wahl93Frederick P. Brooks<02>/Fred B. Schneider<00>5François X. Sillion1François Lazeyras<01>/Frank D. Francone=Francesco Zappa Nardelli1Francesca Spezzano79Flemming Friche Rodler<02>3Flavio P. Junqueira>/Fernando Pereiraz<02>-Fernando Pereira)Fabrice Neyrets%F. Zanconati< F. Yuan<04>'F. Sardanelli(#F. RavaioliI'F. PleiningerbF. NevenskF. Karnel<03> F. Bende1#Evan Herbst0)Evan CzaplickiM#Eugene Wong<02>xJ. Garcia Cano<04>%J. Fernandes<03>)J. Feichtingerd-J. Eliot B. Mossz J. Cho<04>#J. Carvalho<03>#J. C. Sousa'J. Bou Jaoude8%J. Borovicka<04>#J. A. Sloan~3J. A. M. Vermaseren<00>'Iulian Moraru<02>!Ion Stoica<01><05>Ioannis KoltsidasX1Ioannis Antonoglou<02>bIndranil Gupta<00>)Ilya Sutskever<02>#Ilka Wittig<00>Ilan HornN Ian Rae<02>Ian Pratt<00>%Ian E. Smith<01><04>Iain Becker<01>I. Urreta<03>%I. SydorchukXI. Sporea+I. S. Min<04>!I. Pedroto!I. Lupescu<03>%I. Jovanovic<04>I. H. Kim<04> I. Groza<I. Copaci<03> I. Aoki<03>)Hung-Chih Yang@!Huiqing Li{%Hugues Hoppe<02>/Howard E. Sturgis<00>)Hiroshi Motoda"#Himani Apte<02>+Hesham A. Rakha<04>/Hermann Schägger<00>)Henry G. BakerI)Henrik Nilssonx'Henri GouraudhAHenk O Ten Cate Hoedemaker#Helmut SiesZ+Harold Bekkering<01>/Hari Bala/Dor Laor QumranetE. Zapata<03>E. Soares<03>#E. SklyarovQ!E. Shehata#E. Salvador<03>%E. S. Tharwa<03> E. Novo#!E. Morello7E. Michael Maximilien<00>)E. M. Abdelaal<03>!E. Liusina E. Kim<04>+E. I. Sharipovam#E. Garaninap E. Fuchs`!E. Cancela<03>%E. Bugianesi'E. Branco<03>E. Albano()Dustin Freeman<00>)Dragan Gasevic<05>5Douglas Stott ParkerC1Douglas M. Carmean<01>-Douglas B. Terry<00>!Doug SimonO#Dongjing He'Donald Beaver<05>'Dominik Grewe<02>#Dogan Engin<05> Dirk FoxrDing Yuan<00>#Dieter Foxy<00>%Diego Ongaro<05>%Dhiru Kholia['Dennis Shasha<00>)Dennis Ritchie<05>)Deniz Hastorun(1Deniz Altınbüken<05>/Deniz Altinbüken5Denise E. M. Penrose1Deborah A. Wallachm-Georges Gonthier=George Van Den Driessche<02>+George Toderici<01>%George Stiny9'George Candea<00>%Georg Seelig<01>)Geoffrey Romer?7Geoffrey J. Mclachlan# !<08><04>!
GD<00> <0B> p F<04><04><04> y<03><03>U#;<07><02><05>oX<06>tQ!<05><08>
<EFBFBD>
B <09> <09> <09><05> <0B><02>m3
<EFBFBD><00>W Q<0E><0E>
<EFBFBD>S <0A> <0A> K
<EFBFBD><0F> N  <0C> <0C>  f<00><00>?<01><01>j<08>90eMicroreboot - A Technique for Cheap RecoveryhG The CasHol<00>CInteractive Horizon MappingAInteractive topic modeling<00>%MIntroduction to Cryptocurrencies*WInternet Security Glossary, Version 2<00>4kJoint action: bodies and minds moving together.<00>)UJails: Confining the Omnipotent Root<00><}IronFleet: proving practical distributed systems correct7@<04>Introduction to a System for Distributed Databases (SDD-1)<00><02>Paxos Made S/Hopscotch Hashingr8sHigh-quality single-shot capture of facial geometry<00>5mHigh-Performance Graphics in Racket with DirectX<00>fLig+[FlashNet: flash/network stack co-design+YFast asymmetric thread synchronization7Fast String Searchingv/aF1: A Distributed SQL Database That Scales<00>I<04>Exploring the Potential of Gamification Among Frail Elderly Persons<00>I<04>Experiences with QuickCheck: Testing the Hard Stuff and Staying Sane5IDF for Word N-grams<00>2gHigh-throughput DNA sequence data compression ?Linear work suf2iExperience with Processes and Monitors in Mesa[-Event-Driven FRP 4mEvaluating Generative Models for Text Generation =Epidemic Broadcast Trees<00>;{Epidemic Algorithms for Replicated Database MaintenanceZ0cHow to design a good API and why it matters;Flat Datacenter StoragesN<04>Herbivore: A Scalable and Efficient Protocol for Anonymous Communicationi2gFundamental Concepts in Programming Languages<00>/aFunctional reactive programming, continued<00>"GFunctional Reactive AnimationcK<04>Functional Programming with Bananas, Lenses, Envelopes and Barbed WirefG<04>From game design elements to gamefulness: defining "gamification"<00>O<04>Freenet: A Distributed Anonymous Information Storage and Retrieval System./Fortifying macros<00>r<04>gFlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps}@<04>Finding race conditions in Erlang with QuickCheck and PULSEk<45>.<04>]Faculty of Associated Medical Sciences 1. Anterior Translation of Humeral Head in Glenohumeral Joint: Comparison between Limb Dominance and Gender Using UltrasonographyQ5mGamification in educational software development(D<04> How the Hidden Hand Shapes the Market for Software Reliability`7qIn Search of an Understandable Consensus Algorithm<01>F<04>Heap architectures for concurrent languages using message passing$1eHarvest, Yield and Scalable Tolerant SystemsDB<04>HaLoop: Efficient Iterative Data Processing on Large Clusters:Q<04>#GigaVoxels: ray-guided streaming for efficient and detailed voxel rendering<00>)UGenetic Programming: An Introduction$%MHints for Computer System DesignM-Ideal Hash TreesJD<04> Impossibility of Distributed Consensus with One Faulty ProcessHOMap)WEnd-To-End Arguments in System Designu;yEluding carnivores: file sharing with strong anonymity<01>,[Elm: Concurrent FRP for Functional GUIs<00>5mHigh-Level Specifications: Lessons from Industry<01>V<04>/Everything you always wanted to know about synchronization but were afraid to ask 5Instant architecture +YInformation-based models for ad hoc IR<00>+YInductive Supervised Quantum Learning.E<04> Incremental Mature Garbage Collection Using the Train Algorithm<00>-]Incremental Collection of Mature Objects<00>Q<04>#Implementing the Omega failure detector in the crash-recovery failure model%V<04>/Implementing Fault-Tolerant Services Using the State Machine Approach: A TutorialW$KImmutability Changes Everything<00>9wImaging vector fields using line integral convolution#1eIllumination for Computer Generated Pictures7sHyperDex: a distributed, searchable key-value store^I<04>HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast9G<04>Hoard: A Scalable Memory Allocator for Multithreaded Applications<00><00>Molecular computation of solutions to combinatorial problems.<00>)UModularity and Scalability in Calvin<00>B<04>MillWheel: Fault-Tol)UImproved Dynamic Dictionary Matching<01> <03> $
<EFBFBD>
%<05><03><00><08>
u<02>' GGAbove the Clouds: A Berkeley View of Cloud Computing<07>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission.02017-09-06T01:54:55.0686330572017-09-06T01:54:55.068633057<EFBFBD>T<EFBFBD> <00><02>GGDesign requirements for technologies that encourage physical activity<07>Overweight and obesity are a global epidemic, with over one billion overweight adults worldwide (300+ million of whom are obese). Obesity is linked to several serious health problems and medical conditions. Medical experts agree that physical activity is critical to maintaining fitness, reducing weight, and improving health, yet many people have difficulty increasing and maintaining physical activity in everyday life. Clinical studies have shown that health benefits can occur from simply increasing the number of steps one takes each day and that social support can motivate people to stay active. In this paper, we describe Houston, a prototype mobile phone application for encouraging activity by sharing step count with friends. We also present four design requirements for technologies that encourage physical activity that we derived from a three-week long in situ pilot study that was conducted with women who wanted to increase their physical activity.CHI02017-09-06T01:54:54.1036850592017-09-06T01:54:54.103685059<EFBFBD> <0A>
<00> GGMaking reliable distributed systems in the presence of software errors<07>02017-09-06T01:54:52.6822028812017-09-06T01:54:52.682202881k<EFBFBD> W GGInternet Security Glossary, Version 2<07>02017-09-06T01:54:50.8820349122017-09-06T01:54:50.882034912<EFBFBD>X<EFBFBD>
=<02> GGTwo Tasty Servings of Pi<07>Perhaps no concept has captured the mathematical imagination more than the circle ratio π, while no mathematical symbol has evoked more mystery, romanticism and popular appeal than π itself. Why this fascination with math-ematics' most famous number? For the professional mathematician, π has long presented a challenge, being taciturn by nature and yielding up its splendours only grudgingly. When they are teased out, however, the effort expended is often handsomely repaid. Among reasons drawing the amateur to π are: its habit of turning up everywhere, often in unexpected places; the highly publicized search for its decimal digits, with world records tumbling almost annually in today's age of the supercomputer; and its long, colourful history filled with incident, drama, humour, genius and eccentricity. Continued interest in π over four millennia has resulted in the accumulation of a vast π-archive. What, then, do the two books under review here contribute to this collection? Pi : A Source Book, the first source book on π ever to be published, documents , mainly through original writings, the history of π from the dawn of02017-09-06T01:54:49.8302548832017-09-06T01:54:49.830254883 <00> <05><00><00><04> <00>/<02>[GGSimple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithms<07>Drawing ideas from previous authors, we present a new non-blocking concurrent queue algorithm and a new two-lock queue algorithm in which one enqueue and one de-queue can proceed concurrently. Both algorithms are simple , fast, and practical; we were surprised not to find them in the literature. Experiments on a 12-node SGI Challenge multiprocessor indicate that the new non-blocking queue consistently outperforms the best known alternatives; it is the clear algorithm of choice for machines that provide a universal atomic primitive (e.g. compare and swap or load linked/store conditional). The two-lock concurrent queue outperforms a single lock when several processes are competing simultaneously for access; it appears to be the algorithm of choice for busy queues on machines with non-universal atomic primitives (e.g. test and set). Since much of the motivation for non-blocking algorithms is rooted in their immunity to large, unpredictable delays in process execution, we report experimental results both for systems with dedicated processors and for systems with several processes multiprogrammed on each processor.PODC02017-09-06T01:54:58.3953359382017-09-06T01:54:58.395335938<EFBFBD>$<24> <00><02>=<3D>GGBeyond short snippets: Deep networks for video classification<07>Convolutional neural networks (CNNs) have been extensively applied for image recognition problems giving state-of-the-art results on recognition, detection, segmentation and retrieval. In this work we propose and evaluate several deep neural network architectures to combine image information across a video over longer time periods than previously attempted. We propose two methods capable of handling full length videos. The first method explores various convolutional temporal feature pooling architectures, examining the various design choices which need to be made when adapting a CNN for this task. The second proposed method explicitly models the video as an ordered sequence of frames. For this purpose we employ a recurrent neural network that uses Long Short-Term Memory (LSTM) cells which are connected to the output of the underlying CNN. Our best networks exhibit significant performance improvements over previously published results on the Sports 1 million dataset (73.1% vs. 60.9%) and the UCF-101 datasets with (88.6% vs. 88.0%) and without additional optical flow information (82.6% vs. 73.0%).2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)02017-09-06T01:54:57.3133349612017-09-06T01:54:57.313334961<EFBFBD>{<7B>
e<02>GGThe Case for Determinism in Database Systems<07>Replication is a widely used method for achieving high availability in database systems. Due to the nondeterminism inherent in traditional concurrency control schemes, however, special care must be taken to ensure that replicas don't diverge. Log shipping, eager commit protocols, and lazy synchronization protocols are well-understood methods for safely replicating databases, but each comes with its own cost in availability, performance, or consistency. In this paper, we propose a distributed database system which combines a simple deadlock avoidance technique with concurrency control schemes that guarantee equivalence to a predetermined serial ordering of transactions. This effectively removes all nondeterminism from typical OLTP workloads, allowing active replication with no synchronization overhead whatsoever. Further, our system eliminates the requirement for two-phase commit for any kind of distributed transaction, even across multiple nodes within the same replica. By eschewing deadlock detection and two-phase commit, our system under many workloads outper-forms traditional systems that allow nondeterministic transaction reordering.PVLDB02017-09-06T01:54:56.1113029792017-09-06T01:54:56.111302979 <03> 4<03><00><0E>
_<02> IGGThe Moral Character of Cryptographic Work<07>Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Preamble. Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game—a set of puzzles involving communicating parties and notional adversaries. This vision of who we are animates a field whose work is intellectually impressive and rapidly produced, but also quite inbred and divorced from real-world concerns. Is this what cryptography should be like? Is it how we should expend the bulk of our intellectual capital? For me, these questions came to a head with the Snowden disclosures of 2013. If cryptography's most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting electronically? Yet I soon realized that most cryptographers didn't see it this way. Most seemed to feel that the disclosures didn't even implicate us cryptographers. I think that they do. So I want to talk about the moral obligations of cryptographers , and my community as a whole. This is not a topic cryptographers routinely discuss. In this post-Snowden era, I think it needs to be. The essay and talk are addressed to the cryptographic community—my community— and the words " we " and " our " should be so interpreted. I apologize in advance if I offend anyone with any of my comments; nothing of the sort is my intent.IACR Cryptology ePrint Archive02017-09-06T01:55:00.4156589362017-09-06T01:55:00.415658936<EFBFBD>H<EFBFBD>
m<02>%GGUnicorn: A System for Searching the Social Graph<07>Unicorn is an online, in-memory social graph-aware indexing system designed to search trillions of edges between tens of billions of users and entities on thousands of commodity servers. Unicorn is based on standard concepts in information retrieval, but it includes features to promote results with good social proximity. It also supports queries that require multiple round-trips to leaves in order to retrieve objects that are more than one edge away from source nodes. Unicorn is designed to answer billions of queries per day at latencies in the hundreds of milliseconds, and it serves as an infrastructural building block for Facebook's Graph Search product. In this paper, we describe the data model and query language supported by Unicorn. We also describe its evolution as it became the primary backend for Facebook's search offerings.PVLDB02017-09-06T01:54:59.6055090332017-09-06T01:54:59.605509033 1 ,<06>1<00>e<EFBFBD>
S<02>wGGA DNA-Based Archival Storage System<07>Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up. Using DNA to archive data is an attractive possibility because it is extremely dense, with a raw limit of 1 exabyte/mm<sup>3</sup> (109 GB/mm<sup>3</sup>), and long-lasting, with observed half-life of over 500 years. This paper presents an architecture for a DNA-based archival storage system. It is structured as a key-value store, and leverages common biochemical techniques to provide random access. We also propose a new encoding scheme that offers controllable redundancy, trading off reliability for density. We demonstrate feasibility, random access, and robustness of the proposed encoding with wet lab experiments involving 151 kB of synthesized DNA and a 42 kB random-access subset, and simulation experiments of larger sets calibrated to the wet lab experiments. Finally, we highlight trends in biotechnology that indicate the impending practicality of DNA storage for much larger datasets.ASPLOS02017-09-06T01:55:03.4021679692017-09-06T01:55:03.402167969<EFBFBD><0E>
O<02>Y GGWhy Silent Updates Boost Security<07>Security fixes and feature improvements don't benefit the end user of software if the update mechanism and strategy is not effective. In this paper we analyze the effectiveness of different Web browsers update mechanisms; from Google Chrome's silent update mechanism to Opera's update requiring a full re-installation. We use anonymized logs from Google's world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version. However, there is still room for improvement as we found. Google Chrome's advantageous silent update mechanism has been open sourced in April 2009. We recommend any software vendor to seriously consider deploying silent updates as this benefits both the vendor and the user, especially for widely used attack-exposed applications like Web browsers and browser plug-ins.02017-09-06T01:55:02.2394221192017-09-06T01:55:02.239422119<EFBFBD>P<EFBFBD>
k<02> EGGJoint action: bodies and minds moving together.<07>The ability to coordinate our actions with those of others is crucial for our success as individuals and as a species. Progress in understanding the cognitive and neural processes involved in joint action has been slow and sparse, because cognitive neuroscientists have predominantly studied individual minds and brains in isolation. However, in recent years, major advances have been made by investigating perception and action in social context. In this article we outline how studies on joint attention, action observation, task sharing, action coordination and agency contribute to the understanding of the cognitive and neural processes supporting joint action. Several mechanisms are proposed that allow individuals to share representations, to predict actions, and to integrate predicted effects of own and others' actions.Trends in cognitive sciences02017-09-06T01:55:01.4556359862017-09-06T01:55:01.455635986 i<00><0F><0F><0F>b><0E><0E><0E><0E>oU= <0A> <0A> <0A> { _ 0 <0C> <0C> <0C>  c =  <0B> <0B> <0B> z ^ 2
<EFBFBD>
<EFBFBD>
<EFBFBD>
e
G
 <09> <09> <09> l T 6 <08><08><08><08>wQ,<07><07><07>\0<06><06><06>wD<05><05><05>lE<04><04><04><04>gE!<03><03><03><03>qW7<02><02><02><02>^F2 <01><01><01>sQ1<00>#<23>+ Mauro CherubiniMauroCherubini*<2A>3Rodrigo De OliveiraRodrigoDeOliveira<1D>% Chris ThomasChrisThomas<1F>' Valient GoughValientGough<1D>% Dan DumitriuDanDumitriu*<2A>3Robbert Van RenesseRobbertVanRenesse!<21>) Turner WhittedTurnerWhitted%<25>- Georges GonthierGeorgesGonthier#<23>+ Cédric FournetCédricFournet<11> Min WuMinWu<15> Sen WangSenWang,<2C>5#Marta Z. KwiatkowskaMartaZ.Kwiatkowska<1F> ' Xiaowei HuangXiaoweiHuang%<25> - Alberto DainottiAlbertoDainotti!<21> ) Robert BeverlyRobertBeverly<17>
 Lance AltLanceAlt<1F> ' Mario SzegedyMarioSzegedy<1D>% Yossi MatiasYossiMatias<17> Noga AlonNogaAlon<1C>%Luc Van GoolLucVanGool<1F>' Andreas UlmerAndreasUlmer<1F>' Simon HaeglerSimonHaegler!<21>) Pascal MüllerPascalMüller&<26>/Pedro M. DomingosPedroM.Domingos!<21>) Shojiro NishioShojiroNishio<1F>' Takahiro HaraTakahiroHara%<25>- Masumi ShirakawaMasumiShirakawa$<24>~-Naga Rekha MalaeNagaRekhaMalae$<24>}-Lennart E. NackeLennartE.Nacke<1D>|% Rilla KhaledRillaKhaled<17>{ Dan DixonDanDixon+<2B>z3 Sebastian DeterdingSebastianDeterding$<24>y-Jon M. KleinbergJonM.Kleinberg <20>x)Petra S. HuppiPetraS.Huppi-<2D>w5' Jean-Francois ManginJean-FrancoisMangin*<2A>v3R. Ha-Vinh LeuchterR.Ha-VinhLeuchter)<29>u1 +C. Borradori-TolsaC.Borradori-Tolsa)<29>t1 François LazeyrasFrançoisLazeyras0<73>s9Manon J. N. L. BendersManonJ. N. L.Benders!<21>r) Jessica DuboisJessicaDubois%<25>q- Michael KaminskyMichaelKaminsky*<2A>p3Michael J. FreedmanMichaelJ.Freedman<1B>o# Wyatt LloydWyattLloyd<1F>n' Kjell WinbladKjellWinblad)<29>m1 %David KlafteneggerDavidKlaftenegger3<72>l;- Pierre-Évariste DagandPierre-ÉvaristeDagand,<2C>k5Jonas Braband JensenJonasBrabandJensen<1B>j# Nick BentonNickBenton!<21>i) Andrew KennedyAndrewKennedy&<26>h/J. Strother MooreJ.StrotherMoore"<22>g+Robert S. BoyerRobertS.Boyer#<23>f+ Jean-Paul HatonJean-PaulHaton<19>e! Yifan GongYifanGong<19>d! Haizhou LiHaizhouLi<1D>c% Stephen KellStephenKell<1B>b# Tiark RompfTiarkRompf<1D>a% Phil BagwellPhilBagwell&<26>`/Patrick E. O'neilPatrickE.O'neil<1B>_# Pat HellandPatHelland<15>^ Jim GrayJimGray#<23>]+ David MazièresDavidMazières(<28>\1Yifeng Frank HuangYifengFrankHuang<1F>[' Andrea BittauAndreaBittau.<2E>Z7#Ali José MashtizadehAliJoséMashtizadeh4<68>Y=!Christine Van VredendaalChristineVanVredendaal<1B>X# Tanja LangeTanjaLange9<65>WA! +Chitchanok ChuengsatiansupChitchanokChuengsatiansup*<2A>V3Daniel J. BernsteinDanielJ.Bernstein<1F>U' Philip WadlerPhilipWadler<19>T! Paul HudakPaulHudak#<23>S+ Sebastian ThrunSebastianThrun)<29>R1 #Andrew LookingbillAndrewLookingbill<19>Q! David LiebDavidLieb<1F>P' Cynthia DworkCynthiaDwork!<21>O) Byung-Gon ChunByung-GonChun+<2B>N3% Jayanthkumar KannanJayanthkumarKannan%<25>M- Philippas TsigasPhilippasTsigas$<24>L-Nhan Nguyen DangNhanNguyenDang#<23>K+ !Bapi ChatterjeeBapiChatterjee<19>J! Bob SumnerBobSumner%<25>I- Valerio PascucciValerioPascucci<1F>H' Julien TiernyJulienTierny<1B>G# Brian SummaBrianSumma"<22>F+David A. WagnerDavidA.Wagner!<21>E) Kate GreenwoodKateGreenwood,<2C>D5Adrienne Porter FeltAdriennePorterFelt<19>C! Erika ChinErikaChin <20>B)Paul R. WilsonPaulR.Wilson&<26>A/Robert D. BlumofeRobertD.Blumofe*<2A>@3Kathryn S. MckinleyKathrynS.Mckinley"<22>?+Emery D. BergerEmeryD.Berger!<21>>) #D. SchmalstiegD.Schmalstieg<15>= B. KainzB.Kainz<17>< M. KenzelM.Kenzel!<21>;) #M. SteinbergerM.Steinberger<1F>:' Karin StraussKarinStrauss<1D>9% Georg SeeligGeorgSeelig<17>8 Luis CezeLuisCeze(<28>71Douglas M. CarmeanDouglasM.Carmean!<21>6) Randolph LopezRandolphLopez!<21>5) James BornholtJamesBornholt<1B>4# Stefan FreiStefanFrei+<2B>33 %Thomas DuebendorferThomasDuebendorfer'<27>2/ Günther KnoblichGüntherKnoblich%<25>1- Harold BekkeringHaroldBekkering  <0B><00>w<EFBFBD> <00><02>]GGHoard: A Scalable Memory Allocator for Multithreaded Applications<07>Parallel, multithreaded C and C++ programs such as web servers, database managers, news servers, and scientific applications are becoming increasingly p
<EFBFBD><04><00>V<EFBFBD>
s<02>'/EEPanorama weaving: fast and flexible seam processing<07>A fundamental step in stitching several pictures to form a larger mosaic is the computation of boundary seams that minimize the visual artifacts in the transition between images. Current seam computation algorithms use optimization methods that may be slow, sequential, memory intensive, and prone to finding suboptimal solutions related to local minima of the chosen energy function. Moreover, even when these techniques perform well, their solution may not be perceptually ideal (or even good). Such an inflexible approach does not allow the possibility of user-based improvement. This paper introduces the <i>Panorama Weaving</i> technique for seam creation and editing in an image mosaic. First, <i>Panorama Weaving</i> provides a procedure to create boundaries for panoramas that is fast, has low memory requirements and is easy to parallelize. This technique often produces seams with lower energy than the competing global technique. Second, it provides the first interactive technique for the exploration of the seam solution space. This powerful editing capability allows the user to automatically extract energy minimizing seams given a sparse set of constraints. With a variety of empirical results, we show how <i>Panorama Weaving</i> allows the computation and editing of a wide range of digital panoramas including unstructured configurations.ACM Trans. Graph.02017-09-06T01:55:11.344270022017-09-06T01:55:11.34427002<EFBFBD>,<2C>
u<02>aGGAnalyzing inter-application communication in Android<07>Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message passing system. This encourages inter-application collaboration and reduces developer burden by facilitating component reuse. Unfortunately, message passing is also an application attack surface. The content of messages can be sniffed, modified, stolen, or replaced, which can compromise user privacy. Also, a malicious application can inject forged or otherwise malicious messages, which can lead to breaches of user data and violate application security policies.
We examine Android application interaction and identify security risks in application components. We provide a tool, ComDroid, that detects application communication vulnerabilities. ComDroid can be used by developers to analyze their own applications before release, by application reviewers to analyze applications in the Android Market, and by end users. We analyzed 20 applications with the help of ComDroid and found 34 exploitable vulnerabilities; 12 of the 20 applications have at least one vulnerability.MobiSys02017-09-06T01:55:10.2102219242017-09-06T01:55:10.210221924 <04>
<EFBFBD><04><00>i<EFBFBD>
s<02>I/GGHigh-quality single-shot capture of facial geometry<07>This paper describes a passive stereo system for capturing the 3D geometry of a face in a single-shot under standard light sources. The system is low-cost and easy to deploy. Results are submillimeter accurate and commensurate with those from state-of-the-art systems based on active lighting, and the models meet the quality requirements of a demanding domain like the movie industry. Recovered models are shown for captures from both high-end cameras in a studio setting and from a consumer binocular-stereo camera, demonstrating scalability across a spectrum of camera deployments, and showing the potential for 3D face modeling to move beyond the professional arena and into the emerging consumer market in stereoscopic photography.
Our primary technical contribution is a modification of standard stereo refinement methods to capture pore-scale geometry, using a qualitative approach that produces visually realistic results. The second technical contribution is a calibration method suited to face capture systems. The systemic contribution includes multiple demonstrations of system robustness and quality. These include capture in a studio setup, capture off a consumer binocular-stereo camera, scanning of faces of varying gender and ethnicity and age, capture of highly-transient facial expression, and scanning a physical mask to provide ground-truth validation.ACM Trans. Graph.02017-09-06T01:55:14.2979409182017-09-06T01:55:14.297940918<EFBFBD>@<40> <00>-<02>a EEManaging Update Conflicts in Bayou, a Weakly Connected Replicated Storage System<07>Bayou is a replicated, weakly consistent storage system designed for a mobile computing environment that includes portable machines with less than ideal network connectivity. To maximize availability, users can read and write any accessible replica. Bayou's design has focused on supporting application-specific mechanisms to detect and resolve the update conflicts that naturally arise in such a system, ensuring that replicas move towards eventual consistency, and defining a protocol by which the resolution of update conflicts stabilizes. It includes novel methods for conflict detection, called dependency checks, and per-write conflict resolution based on client-provided merge procedures. To guarantee eventual consistency, Bayou servers must be able to roll-back the effects of previously executed writes and redo them according to a global serialization order. Furthermore, Bayou permits clients to observe the results of all writes received by a server, including tentative writes whose conflicts have not been ultimately resolved. This paper presents the motivation for and design of these mechanisms and describes the experiences gained with an initial implementation of the system.02017-09-06T01:55:12.404367922017-09-06T01:55:12.40436792 E
<EFBFBD><E<00>s<EFBFBD>
5<02>3GGDifferential Privacy<07>In 1977 Dalenius articulated a desideratum for statistical databases: nothing about an individual should be learnable from the database that cannot be learned without access to the database. We give a general impossibility result showing that a formalization of Dalenius' goal along the lines of semantic security cannot be achieved. Contrary to intuition, a variant of the result threatens the privacy even of someone not in the database. This state of affairs suggests a new measure, differential privacy, which, intuitively, captures the increased risk to one's privacy incurred by participating in a database. The techniques developed in a sequence of papers [8, 13, 3], culminating in those described in [12], can achieve any desired level of privacy under this measure. In many cases, extremely accurate information about the database can be provided while simultaneously ensuring very high levels of privacy.ICALP02017-09-06T01:55:17.7721630862017-09-06T01:55:17.772163086<EFBFBD><07> <00><02> EEMaking Programs Forget: Enforcing Lifetime for Sensitive Data<07>This paper introduces guaranteed data lifetime, a novel system property ensuring that sensitive data cannot be retrieved from a system beyond a specified time. The trivial way to achieve this is to " reboot " ; however, this is disruptive from the user's perspective, and may not even eliminate disk copies. We discuss an alternate approach based on state reincarnation where data expiry is completely transparent to the user, and can be used even if the system is not designed a priori to provide the property.HotOS02017-09-06T01:55:16.437760012017-09-06T01:55:16.43776001<EFBFBD>5<EFBFBD>
[<02>GGEfficient Lock-free Binary Search Trees<07>In this paper we present a novel algorithm for concurrent lock-free internal binary search trees (BST) and implement a Set abstract data type (ADT) based on that. We show that in the presented lock-free BST algorithm the amortized step complexity of each set operation - Add, Remove and Contains - is O(H(n) + c), where H(n) is the height of the BST with n number of nodes and c is the contention during the execution. Our algorithm adapts to contention measures according to read-write load. If the situation is read-heavy, the operations avoid helping the concurrent Remove operations during traversal, and adapt to interval contention. However, for the write-heavy situations we let an operation help a concurrent Remove, even though it is not obstructed. In that case, an operation adapts to point contention. It uses single-word compare-and-swap (CAS) operations. We show that our algorithm has improved disjoint-access-parallelism compared to similar existing algorithms. We prove that the presented algorithm is linearizable. To the best of our knowledge, this is the first algorithm for any concurrent tree data-structure in which the modify operations are performed with an additive term of contention measure.PODC02017-09-06T01:55:15.3902819822017-09-06T01:55:15.390281982 <00><01><0F><0F><0F><0F><0F><0F><0F><0F>vdXB0
<0E><0E><0E><0E><0E><0E>r^RH2 <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> { r i \ M > 5 *   <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> r ` W G > 3    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B>  s g ] K 6 + 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
u
^
N
B
-


 <09> <09> <09> <09> <09> <09> w d Z L @ / &  <08><08><08><08><08><08><08><08><08>z_F+<07><07><07><07><07><07><07><07><07>xkWF:/<06><06><06><06><06><06><06><06><06>iS=0<05><05><05><05><05><05><05><05>r^UI<+<04><04><04><04><04><04><04><04><04>ncQE6<03><03><03><03><03><03><03><03>rXE7& <02><02><02><02><02><02><02><02><02>|sj\LB. <01><01><01>
<EFBFBD>Gcaching<0F>F%design space<0E>E#theoretical<10>D'hash function <0A>C!dictionary<11>B)cuckoo hashing<07>Aenum <0A>@!enumerator <0B>?iterator<06>>ner<06>=cpl<06><adl <09>;formal<1A>:;parametric polymorphism <09>9silver <09>8bullet<14>7/computer hardware<06>6put<06>5nfr <0B>4familiar <0C>3essential <0A>2!accidental<07>1ject<0E>0#low latency <0B>/executor<10>.'task duration<17>-5computation resource <0C>,data item<08>+nosql<16>*3relational database<07>)spel <0A>(!affordance <0C>'marketing<06>&som<19>%9abstract argumentation<1A>$;argumentation semantics<06>#iff<1A>";argumentation framework <0C>!labelling <09> recent<0F>%small subset<08>tpc-c<16>3multiple partitions<18>7transactional support
<EFBFBD>logical<06>dis <09>causal<08>clock<06>pen<0F>%continuation<08>yampa <0A>!same topic<06>lda<06>itm<11>)topic modeling<0E>#topic model
<EFBFBD>writing <09>mexica<06> cbr<11> )computer model
<EFBFBD> tension<07>
mate <0C> gyroscope
<EFBFBD>shutter<10>'camera motion<16>3video stabilization<06>bwt <09>suffix<0E>#linear time<19>9construction algorithm<1A>;deterministic execution
<EFBFBD>h-store<13>-data aggregation<13>~-failure detector<15>}1resource discovery
<EFBFBD>|vserver <0C>{container<11>z)data operation<07>yacid <0B>xsinfonia <0B>wgnutella <0B>vwormhole<10>u'checkpointing <09>tchubby<11>s)dependent type<14>r/algebraic effects<08>qmonad <09>ptyping<0E>o#polymorphic<11>n)hindley-milner
<EFBFBD>mcopying<08>lologn<08>kchord
<EFBFBD>jfreenet <0A>i!powergraph<12>h+google's pregel <0A>g!datacenter<06>fgps <09>egraphx<15>d1language extension<06>cvar
<EFBFBD>bclarity<08>amacro
<EFBFBD>`pitfall<18>_7experimental analysis<16>^3theoretical results<18>]7analysis of algorithm <0B>\radiance<0F>[%illumination<08>Ztance<07>Ybrdf<06>Xray<07>Wwild<07>Vspdy<19>U9network characteristic <0C>Tload time <09>Ssenior<0F>R%digital game<0E>Q#demographic<06>Psql<0E>O#interactive <09>Nimpala <0B>Mbig data<07>Lafrp<10>K'major feature<0E>J#compilation<1B>I=graphical user interface <0C>Hanimation<18>G7trajectory generation<06>Fdof<14>E/motion trajectory<12>D+state of motion<06>Cotg <0C>Batomicity <0A>A!invocation<12>@+linearisability <09>?racket <0A>>!javascript<14>=/occurrence typing<08><idiom
<EFBFBD>;clojure
<EFBFBD>:virtual <0A>9!unikernels<06>8vms <09>7mirage<08>6guest<11>5)virtualization<07>4trap<06>3i/o<06>2vmm<13>1-daily medication<18>07medication compliance<08>/elder<12>.+gossip protocol<0F>-%flow control<07>,ture <09>+shadow <09>*viewer<0E>)#ray tracing
<EFBFBD>(graphic <09>'shader <0C>&rendering
<EFBFBD>%realism <0B>$calculus <0B>#multiset <09>"jocaml<08>!ocaml <0C> degreaser<07>pass
<EFBFBD>seminal<12>+streaming model<08>cient<06>ams <0A>!cityengine<06>cga<0F>%immutability<13>-feature engineer <0B>classifi<08>curse<0E>#overfitting<06>och<0F>%game element<06>har<14>/non-game contexts<07>blog <0A>!data space <0B> pagerank<12> +authority score<08> salsa<06>
sts <0C> temporale <0C>asymmetry
<EFBFBD>preterm<06>csf<06>ets <0C>assembler<07>byte<0F>%morris-pratt<06>kmp<18>7boyer-moore algorithm<0F>%knuth-morris<15>~1matching algorithm<07>}unix<07>|sync
<EFBFBD>{replica<1A>z;synchronous replication<13>y-multiple devices<07>xrime <09>wripemd<11>v)future attacks
<EFBFBD>uupgrade<07>tedsl <0B>seighties<16>r3generic programming<12>q+formal semantic*<2A>p[functional programming language haskell
<EFBFBD>oroadway<08>ndarpa<0F>m%optical flow<11>l)traversability<0F>k%road surface<13>j-statistical data <09>ipertur<0F>h%definition 1 <09>gbation<17>f5statistical database<07>edisk<07>dport <09>cproach<07>bhard<15>a1parallel operation<06>`bst<16>_3binary search trees
 <00><01>. <0B> y= \<02> C -<02> <02> 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
{
f
T
H
3
*
!


 <09> <09> <09> <09> <09> <09> <09> <09> u m ^ Q G 1<07> #   <08><08><08><08><08><08><08><08>oT<01><01><01><02><02>wjaWI9<04><04><04><04><04><04><04>yp^L@*E<03><03><02><03><03><03><03><03><03><03>m<02><0F><0F><0F><0F><0F><0F><0F><0F><0F>{r<07>iYOF: <0E><0E><0E><0E><0E><0E><0E><0E>h_Q?0# <0A> <0A> <0A> <0A> <0A><02>!<02> <0A> <0A> ~ t<07> l a S J A 8 / '   <0C> <0C> <0C> <0C> <0C> <0C> w j a X B 4 )   <0B> <0B>\ <0B> <0B> <0B> <0B> <0B><07><07><07><07><07><07><07><07><02><07><07>um[OD/<06><06><06>,<06><06><06>xlcH>4)<05><05><05><05><05><05><05>tkaO:(<04><04><04>perf)hindley-milnern hint<03> hipaa <02>mat garbage];large-scale application"!hyperplane<03> hyperdex http<01>hpp<02> hotspotXhopscotchUhopZhol/intermediate nodegenerator<00>+lazy evaluation<04> genomic<03>initiatorgfs<03>lcelcd;interactive application<04>1garbage collection//in-depth analysis<03>#local state<03>-interface designS#interactiveO
inter intent<01>%intelligence<02>int<00>%installation<01>#input array<03>#inheritanceB1inductive learning` indexing<03> Cimplementation of mapreduce<03> impalaN%immutability%illumination[iff<02>
idiom<icp?icc<02>ibm<00>i/o3hypertext<00>#hypersphere<03>!hyperspace number of records<00>
nosql<02>/non-negative data<02>/non-game contexts%non-dominantQ+non-determinism3%non-blocking<01> nnza<03>nfr<02>!networkingM9network virtualizationO9network characteristicU5network architectureKner<02>%near-optimal<03>nde%/natural extensionC natural& napster<03>
nadphg nadpj nadhh7n.a. n.a. pc analysis<02>mvs mutator2?multithreaded applicationN multiset#3multiple partitions<02>-multiple devices<01><04>multicast<00>+mozilla firefox<01>
movien/motion trajectoryE+motion planningl+motion dynamics<00>
motif mosaic<01>%morris-prattmop, monsoonJ monitor
monadq modF%mobile robot<00>=mobile phone application<01>mmu4 mixnet<01> handler<04> itselfr)legacy systemsZherbivoreUlcaM'impossibility;/general principle57higher-order function5high-level operators<03>+high throughput<03>-high reliability<01>heap6hdf,hci<01>)hashing method<03>!hash table<00>'hash function<02> hash@ hard<01>har handling
-hamiltonian path<02> hair<01> h-store<02>gyroscope<02>guiY
guest6
guage grid map<01> graphxe=graphical user interfaceI+graphical model<00> graphic( graph g<02>!graph datam grammar$ gpus<01>gpu<00>gpsfgpe<03>+gossip protocol. gossip<00>%google, inc.<03>+google's pregelh+google's chubbyA+google bigtable<03>'goal positionp gnutellaw glue%global state<03>9global serializability!1global information<03>ghc^geometricm/generic techniquec3generic programming<01>;generational collection<01>+general pattern#/garbage collectorR log data lockingSlock/locality property<03> locality<03>#local model
local<00>load timeT)load balancingN
lkopf<00> liveness<00>-little knowledgeIlisp-lir<00> linkedin+linearizability<02>+linearisability@#linear time<02>)linear hashing<00>)linear algebra<03>?line integral convolutionj lightinglifecycleq%life science<01>lielgd<01>lfu<00>levles length n
lemma<00>lemP leakt!leadership% leader<02>lda<02> lazy4
laser<01>!Elarge-scale software systemsg1language extensiond7language capabilitiesJ/lambda expression labels tlabelling<02>%knuth-morris<01> knapsack<00>kmp9kinectfusion algorithm<00>+key-value store/key cryptosystems'kernel memory<00>+kernel function<00> kelips<03>
judge<00>jse<03>+joint attention<01>%joint action<03>7johnson-lindenstrauss<00> jocaml"jer/ ject<02>!javascript>ityEitm<02> iterator<02>ispL isoform<03>isa<00>#irrelevanceironfleet<00>iot<03>!invocationAinvariante#interpreterk <03>
<EFBFBD> v<03><00> <0A>#
!<02>IIGGNTRU Prime<07>Focus of this talk: motivation. 2 Can we predict future attacks? 1996 DobbertinBosselaers Preneel " RIPEMD-160: a strengthened version of RIPEMD " : " It is anticipated that these techniques can be used to produce collisions for MD5 and perhaps also for RIPEMD. This will probably require an additional effort, but it no longer seems as far away as it was a year ago. " 1996 Robshaw: Collisions " should be expected " ; upgrade " when practical and convenient ". 1 rime. Bernstein y of Illinois at Chicago & he Universiteit Eindhoven o/papers.html ime is joint work with: ok Chuengsatiansup nge van Vredendaal he Universiteit Eindhoven this talk: motivation. 2 Can we predict future attacks? 1996 DobbertinBosselaers Preneel " RIPEMD-160: a strengthened version of RIPEMD " : " It is anticipated that these techniques can be used to produce collisions for MD5 and perhaps also for RIPEMD. This will probably require an additional effort, but it no longer seems as far away as it was a year ago. " 1996 Robshaw: Collisions " should be expected " ; upgrade " when practical and convenient ". Imagine " This is The atta not brea MD5, so point of speculati is contro and crea state of alternati the very 1 is at Chicago & iteit Eindhoven .html t work with: gsatiansup endaal iteit Eindhoven motivation.IACR Cryptology ePrint Archive02017-09-06T01:55:20.8888190922017-09-06T01:55:20.888819092<EFBFBD><17>"
c<02>SEEA history of Haskell: being lazy with class<07>This paper describes the history of Haskell, including its genesis and principles, technical contributions, implementations and tools, and applications and impact.HOPL02017-09-06T01:55:19.815979982017-09-06T01:55:19.81597998<EFBFBD>k<EFBFBD>! <00>+<02>{GGGAdaptive Road Following using Self-Supervised Learning and Reverse Optical Flow<07>— The majority of current image-based road following algorithms operate, at least in part, by assuming the presence of structural or visual cues unique to the roadway. As a result, these algorithms are poorly suited to the task of tracking unstructured roads typical in desert environments. In this paper, we propose a road following algorithm that operates in a self-supervised learning regime, allowing it to adapt to changing road conditions while making no assumptions about the general structure or appearance of the road surface. An application of optical flow techniques, paired with one-dimensional template matching, allows identification of regions in the current camera image that closely resemble the learned appearance of the road in the recent past. The algorithm assumes the vehicle lies on the road in order to form templates of the road's appearance. A dynamic programming variant is then applied to optimize the 1-D template match results while enforcing a constraint on the maximum road curvature expected. Algorithm output images, as well as quantitative results, are presented for three distinct road types encountered in actual driving video acquired in the California Mojave Desert.Robotics: Science and Systems02017-09-06T01:55:18.8699641112017-09-06T01:55:18.869964111 <00>
<EFBFBD>:<00><00><18>'
a<02>IGGThe operating system: should there be one?<07>Operating systems and programming languages are often informally evaluated on their conduciveness towards composition. We revisit Dan Ingalls' Smalltalk-inspired position that "an operating system is a collection of things that don't fit inside a language; there shouldn't be one", discussing what it means, why it appears not to have materialised, and how we might work towards the same effect in the postmodern reality of today's systems. We argue that the trajectory of the "file" abstraction through Unix and Plan 9 culminates in a Smalltalk-style object, with other filesystem calls as a primitive metasystem. Meanwhile, the key features of Smalltalk have many analogues in the fragmented world of Unix programming (including techniques at the library, file and socket level). Based on the themes of unifying OS- and language-level mechanisms, and increasing the expressiveness of the meta-system, we identify some evolutionary approaches to a postmodern realisation of Ingalls' vision, arguing that an operating system is still necessary after all.PLOS@SOSP02017-09-06T01:55:26.4410319822017-09-06T01:55:26.441031982<EFBFBD>^<5E>&
Y<02>o GGRRB-Trees: Efficient Immutable Vectors<07>Immutable vectors are a convenient data structure for functional programming and part of the standard library of modern languages like Clojure and Scala. The common implementation is based on wide trees with a fixed number of children per node, which allows fast indexed lookup and update operations. In this paper we extend the vector data type with a new underlying data structure, Relaxed Radix Balanced Trees (RRB-Trees), and show how this structure allows immutable vector concatenation, insert-at and splits in O(logN) time while maintaining the index, update and iteration speeds of the original vector data structure.02017-09-06T01:55:24.4274169922017-09-06T01:55:24.427416992<EFBFBD>Q<EFBFBD>%
_<02>-/GGThe Dangers of Replication and a Solution<07>Update anywhere-anytime-anyway transactional replication has unstable behavior as the workload scales up: a ten-fold increase in nodes and traffic gives a thousand fold increase in deadlocks or reconciliations. Master copy replication (primary copy) schemes reduce this problem. A simple analytic model demonstrates these results. A new two-tier replication algorithm is proposed that allows mobile (disconnected) applications to propose tentative update transactions that are later applied to a master copy. Commutative update transactions avoid the instability of other replication schemes.SIGMOD Conference02017-09-06T01:55:23.6119418952017-09-06T01:55:23.611941895<EFBFBD> <0B>$
<02>GGReplication, history, and grafting in the Ori file system<07>Ori is a file system that manages user data in a modern setting where users have multiple devices and wish to access files everywhere, synchronize data, recover from disk failure, access old versions, and share data. The key to satisfying these needs is keeping and replicating file system history across devices, which is now practical as storage space has outpaced both wide-area network (WAN) bandwidth and the size of managed data. Replication provides access to files from multiple devices. History provides synchronization and offline access. Replication and history together subsume backup by providing snapshots and avoiding any single point of failure. In fact, Ori is fully peer-to-peer, offering opportunistic synchronization between user devices in close proximity and ensuring that the file system is usable so long as a single replica remains. Cross-file system data sharing with history is provided by a new mechanism called <i>grafting</i>. An evaluation shows that as a local file system, Ori has low overhead compared to a File system in User Space (FUSE) loopback driver; as a network file system, Ori over a WAN outperforms NFS over a LAN.SOSP02017-09-06T01:55:22.3215930182017-09-06T01:55:22.321593018 YY<00>#<23>(
m<02>e GGEM Algorithms for Probabilistic Mapping Networks<07>The Expectation-Maximization (EM) algorithm is a general technique for maximum likelihood estimation (MLE). In this paper we present several of the important theoretical and practical issues associated with Gaussian mixture mod-eling (GMM) within the EM framework. First, we propose an EM algorithm for estimating the parameters of a special GMM structure, named a probablistic mapping network (PMN), where the Gaussian probability density function is realized as an internal node. In this way, the EM algorithm is extended to deal with the supervised learning of a multicategory classiication problem and serve as a parameter estimator of the neural network Gaussian classiier. Then, a generalized EM (GEM) algorithm is developed as an alternative to the MLE problem of PMN. This is followed by a discussion on the computational considerations and algorithmic comparisons. It is shown that GEM converges faster than EM to the same solution space. The computational eeciency and the numerical stability of the training algorithm beneet from the well-established EM framework. The eeectiveness of the proposed PMN architecture and developed EM algorithms are assessed by conducting a set of speaker recognition experiments. INRIA Apprentissage de RRseaux Probabilistes par Algorithmes EM RRsumm : L'algorithme "Expectation-Maximisation" (EM) est une technique gg-nnrale pour l'estimation par maximum de vraisemblance. Ce document prrsente quelques aspects thhoriques et pratiques importants liis la moddlisation par mm-langes de gaussienne (GMM) dans le cadre EM. Nous proposons d'abord un algo-rithme EM pour estimer le parammtres d'un moddle GMM particulier, appell PMN ("probabilistic mapping network"), dans lequel la fonction de densitt de probabilitt gaussienne est calculle par un noeud interne du rrseau. Nons prrsentons ensuite un algorithm EM ggnnraliss (GEM) comme une solution alternative l'estimation par maximum de vraisemblance d'un PMN. Cette prrsentation est complltte par une discussion sur les aspects calculatoires comparrs des deux algorithmes EM et GEM. Nous montrons en particulier que GEM converge plus vite que EM vers le mmme espace de solutions. L'eecacitt pratique de l'architecture PMN et des algo-rithmes EM proposss est valuue travers un ensemble d'exemples pratiques dans le domaine de la reconnaissance de locuteurs.02017-09-06T01:55:27.2542958982017-09-06T01:55:27.254295898 K <09><07>K<00>h<EFBFBD>+
Y<02>{GGCoq: the world's best macro assembler?<07>We describe a Coq formalization of a subset of the x86 architecture. One emphasis of the model is brevity: using dependent types, type classes and notation we give the x86 semantics a makeover that counters its reputation for baroqueness. We model bits, bytes, and memory concretely using functions that can be computed inside Coq itself; concrete representations are mapped across to mathematical objects in the SSReflect library (naturals, and integers modulo 2<sup><i>n</i></sup>) to prove theorems. Finally, we use notation to support conventional assembly code syntax inside Coq, including lexically-scoped labels. Ordinary Coq definitions serve as a powerful "macro" feature for everything from simple conditionals and loops to stack-allocated local variables and procedures with parameters. Assembly code can be assembled within Coq, producing a sequence of hex bytes. The assembler enjoys a correctness theorem relating machine code in memory to a separation-logic formula suitable for program verification.PPDP02017-09-06T01:55:30.5422548832017-09-06T01:55:30.542254883<EFBFBD>p<EFBFBD>*
S<02> GGThe chemical basis of morphogenesis<07>Concurrent algorithms and the memory bus have garnered improbable interest from both theorists and futurists in the last several years. In fact, few scholars would disagree with the refinement of multicast heuristics. In order to fulfill this objective, we present a framework for virtual technology (Puck), confirming that lambda calculus can be made wearable, self-learning, and unstable.02017-09-06T01:55:29.6542141112017-09-06T01:55:29.654214111<EFBFBD>Q<EFBFBD>)
O<02>I#GGA Fast String Searching Algorithm<07>An algorithm is presented that searches for the location, &#8220;<italic>i</italic>l&#8221; of the first occurrence of a character string, &#8220;<italic>pat</italic>,&#8221; in another string, &#8220;<italic>string</italic>.&#8221; During the search operation, the characters of <italic>pat</italic> are matched starting with the last character of <italic>pat</italic>. The information gained by starting the match at the end of the pattern often allows the algorithm to proceed in large jumps through the text being searched. Thus the algorithm has the unusual property that, in most cases, not all of the first <italic>i</italic> characters of <italic>string</italic> are inspected. The number of characters actually inspected (on the average) decreases as a function of the length of <italic>pat</italic>. For a random English pattern of length 5, the algorithm will typically inspect <italic>i</italic>/4 characters of <italic>string</italic> before finding a match at <italic>i</italic>. Furthermore, the algorithm has been implemented so that (on the average) fewer than <italic>i</italic> + <italic>patlen</italic> machine instructions are executed. These conclusions are supported with empirical evidence and a theoretical analysis of the average behavior of the algorithm. The worst case behavior of the algorithm is linear in <italic>i</italic> + <italic>patlen</italic>, assuming the availability of array space for tables linear in <italic>patlen</italic> plus the size of the alphabet.
3~Commun. ACM02017-09-06T01:55:28.3293420412017-09-06T01:55:28.329342041  <0C><00>{<7B>- <00>9<02>?GGDon't settle for eventual: scalable causal consistency for wide-area storage with COPS<07>Geo-replicated, distributed data stores that support complex online applications, such as social networks, must provide an "always-on" experience where operations always complete with low latency. Today's systems often sacrifice strong consistency to achieve these goals, exposing inconsistencies to their clients and necessitating complex application logic. In this paper, we identify and define a consistency model---causal consistency with convergent conflict handling, or <i>causal</i>+---that is the strongest achieved under these constraints.
We present the design and implementation of COPS, a key-value store that delivers this consistency model across the wide-area. A key contribution of COPS is its scalability, which can enforce causal dependencies between keys stored across an entire cluster, rather than a single server like previous systems. The central approach in COPS is tracking and explicitly checking whether causal dependencies between keys are satisfied in the local cluster before exposing writes. Further, in COPS-GT, we introduce get transactions in order to obtain a consistent view of multiple keys without locking or blocking. Our evaluation shows that COPS completes operations in less than a millisecond, provides throughput similar to previous systems when using one server per cluster, and scales well as we increase the number of servers in each cluster. It also shows that COPS-GT provides similar latency, throughput, and scaling to COPS for common workloads.SOSP02017-09-06T01:55:33.0244309082017-09-06T01:55:33.024430908<EFBFBD>a<EFBFBD>,
g<02>I+GGOn the scalability of the Erlang term storage<07>The Erlang Term Storage (ETS) is an important component of the Erlang runtime system, especially when parallelism enters the picture, as it provides an area where processes can share data. It is therefore important that ETS's implementation is efficient, flexible, but also as scalable as possible. In this paper we document and describe the current implementation of ETS in detail, discuss the main data structures that support it, and present the main points of its evolution across Erlang/OTP releases. More importantly, we measure the scalability of its implementations, the effects of its tuning options, identify bottlenecks, and suggest changes and alternative designs that can improve both its performance and its scalability.Erlang Workshop02017-09-06T01:55:31.9720310062017-09-06T01:55:31.972031006 4<08>=4<00><05>0 <00><02>uGGFrom game design elements to gamefulness: defining "gamification"<07>Recent years have seen a rapid proliferation of mass-market consumer software that takes inspiration from video games. Usually summarized as "gamification", this trend connects to a sizeable body of existing concepts and research in human-computer interaction and game studies, such as serious games, pervasive games, alternate reality games, or playful design. However, it is not clear how "gamification" relates to these, whether it denotes a novel phenomenon, and how to define it. Thus, in this paper we investigate "gamification" and the historical origins of the term in relation to precursors and similar concepts. It is suggested that "gamified" applications provide insight into novel, <i>gameful</i> phenomena complementary to playful phenomena. Based on our research, we propose a definition of "gamification" as <i>the use of game design elements in non-game contexts</i>.MindTrek02017-09-06T01:55:37.0867241212017-09-06T01:55:37.086724121<EFBFBD>f<EFBFBD>/
q<02>cEEAuthoritative Sources in a Hyperlinked Environment<07>The network structure of a hyperlinked environment can be a rich source of information about the content of the environment, provided we have effective means for understanding it. We develop a set of algorithmic tools for extracting information from the link structures of such environments, and report on experiments that demonstrate their effectiveness in a variety of context on the World Wide Web. The central issue we address within our framework is the distillation of broad search topics, through the discovery of &#8220;authorative&#8221; information sources on such topics. We propose and test an algorithmic formulation of the notion of authority, based on the relationship between a set of relevant authoritative pages and the set of &#8220;hub pages&#8221; that join them together in the link structure. Our formulation has connections to the eigenvectors of certain matrices associated with the link graph; these connections in turn motivate additional heuristrics for link-based analysis.SODA02017-09-06T01:55:36.012632082017-09-06T01:55:36.01263208<EFBFBD>U<EFBFBD>. <00><02> !GGStructural asymmetries of perisylvian regions in the preterm newborn<07>During the last trimester of human pregnancy, the cerebral cortex of foetuses becomes greatly and quickly gyrified, and post-mortem studies have demonstrated that hemispheres are already asymmetric at the level of Heschl gyrus, planum temporale and superior temporal sulcus (STS). Recently, magnetic resonance imaging (MRI) and dedicated post-processing tools enabled the quantitative study of brain development non-invasively in the preterm newborn. However, previous investigations were conducted either over the whole brain or in specific sulci. These approaches may consequently fail to highlight most cerebral sites, where anatomical landmarks are hard to delineate among individuals. In this cross-sectional study, we aimed to blindly and automatically map early asymmetries over the immature cortex. Voxel-based analyses of cortical and white matter masks were performed over a group of 25 newborns from 26 to 36 weeks of gestational age. Inter-individual variations associated with increasing age were first detected in large cerebral regions, with a prevalence of the right hemisphere in comparison with the left. Asymmetries were further highlighted in three specific cortical regions. Confirming previous studies, we observed deeper STS on the right side and larger posterior region of the sylvian fissure on the left side, close to planum temporale. For the first time, we also detected larger anterior region of the sylvian fissure on the left side, close to Broca's region. This study demonstrated that perisylvian regions are the only regions to be asymmetric from early on, suggesting their anatomical specificity for the emergence of functional lateralization in language processing prior to language exposure.NeuroImage02017-09-06T01:55:34.3604809572017-09-06T01:55:34.360480957 <02> #p<06><05><02><00>[<5B>5
M<02>S/GGProcedural modeling of buildings<07><i>CGA shape</i>, a novel shape grammar for the procedural modeling of CG architecture, produces building shells with high visual quality and geometric detail. It produces extensive architectural models for computer games and movies, at low cost. Context sensitive shape rules allow the user to specify interactions between the entities of the hierarchical shape descriptions. Selected examples demonstrate solutions to previously unsolved modeling problems, especially to consistent mass modeling with volumetric shapes of arbitrary orientation. <i>CGA shape</i> is shown to efficiently generate massive urban models with unprecedented level of detail, with the virtual rebuilding of the archaeological site of Pompeii as a case in point.ACM Trans. Graph.02017-09-06T01:55:43.3260458982017-09-06T01:55:43.326045898<EFBFBD><1B>4 KqGGImmutability Changes Everything<07>We need it, we can afford it, and the time is now.CIDR02017-09-06T01:55:42.2353500982017-09-06T01:55:42.235350098<EFBFBD>V<EFBFBD>3
q<02>1#GGA few useful things to know about machine learning<07>Tapping into the "folk knowledge" needed to advance machine learning applications.Commun. ACM02017-09-06T01:55:40.6787890622017-09-06T01:55:40.678789062<EFBFBD>/<2F>2
5<02>-GGIDF for Word N-grams<07>Inverse Document Frequency (IDF) is widely accepted term weighting scheme whose robustness is supported by many theoretical justifications. However, applying IDF to word N-grams (or simply N-grams) of any length without relying on heuristics has remained a challenging issue. This article describes a theoretical extension of IDF to handle N-grams. First, we elucidate the theoretical relationship between IDF and information distance, a universal metric defined by the Kolmogorov complexity. Based on our understanding of this relationship, we propose N-gram IDF, a new IDF family that gives fair weights to words and phrases of any length. Based only on the magnitude relation of N-gram IDF weights, dominant N-grams among overlapping N-grams can be determined. We also propose an efficient method to compute the N-gram IDF weights of all N-grams by leveraging the enhanced suffix array and wavelet tree. Because the exact computation of N-gram IDF provably requires significant computational cost, we modify it to a fast approximation method that can estimate weight errors analytically and maintain application-level performance. Empirical evaluations with unsupervised/supervised key term extraction and web search query segmentation with various experimental settings demonstrate the robustness and language-independent nature of the proposed N-gram IDF.TOIS02017-09-06T01:55:39.4354299322017-09-06T01:55:39.435429932<EFBFBD>Y<EFBFBD>1
{<02>C GGCassandra A Decentralized Structured Storage System<07>Cassandra is a distributed database bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model. It is highly scalable both in terms of storage volume and request throughput while not being subject to any single point of failure. This paper presents an architectural overview of Cassandra and also discusses how its design is founded in fundamental principles of distributed systems. Some practical applications that use Cassandra are also listed. This paper also presents why Cassandra may not be a good choice for some applications by highlighting its limitations.02017-09-06T01:55:38.6244309082017-09-06T01:55:38.624430908 <03> ` q<03><00>1<EFBFBD>8
c<02>GGSafety Verification of Deep Neural Networks<07>Deep neural networks have achieved impressive experimental results in image classification, but can surprisingly be unstable with respect to adver-sarial perturbations, that is, minimal changes to the input image that cause the network to misclassify it. With potential applications including perception modules and end-to-end controllers for self-driving cars, this raises concerns about their safety. We develop the first SMT-based automated verification framework for feed-forward multi-layer neural networks that works directly with the code of the network, exploring it layer by layer. We define safety for a region around a data point in a given layer by requiring that all points in the region are assigned the same class label. Working with a notion of a manipulation, a mapping between points that intuitively corresponds to a modification of an image, we employ discretisation to enable exhaustive search of the region. Our method can guarantee that adversarial examples are found for the given region and set of manipulations. If found, adversarial examples can be shown to human testers and/or used to fine-tune the network, and otherwise the network is declared safe for the given parameters. We implement the techniques using Z3 and evaluate them on state-of-the-art networks, including regularised and deep learning networks.CAV02017-09-06T01:55:47.0800400392017-09-06T01:55:47.080040039<EFBFBD>k<EFBFBD>7
_<02>}EEUncovering network tarpits with degreaser<07>Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this work, we develop <i>degreaser</i>, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating our tool in a controlled environment, we use <i>degreaser</i> to perform an Internet-wide scan. We discover tarpits of non-trivial size in the wild (prefixes as large as/16), and characterize their distribution and behavior. We then show how tarpits pollute existing network measurement surveys that are tarpit-na&#239;ve, e.g. Internet census data, and how <i>degreaser</i> can improve the accuracy of such surveys. Lastly, our findings suggest several ways in which to advance the realism of current network tarpits, thereby raising the bar on tarpits as an operational security mechanism.ACSAC02017-09-06T01:55:46.113357912017-09-06T01:55:46.11335791<EFBFBD><1C>6 <00><02>7EEThe Space Complexity of Approximating the Frequency Moments<07>The frequency moments of a sequence containing m i elements of type i, for 1 ≤ i ≤ n, are the numbers F k = n i=1 m k i. We consider the space complexity of randomized algorithms that approximate the numbers F k , when the elements of the sequence are given one by one and cannot be stored. Surprisingly, it turns out that the numbers F 0 , F 1 and F 2 can be approximated in logarithmic space, whereas the approximation of F k for k ≥ 6 requires n Ω(1) space. Applications to data bases are mentioned as well.J. Comput. Syst. Sci.02017-09-06T01:55:44.838385012017-09-06T01:55:44.83838501 <03> UI<03><00>i<EFBFBD>; <00><02>5GGEfficient reconciliation and flow control for anti-entropy protocols<07>The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols.LADIS '0802017-09-06T01:55:50.6091459962017-09-06T01:55:50.609145996<EFBFBD><08>:
o<02> -GGAn improved illumination model for shaded display<07>To accurately render a scene, global illumination information that affects the intensity of each pixel of the image must be known at the time the intensity is calculated. In a simplified form, this information is stored in a tree of &#8220;rays&#8221; extending from the viewer to the first surface encountered and from there to other surfaces and to the light sources. The visible surface algorithm creates this tree for each pixel of the display and passes it to the shader. The shader then traverses the tree to determine the intensity of the light received by the viewer. Consideration of all of these factors allows the shader to accurately simulate true reflection, shadows, and refraction as well as the effects simulated by conventional shaders. Anti-aliasing is included as an integral part of the visibility calculations. Surfaces displayed include curved as well as polygonal surfaces.SIGGRAPH Courses02017-09-06T01:55:49.6819560552017-09-06T01:55:49.681956055<EFBFBD>'<27>9 <00> <02>?GGThe Join Calculus: A Language for Distributed Mobile Programming<07>In these notes, we give an overview of the join calculus, its semantics, and its equational theory. The join calculus is a language that models distributed and mobile programming. It is characterized by an explicit notion of locality, a strict adherence to local synchronization, and a direct embedding of the ML programming language. The join calculus is used as the basis for several distributed languages and implementations, such as JoCaml and functional nets. Local synchronization means that messages always travel to a set destination , and can interact only after they reach that destination; this is required for an efficient implementation. Specifically, the join calculus uses ML's function bindings and pattern-matching on messages to program these synchronizations in a declarative manner. Formally, the language owes much to concurrency theory, which provides a strong basis for stating and proving the properties of asynchronous programs. Because of several remarkable identities, the theory of process equivalences admits simplifications when applied to the join calculus. We prove several of these identities, and argue that equivalences for the join calculus can be rationally organized into a five-tiered hierarchy, with some trade-off between expressiveness and proof techniques. We describe the mobility extensions of the core calculus, which allow the programming of agent creation and migration. We briefly present how the calculus has been extended to model distributed failures on the one hand, and cryptographic protocols on the other.APPSEM02017-09-06T01:55:48.4500720212017-09-06T01:55:48.450072021 {
<EFBFBD><05>{<00>8<EFBFBD>>
M<02>mOGGTop 10 algorithms in data mining<07>This paper presents the top 10 data mining algorithms identified by the IEEE International Conference on Data Mining (ICDM) in December 2006: C4.5, k-Means, SVM, Apriori, EM, PageRank, AdaBoost, kNN, Naive Bayes, and CART. These top 10 algorithms are among the most influential data mining algorithms in the research community. With each algorithm, we provide a description of the algorithm, discuss the impact of the algorithm, and review current and further research on the algorithm. These 10 algorithms cover classification, clustering, statistical learning, association analysis, and link mining, which are all among the most important topics in data mining research and development.Knowledge and Information Systems02017-09-06T01:55:55.5781979982017-09-06T01:55:55.578197998<EFBFBD>y<EFBFBD>= <00><02>YEEA comparison of software and hardware techniques for x86 virtualization<07>Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization. Virtual Machine Monitors for x86, such as VMware &#174; Workstation and Virtual PC, have instead used binary translation of the guest kernel code. However, both Intel and AMD have now introduced architectural extensions to support classical virtualization.We compare an existing software VMM with a new VMM designed for the emerging hardware support. Surprisingly, the hardware VMM often suffers lower performance than the pure software VMM. To determine why, we study architecture-level events such as page table updates, context switches and I/O, and find their costs vastly different among native, software VMM and hardware VMM execution.We find that the hardware support fails to provide an unambiguous performance advantage for two primary reasons: first, it offers no support for MMU virtualization; second, it fails to co-exist with existing software techniques for MMU virtualization. We look ahead to emerging techniques for addressing this MMU virtualization problem in the context of hardware-assisted virtualization.ASPLOS02017-09-06T01:55:54.033260012017-09-06T01:55:54.03326001<EFBFBD>H<EFBFBD>< <00>A<02>KGGMoviPill: improving medication compliance for elders using a mobile persuasive social game<07>Medication compliance is a critical component in the success of any medical treatment. However, only 50% of patients correctly adhere to their prescription regimens. Mobile and ubiquitous technologies have been proposed to tackle this challenge, mainly in the form of memory aid solutions that remind patients to take their pills. However, most of these methods do not <i>engage</i> patients in shifting their behavior towards better compliance. In this paper, we propose and evaluate a mobile phone-based game called <i>MoviPill</i> that persuades patients to be more adherent to their medication prescription by means of social competition. In a 6-week user study conducted with 18 elders, the use of <i>MoviPill</i> improved both their compliance to take the daily medication and also the accuracy of the drug intake time according to the prescribed time. Moreover, the improvement in the latter increased from 43% to 56% when we considered only participants that had any interest in games, which reveals the importance of applying persuasive techniques in a personalized manner. We conclude with a set of implications for the design of persuasive mobile solutions in this domain.UbiComp02017-09-06T01:55:51.6195959472017-09-06T01:55:51.619595947 j<00><0F><0F><0F><0F>lG% <0E><0E><0E>yZ: <0A> <0A> <0A> } Q .  <0C> <0C> <0C> h H  <0B> <0B> <0B> { [ ? 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
l
F
 <09> <09> <09> <09> g C <08><08><08><08>l><07><07><07><07>W2 <06><06><06>{S-<05><05><05><05>d/<04><04><04>yW;<03><03><03><03>uW$<02><02><02>iC!<01><01><01><01>q?!<00><19>! Jeff ShuteJeffShute<1B># Juho HamariJuhoHamari<1B># Kai HuotariKaiHuotari/<2F>7% Massimiliano GiacominMassimilianoGiacomin#<23>+ Martin CaminadaMartinCaminada<1F>~' Pietro BaroniPietroBaroni<1B>}# Philip ShaoPhilipShao<1F>|' Shu-Chun WengShu-ChunWeng%<25>{- Thaddeus DiamondThaddeusDiamond<1F>z' John PetersonJohnPeterson#<23>y+ Antony CourtneyAntonyCourtney!<21>x) Henrik NilssonHenrikNilsson%<25>w- Brianna SatinoffBriannaSatinoff.<2E>v7#Jordan L. Boyd-GraberJordanL.Boyd-Graber<19>u! Yuening HuYueningHu<1F>t' Mike SharplesMikeSharples0<73>s9Rafael Pérez Y PérezRafaelPérez YPérez<1B>r# Salim VirjiSalimVirji<19>q! Marc LevoyMarcLevoy<1D>p% Jongmin BaekJongminBaek<1D>o% David JacobsDavidJacobs)<29>n1 Alexandre KarpenkoAlexandreKarpenko<1D>m% Angelo PradoAngeloPrado<1B>l# Neal HarrisNealHarris<19>k! Yoel GluckYoelGluck<1F>j' Andrew TurpinAndrewTurpin$<24>i-William F. SmythWilliamF.Smyth$<24>h-Simon J. PuglisiSimonJ.Puglisi#<23>g+ Antoine BossardAntoineBossard<1F>f' Andrew TuckerAndrewTucker<1D>e% Daniel PriceDanielPrice2<65>d;#Christos T. KaramanolisChristosT.Karamanolis(<28>c1Alistair C. VeitchAlistairC.Veitch<1E>b'Mehul A. ShahMehulA.Shah<1F>a' Arif MerchantArifMerchant(<28>`1Marcos K. AguileraMarcosK.Aguilera-<2D>_5 'Daniel Winograd-CortDanielWinograd-Cort#<23>^+ Joshua RedstoneJoshuaRedstone%<25>]- Robert GriesemerRobertGriesemer.<2E>\7Tushar Deepak ChandraTusharDeepakChandra<1B>[# Edwin BradyEdwinBrady<1B>Z# Luís DamasLuísDamas!<21>Y) Steffen GrarupSteffenGrarup#<23>X+ Jacob SeligmannJacobSeligmann"<22>W+David R. KargerDavidR.Karger&<26>V/Robert N M WatsonRobertN MWatson'<27>U/% Poul-Henning KampPoul-HenningKamp#<23>T+ Takuya KatayamaTakuyaKatayama<19>S! Rami YaredRamiYared!<21>R) Xavier DéfagoXavierDéfago+<2B>Q3 #Naohiro HayashibaraNaohiroHayashibara+<2B>P3 !Grzegorz CzajkowskiGrzegorzCzajkowski<1B>O# Naty LeiserNatyLeiser<17>N Ilan HornIlanHorn$<24>M-James C. DehnertJamesC.Dehnert <20>L)Aart J. C. BikAartJ. C.Bik(<28>K1Matthew H. AusternMatthewH.Austern'<27>J/ Grzegorz MalewiczGrzegorzMalewicz!<21>I) Ryan CulpepperRyanCulpepper$<24>H-David S. JohnsonDavidS.Johnson"<22>G+James T. KajiyaJamesT.Kajiya<1F>F' Michael WelzlMichaelWelzl<1D>E% Gareth TysonGarethTyson#<23>D+ Yehia El-KhatibYehiaEl-Khatib(<28>C1Kathrin M. GerlingKathrinM.Gerling#<23>B+ !Theo VassilakisTheoVassilakis<1B>A# Matt ToltonMattTolton%<25>@- !Shiva ShivakumarShivaShivakumar!<21>?) Geoffrey RomerGeoffreyRomer <20>>)Jing Jing LongJingJingLong!<21>=) Andrey GubarevAndreyGubarev<1F><' Sergey MelnikSergeyMelnik<19>;! Walid TahaWalidTaha<1D>:% Zhanyong WanZhanyongWan&<26>9/Friedrich M. WahlFriedrichM.Wahl#<23>8+ Torsten KrögerTorstenKröger$<24>7-Edward J. RykielEdwardJ.Rykiel&<26>6/Jeannette M. WingJeannetteM.Wing+<2B>53 +Sam Tobin-HochstadtSamTobin-Hochstadt<1D>4% Rowan DaviesRowanDavies7<73>3? /Ambrose Bonnaire-SergeantAmbroseBonnaire-Sergeant<1F>2' Jon CrowcroftJonCrowcroft<1D>1% Steven SmithStevenSmith'<27>0/ !Thomas GazagnaireThomasGazagnaire<1D>/% Balraj SinghBalrajSingh <20>.)David J. ScottDavidJ.Scott)<29>-1# Charalampos RotsosCharalamposRotsos#<23>,+ Richard MortierRichardMortier'<27>+/ %Anil MadhavapeddyAnilMadhavapeddy<1F>*' Dan SteinbergDanSteinberg<1E>)'David J. HandDavidJ.Hand'<27>(/ Michael SteinbachMichaelSteinbach<1D>'% Zhi-Hua ZhouZhi-HuaZhou<1C>&%Philip S. YuPhilipS.Yu<15>% Bing LiuBingLiu <20>$)Angus F. M. NgAngusF. M.Ng.<2E>#7Geoffrey J. MclachlanGeoffreyJ.Mclachlan!<21>") Hiroshi MotodaHiroshiMotoda<19>!! Qiang YangQiangYang<1F> ' Joydeep GhoshJoydeepGhosh"<22>+J. Ross QuinlanJ.RossQuinlan<1B># Vipin KumarVipinKumar<19>! Xindong WuXindongWu<19>! Ole AgesenOleAgesen<1B># Keith AdamsKeithAdams<1D>% Nuria OliverNuriaOliver <00> <0B><00>
U<02>+GGPractical Optional Types for Clojure<07>Typed Clojure is an optional type system for Clojure, a dynamic language in the Lisp family that targets the JVM. Typed Clojure's type system build on the design of Typed Racket, repurposing in particular occurrence typing, an approach to statically reasoning about predicate tests. However, in adapting the type system to Clo-jure, changes and extensions are required to accommodate additional language features and idioms used by Clojure programmers. In this paper, we describe Typed Clojure and present these type system extensions, focusing on three features widely used in Clo-jure. First, Java interoperability is central to Clojure's mission but introduces challenges such as ubiquitous null; Typed Clojure handles Java interoperability while ensuring the absence of null-pointer exceptions in typed programs. Second, Clojure programmers idiomatically use immutable dictionaries for data structures; Typed Clojure handles this in the type system with multiple forms of heterogeneous dictionary types. Third, multimethods provide extensi-ble operations, and their Clojure semantics turns out to have a surprising synergy with the underlying occurrence typing framework. We provide a formal model of the Typed Clojure type system incorporating these and other features, with a proof of soundness. Additionally, Typed Clojure is now in use by numerous corporations and developers working with Clojure, and we report on experience with the system and its lessons for the future. The popularity of dynamically-typed languages in software development , combined with a recognition that types often improve programmer productivity, software reliability, and performance, has led to the recent development of a wide variety of optional and gradual type systems aimed at checking existing programs written in existing languages. These include Microsoft's TypeScript for JavaScript, Facebook's Hack for PHP and Flow for JavaScript, and MyPy for Python among the optional systems, and Typed Racket, Reticulated Python, and GradualTalk among gradually-typed systems. 1 One key lesson of these systems, indeed a lesson known to early developers of optional type systems such as StrongTalk, is that type systems for existing languages must be designed to work with the features and idioms of the target language. Often this takes the form of a core language, be it of functions or classes and objects, together with extensions to handle distinctive language features. We synthesize these lessons to present Typed Clojure, an optional type system for Clojure. Typed Clojure builds on the core type checking approach of Typed Racket, an existing gradual type system for Racket. However, Typed Clojure extends …ESOP02017-09-06T01:55:59.7286818852017-09-06T01:55:59.728681885<EFBFBD>d<EFBFBD>?
s<02>UGGUnikernels: library operating systems for the cloud<07>We present <i>unikernels</i>, a new approach to deploying cloud services via applications written in high-level source code. Unikernels are single-purpose appliances that are compile-time specialised into standalone kernels, and sealed against modification when deployed to a cloud platform. In return they offer significant reduction in image sizes, improved efficiency and security, and should reduce operational costs. Our Mirage prototype compiles OCaml code into unikernels that run on commodity clouds and offer an order of magnitude reduction in code size without significant performance penalty. The architecture combines static type-safety with a single address-space layout that can be made immutable via a hypervisor extension. Mirage contributes a suite of type-safe protocol libraries, and our results demonstrate that the hypervisor is a platform that overcomes the hardware compatibility issues that have made past library operating systems impractical to deploy in the real-world.ASPLOS02017-09-06T01:55:57.6622260742017-09-06T01:55:57.662226074
<00><01><0F><0F><0F><0F><0F><0F><02><0F><0F>shT@/<0E><0E><0E><0E><0E><0E><0E><0E>sdXM8&<08> <0A> <0A> <0A> <0A><08> <0A> <0A> <0A><02> n ^ K<01><02> 4  <0C><02> <0C> <0C> <0C> <0C><08> <0C> } c<02> N 3 
<0B>y<08> <0B><02><01> <0B> <0B> <0B> <0B> t f W E 1<02> ! 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>n
o
S<01>
D
1

<09> <09> <09> <09> <09> <09> { eT S 8 #h  <08><08>Y?8$<07><07><07><07><07><07>xl\M>2! <06><06><06><06><06><06><06><06><06>odUI4#<05><05><05><05><01><05><05>xgVB.<04><04><04><04><04><04><04>hQ;/<03><03><03><03><03><03><03>xiWA33Jeroen Van De Graaf<05>%John Maloney<05>'Kathrin Peter<05>!James Lang<05>)K. Mani Chandy<05> CJ. Octavio Gutierrez-Garcia<05> CJosé A. Ruipérez Valiente<05>+Joshua J. Bloch<05>1John K. Ousterhout<05>%Jinliang Fan<05>%Jeremy Elson<05>-Jean-Michel Leon<05>%James Larson<05>%J. J. Furman<05>-James C. Corbett<05>#Jason Baker<05>)James B. Orlin<05>)Jeroen Beltman<05> L. Tomé<03>-L. Taberna-Arana<04>%L. SydorchukWL. Santos<03>'L. Sandulescu* L. Micu<03> L. MiaoS%L. Macconell{+L. M. Van Driel<04>-L. M. Sconfienza) L. Huang<04>1L. Carlo Pescatori"#L M Adleman<02>-Kyle Littlefield<02> Kun Renl/Kornilios KourtisY/Koray Kavukcuoglu<02>5Konstantinos Sagonas/%Konrad Slind<01>'Koen Claessen<00>+Klara Nahrstedt 'Kjell Winblad<01>!Kexin Rong)Ketaki Solanki<04>/Kenneth P. Birman<00>%Ken ThompsonV)Ken Dellapenta)Keith Playford<02>)Keith Marzullo#Keith Adams#Keir Fraser<00>)Kaya Bekiroglu<00>)Kay Ousterhout<02>3Kathryn S. Mckinley<01>1Kathrin M. GerlingC/Katherine Everitt<01>)Kate Greenwood<01>)Karl N. Levitt|'Karin Strauss<01>#Kai Huotari<02>+K. Zisimopoulos K. ZhuQK. Zachou
K. Yub)K. Van ErpecumwK. Tanaka\K. Takagi<04> K. Songf K. Ryu`-K. N. Saifullina<04>-K. Mönkemüller<04> K. Min<04> K. Lee<04> K. Koike<04>+K. KleinschmidtM#K. Ishigaki<04> K. HuhdK. Honein9K. C. KohF!Junfeng He< Jun Rao'Julien Tierny<01>5Julian Schrittwieser<02>#Juho Hamari<02>/Juha Kärkkäinen<02>#Judea Pearl<00>AJuan A. Rodríguez-Aguilar<02>'João Leitão<00>'Joydeep Ghosh 7José Orlando Pereira<00>+Joshua Redstone^)Jonathan Evans^#Jorge OrtizM%Jeffrey DeanH/Jacob Gorm HansenB#Jae-Pil Heo:'Jelani Nelson4'Jean Bourgain3'Josh Haberman<00>)Joseph A. Cruzw!Jos Warmer<00>'Jorgen ThelinG+Jorge Biolchini<00>7Jordan L. Boyd-Graberv%Jongmin Baekp-Jonathan Borwein<01>/Jonathan Bachrach<02>+Jonas PfefferleW5Jonas Braband Jensen<01>-Jon M. Kleinberg<01>!Jon Howell<00>'Jon Crowcroft2#John Wilkes)John W. Backus<02>)John Thickstun\'John PetersonzJohn Nham<02>9John M. Mellor-CrummeyX#John Larson<00>#John Hughes'John Harrison<01>-John D. Lafferty+John Cieslewicz<02>+John C. Collins<00>)Joe Yue-Hei Ng<01>'Joe Armstrongx3Joan Morris Dimicco*!Jinyang Li)Jing Jing Long>%Jimmy Cleary Jim Waldo<02> Jim Gray<01>#Jetse Goris)Jessica Dubois<01>1Jesper Wilhelmsson0/Jerome H. SaltzerQ3Jerome C. Yochelson>9Jennifer Thom-Santelli(!Jeff Shute<02>%Jeff Bonwick<00>/Jeannette M. Wing69Jean-Pierre E N Pierie+Jean-Paul Haton<01>5Jean-Francois Mangin<01>AJean-Christophe Filliâtre<02>)Jean E. Sammet<02>3Jayanthkumar Kannan<01>'Jayadev Misra<00>%Jay Mccarthyf Jay Kreps!Jan Lahoda'Jamie Shotton<00>+James T. KajiyaG/James R. Hamilton'James Kennedy!James Gips:-James C. DehnertM)James Bornholt<01>-James B. Rothnie<02>+James A. Landay<01>%Jade Alglave 'Jacques Kleinc+Jacob SeligmannX)Jacob R. Lorch<00>+Jacob M. Taylor%Jacob Albers<02>-J.michael Ashley'
J. Ye<03> J. YanTJ. W. Lee<04>J. Velosa<03>/J. Strother Moore<01>+J. Ross Quinlan!J. Roseira<03> J. Reis<03>J. Regular!J. PrakashG J. Pinho<03> J. Park<04>+J. P. H. Drenth<03>+J. P. Gutierrez<04>%J. P. BarkerJ)J. M. Ferreira)J. M. Alustiza<03>
J. Li<04>J. Karner<03>J. K. Ryu<04>J. K. Lee<04>+J. I. Emparanza<03> J. Hajal4!J. H. Yoon<04>J. H. Son<04>J. H. LeeEJ. H. Han<04>  <0B><07><00><1A>C
u<02>O EETesting ecological models: the meaning of validation<07>The ecological literature reveals considerable confusion about the meaning of validation in the context of simulation models. The confusion arises as much from semantic and philosophical considerations as from the selection of validation procedures. Validation is not a procedure for testing scientific theory or for certifying the 'truth' of current scientific understanding, nor is it a required activity of every modelling project. Validation means that a model is acceptable for its intended use because it meets specified performance requirements. Before validation is undertaken, (1) the purpose of the model, (2) the performance criteria, and (3) the model context must be specified. The validation process can be decomposed into several components: (1) operation, (2) theory, and (3) data. Important concepts needed to understand the model evaluation process are verification, calibration, validation, credibility, and qualification. These terms are defined in a limited technical sense applicable to the evaluation of simulation models, and not as general philosophical concepts. Different tests and standards are applied to the operational, theoretical, and data components. The operational and data components can be validated; the theoretical component cannot. The most common problem with ecological and environmental models is failure to state what the validation criteria are. Criteria must be explicitly stated because there are no universal standards for selecting what test procedures or criteria to use for validation. A test based on comparison of simulated versus observed data is generally included whenever possible. Because the objective and subjective components of validation are not mutually exclusive, disagreements over the meaning of validation can only be resolved by establishing a convention.02017-09-06T01:56:03.385377932017-09-06T01:56:03.38537793<EFBFBD>:<3A>B
i<02> GGLarge-Scale Newscast Computing on the Internet<07>This paper introduces the newscast model of computation for large-scale computing on the Internet. The engine realizing this model is a lazy fully distributed information propagation protocol among the participants which is responsible for membership management and communication. It maintains a constantly changing communication graph over the participants. This graph has useful emergent properties like small diameter and sufficiently random structure without deploying special purpose protocols to achieve these properties. For adding a new participant only the address of an arbitrary member is needed and for removal no action is necessary. We provide theoretical and empirical evidence that—besides being simple and lightweight—our newscast computing engine is extremely scalable and robust. We also suggest some interesting application areas including information dissemination, monitoring of large systems, resource sharing and efficient multi-casting.02017-09-06T01:56:02.2016940922017-09-06T01:56:02.201694092<EFBFBD><0F>A <00> <02>_KGGLinearizability: A Correctness Condition for Concurrent Objects<07>A concurrent object is a data object shared by concurrent processes. Linearizability is a correctness condition for concurrent objects that exploits the semantics of abstract data types. It permits a high degree of concurrency, yet it permits programmers to specify and reason about concurrent objects using known techniques from the sequential domain. Linearizability provides the illusion that each operation applied by concurrent processes takes effect instantaneously at some point between its invocation and its response, implying that the meaning of a concurrent object's operations can be given by pre- and post-conditions. This paper defines linearizability, compares it to other correctness conditions, presents and demonstrates a method for proving the correctness of implementations, and shows how to reason about concurrent objects, given they are linearizable.ACM Trans. Program. Lang. Syst.02017-09-06T01:56:01.1952080082017-09-06T01:56:01.195208008 P ?P<00>k<EFBFBD>E
'<02>3GGReal-Time FRP<07>Functional reactive programming (FRP) is a declarative programming paradigm where the basic notions are continuous, time-varying behaviors and discrete, event-based reactivity. FRP has been used successfully in many reactive programming domains such as animation, robotics, and graphical user interfaces. The success of FRP in these domains encourages us to consider its use in real-time applications, where it is crucial that the cost of running a program be bounded and known before run-time. But previous work on the semantics and implementation of FRP was not explicitly concerned about the issues of cost. In fact, the resource consumption of FRP programs in the current implementation is often hard to predict. As a first step towards addressing these concerns, this paper presents real-time FRP (RT-FRP), a statically-typed language where the time and space cost of each execution step for a given program is statically bounded. To take advantage of existing work on languages with bounded resources, we split RT-FRP into two parts: a reactive part that captures the essential ingredients of FRP programs, and a base language part that can be instantiated to any generic programming language that has been shown to be terminating and resource-bounded. This allows us to focus on the issues specific to RT-FRP, namely, two forms of recursion. After presenting the operational explanation of what can go wrong due to the presence of recursion, we show how the typed version of the language is terminating and resource-bounded. Most of our FRP programs are expressible directly in RT. The rest are expressible via a simple mechanism that integrates RT-FRP with the base language.ICFP02017-09-06T01:56:05.2282849122017-09-06T01:56:05.228284912<EFBFBD>=<3D>D <00>G<02>GGGOnline Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Events<07>This paper introduces a new method for motion-trajectory generation of mechanical systems with multiple degrees of freedom (DOFs). The key feature of this new concept is that motion trajectories are generated online, i.e., within every control cycle, typically every millisecond. This enables systems to react instantaneously to unforeseen and unpredictable (sensor) events at any time instant and in any state of motion. As a consequence, (multi)sensor integration in robotics, in particular the development of control systems enabling sensor-guided and sensor-guarded motions, becomes greatly simplified. We introduce a class of online trajectory-generation algorithms and present the mathematical basics of this new approach. The algorithms presented here consist of three steps: calculation of the minimum synchronization time for all DOFs, synchronization of all DOFs, and calculation of output values. The theory is followed by real-world experimental results indicating new possibilities in robot-motion control.IEEE Transactions on Robotics02017-09-06T01:56:04.2270510252017-09-06T01:56:04.227051025 <00> ?Y<00><00>a<EFBFBD>I
U<02>CKCCCan SPDY really make the web faster?<07>HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with such a proposal that has growing community acceptance, especially after being adopted by the IETF HTTPbis-WG as the basis for HTTP/2.0. SPDY has the potential to greatly improve web experience with little deployment overhead, but we still lack an understanding of its true potential in different environments. This paper offers a comprehensive evaluation of SPDY's performance using extensive experiments. We identify the impact of network characteristics and website infrastructure on SPDY's potential page loading benefits, finding that these factors are decisive for an optimal SPDY deployment strategy. Through exploring such key aspects that affect SPDY, and accordingly HTTP/2.0, we feed into the wider debate regarding the impact of future protocols.2014 IFIP Networking Conference02017-09-06T01:56:08.80234792017-09-06T01:56:08.8023479<EFBFBD>F<EFBFBD>H <00><02> EEExploring the Potential of Gamification Among Frail Elderly Persons<07>The application of game elements a in non-gaming context offers a great potential regarding the engagement of senior citizens with information systems. In this paper, we suggest the application of gamification to routine tasks and leisure activities, namely physical and cognitive therapy, the gamification of real-life activities which are no longer accessible due to age-related changes and the application of game design elements to foster social interaction. Furthermore, we point out important chances and challenges such as the lack of gaming experience among the target audience and highlight possible areas for future work which offer valuable design opportunities for frail elderly audiences.02017-09-06T01:56:07.905622072017-09-06T01:56:07.90562207<EFBFBD>b<EFBFBD>G
q<02>UGGDremel: Interactive Analysis of Web-Scale Datasets<07>Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables in seconds. The system scales to thousands of CPUs and petabytes of data, and has thousands of users at Google. In this paper, we describe the architecture and implementation of Dremel, and explain how it complements MapReduce-based computing. We present a novel columnar storage representation for nested records and discuss experiments on few-thousand node instances of the system.PVLDB02017-09-06T01:56:06.8194919432017-09-06T01:56:06.819491943<EFBFBD>=<3D>F
[<02>+ GGElm: Concurrent FRP for Functional GUIs<07>Graphical user interfaces (GUIs) mediate almost all of our interactions with computers, whether it is through web pages, phone apps, or desktop applications. Functional Reactive Programming (FRP) is a promising approach to GUI design. This thesis presents Elm, a concurrent FRP language focused on easily creating responsive GUIs. Elm has two major features: (1) purely functional graphical layout and (2) support for Concurrent FRP. Purely functional graphical layout is a high level framework for working with complex visual components. It makes it quick and easy to create and combine text, images, and video into rich multimedia displays. Concurrent FRP solves some of FRP's long-standing efficiency problems: global delays and needless recomputation. Together, Elm's two major features simplify the complicated task of creating responsive and usable graphical user interfaces. This thesis also includes a fully functional compiler for Elm, available at elm-lang.org. This site includes an interactive code editor that allows you to write and compile Elm programs online with no download or install.02017-09-06T01:56:06.0003701172017-09-06T01:56:06.000370117 <<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|qf[PE:/$<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>uj_TI>3( <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> | q f [ P E : / $    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> w l a V K @ 5 *   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> | q g \ Q F ; 0 %   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
l
a
V
K
@
5
*


<09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> z o d Y N C 8 - "  <08><08><08><08><08><08><08><08><08><08><08>}rh]RG<1&<07><07><07><07><07><07><07><07><07><07><07><07>zodYNC8-" <06><06><06><06><06><06><06><06><06><06><06>~sh]RG<1&<05><05><05><05><05><05><05><05><05><05><05><05>xndYNC8-" <04><04><04><04><04><04><04><04><04><04><04>~sh]RG<1&<03><03><03><03><03><03><03><03><03><03><03><03>wlaVLA6+ 
<02><02><02><02><02><02><02><02><02><02><02><02><08>i<01><08>hC<08>gB<08>fA<08>e,<08>d@<08>c?<08>b><08>a=<08>`<<08>_;<08>^:<08>]9<08>\8<08>[7<08>Z6<08>Y5<08>X<02><07>W<08>V4 <08>U3 <08>T! <08>S2 <08>R1 <07>QZ <08>P<02> <08>OJ <08>N0 <08>MH <08>L/ <08>K. <08>J- <08>I, <08>H+ <08>G*
<08>F)
<08>E(
<08>D'<08>C&<08>B%<08>A$<08>@#<08>?"<08>><00><08>=8<08><!<08>; <08>:<00><08>9<08>8<08>7<08>6<08>5<08>4Y<08>3<08>2<08>1<08>0<07>/Z<08>.<08>-<08>,<08>+<08>*<08>)<08>(<08>'<07>&_<07>%
<07>$<08>#<07>"E<08>!<08>  <08> <08> <08>
<08><02><00><08><02><00><08> <00><08><00><08><00><08><00><08><00><08><00><08><00><08><00><08><00><08><00><08><02><00><08><02><00><08><02><00><08> <02><00><08> <02><00><08> <02><00><08>
<02><00><08> <02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><07>s<00><08><02><00><08><02><00><08>~<02><00><08>}<02><00><08>|<02><00><08>{<02><00><08>z<02><00><08>yJ<00><08>x<02><00><08>w<02><00><08>v<02><00><07>u<00><08>t<02><00><08>s<02><00><08>r<01><00><08>q<02><00><07>pa<00><07>o(<00><08>n<01><00><08>m<02><00><07>l'<00><08>k<02><00><08>j<02><00><08>i<02><00><08>h<01><00><08>g<02><00><08>f<02><00><08>e<02><00><08>de<00><08>c<02><00><08>b<02><00><08>a<00><08>`p<00><07>_B<00><08>^<02><00><08>]<02><00><08>\<02><00><08>[<02><00><08>Z<02><00><08>Y<02><00><08>X<02><00><08>W<02><00><08>V<02><00><08>U<02><00><08>T<02><00><08>S<02><00><08>R<02><00><08>Q<02><00><08>P<02><00><08>O<02><00><08>N<02><00><08>M<02><00><08>L<02><00><08>K<02><00><08>J<00><08>I<02><00><08>H<02><00><08>G<02><00><08>F<02><00><08>E<02><00><08>D<02><00><08>C<00><00><08>B<02><00><08>A<02><00><08>@<02><00><08>?<02><00><08>><02><00><08>=<02><00><08><<02><00><08>;<02><00><08>:<02><00><08>9<02><00><08>8<02><00><08>7<02><00><08>6<02><00><08>5<02><00><08>4<02><00><08>3<02><00><08>2<02><00><08>1<02><00><08>0<02><00><07>/<00><08>.<02><00><08>-<02><00><08>,P<00><08>+<02><00><08>*<02><00><07>)s<00><08>(<02><00><08>'<02><00><08>&<02><00><08>%<02><00><08>$<02><00><08>#3<00><08>"<02><00><08>!<02><00><08> <02><00><08><02><00><08><02><00><08>B<00><08><02><00><08><01><00><08>y<00><07><00><08><02><00><08><02><00><08><02><00><08><02><00><07>s<00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08>t<00><07> Z<00><08> <02><00><08> L<00><08>
<02><00><08> <02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08>~<02><00><08>}<02><00><08>|<02><00><08>{<02><00><08>z<02><00><08>ym<00><08>x<02><00><08>w<02><00><08>v<02><00><07>u(<00><08>t<02><00><08>s<02><00><07>r<00><07>qS<00><08>p<00><08>o~<00><08>n}<00><08>m<00><00><08>l<00><00><08>k5<00><08>j <00><08>i<01><00><08>h|<00><08>g{<00><08>fz<00><08>ey<00><07>d<00><08>cx<00><08>bw<00><08>a|<00><07>`Z<00><08>_v<00><07>^(<00><08>]<01><00><07>\'<00><08>[u<00><08>Zt<00><08>Ys<00><08>Xr<00><08>Wq<00><08>Vp<00><08>Uo<00><08>T<01><00><08>S<00><00><08>Rn<00><08>Qm<00><07>P]<00><08>Ol<00><08>Nk<00><08>M<00><00><08>Lr<00><08>Kj<00><08>Ji<00><08>Ih<00><08>Hg<00><08>Gf<00><08>Fe<00><08>Ed<00><08>Dc<00><08>Cb<00><08>Ba<00><08>A`<00><08>@_<00><08>?^<00><08>>]<00><08>=<01><00><08><\<00><08>;[<00><08>:Z<00><08>9Y<00><08>8X<00><08>7W<00><08>6V<00><08>5<01><00><08>4U<00><08>3T<00><08>2S<00><08>1<00><08>03<00><08>/R<00><08>.Q<00> <00> <0A> <09><01><00><00><03>N
<00> GGRapidly-Exploring Random Trees: A New Tool for Path Planning<07>02017-09-06T01:56:13.9759980472017-09-06T01:56:13.975998047<EFBFBD>z<EFBFBD>M
o<02> GGPregel: a system for large-scale graph processing<07>Many practical computing problems concern large graphs. Standard examples include the Web graph and various social networks. The scale of these graphs - in some cases billions of vertices, trillions of edges - poses challenges to their efficient processing. In this paper we present a computational model suitable for this task. Programs are expressed as a sequence of iterations, in each of which a vertex can receive messages sent in the previous iteration, send messages to other vertices, and modify its own state and that of its outgoing edges or mutate graph topology. This vertex-centric approach is flexible enough to express a broad set of algorithms. The model has been designed for efficient, scalable and fault-tolerant implementation on clusters of thousands of commodity computers, and its implied synchronicity makes reasoning about programs easier. Distribution-related details are hidden behind an abstract API. The result is a framework for processing large graphs that is expressive and easy to program.PODC02017-09-06T01:56:12.7087980962017-09-06T01:56:12.708798096<EFBFBD><12>L
/<02>]1GGFortifying macros<07>Existing macro systems force programmers to make a choice between clarity of specification and robustness. If they choose clarity, they must forgo validating significant parts of the specification and thus produce low-quality language extensions. If they choose robustness, they must write in a style that mingles the implementation with the specification and therefore obscures the latter.
This paper introduces a new language for writing macros. With the new macro system, programmers naturally write robust language extensions using easy-to-understand specifications. The system translates these specifications into validators that detect misuses - including violations of context-sensitive constraints - and automatically synthesize appropriate feedback, eliminating the need for ad hoc validation code.J. Funct. Program.02017-09-06T01:56:11.6982880862017-09-06T01:56:11.698288086<EFBFBD>3<EFBFBD>K <00><02>q}GGA theoretician's guide to the experimental analysis of algorithms<07>This paper presents an informal discussion of issues that arise when one attempts to analyze algorithms experimentally. It is based on lessons learned by the author over the course of more than a decade of experimentation, survey paper writing, refereeing, and lively discussions with other experimentalists. Although written from the perspective of a theoretical computer scientist, it is intended to be of use to researchers from all fields who want to study algorithms experimentally. It has two goals: first, to provide a useful guide to new experimen-talists about how such work can best be performed and written up, and second, to challenge current researchers to think about whether their own work might be improved from a scientific point of view. With the latter purpose in mind, the author hopes that at least a few of his recommendations will be considered controversial.Data Structures, Near Neighbor Searches, and Methodology02017-09-06T01:56:10.8178979492017-09-06T01:56:10.817897949<EFBFBD>.<2E>J
9<02>GGThe rendering equation<07>We present an integral equation which generalizes a variety of known rendering algorithms. In the course of discussing a monte carlo solution we also present a new form of variance reduction, called Hierarchical sampling and give a number of elaborations shows that it may be an efficient new technique for a wide variety of monte carlo procedures. The resulting rendering algorithm extends the range of optical phenomena which can be effectively simulated.SIGGRAPH02017-09-06T01:56:09.8107419432017-09-06T01:56:09.810741943 <04><04><00> <20>O
K<02>yGGThe Φ Accrual Failure Detector<07>Detecting failures is a fundamental issue for fault-tolerance in distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, similar to IP address lookup or time synchronization. However, this has not been successful so far. One of the reasons is the difficulty to satisfy several application requirements simultaneously when using classical failure detectors. We present a novel abstraction, called accrual failure detectors, that emphasizes flexibility and expressiveness and can serve as a basic building block to implementing failure detectors in distributed systems. Instead of providing information of a boolean nature (trust vs. suspect), accrual failure detectors output a suspicion level on a continuous scale. The principal merit of this approach is that it favors a nearly complete decoupling between application requirements and the monitoring of the environment. In this paper, we describe an implementation of such an accrual failure detector, that we call the ϕ failure detector. The particularity of the ϕ failure detector is that it dynamically adjusts to current network conditions the scale on which the suspicion level is expressed. We analyzed the behavior of our ϕ failure detector over an intercontinental communication link during several days. Our experimental results show that our ϕ failure detector performs equally well as other known adaptive failure detection mechanisms, with an improved flexibility. I. INTRODUCTION It is well-known that failure detection constitutes a fundamental building block for ensuring fault tolerance in distributed systems. For this reason, many people have been advocating that failure detection should be provided as a service [1][5], similar to IP address lookup (DNS) or time synchronization (e.g., NTP). Unfortunately, in spite of important technical breakthroughs, this view has met little success so far. We believe that one of the main reasons is that the conventional boolean interaction (i.e., trust vs. suspect) makes it difficult to meet the requirements of several distributed applications running simultaneously. For this reason, we advocate a different abstraction that helps decoupling application requirements from issues related to the underlying system. It is well-known that there exists an inherent tradeoff between (1) conservative failure detection (i.e., reducing the risk of wrongly suspecting a running process), and (2) aggressive failure detection (i.e., quickly detecting the occurrence of a real crash). There exists a continuum of valid choices between these two extremes, and what defines an appropriate choice is strongly related to application requirements. …SRDS02017-09-06T01:56:15.4453100592017-09-06T01:56:15.445310059 <02> 5<04><02><00> <0A>S
i<02>5GGPrincipal Type-Schemes for Functional Programs<07>Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of its publication and date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission.POPL02017-09-06T01:56:19.1928391112017-09-06T01:56:19.192839111<EFBFBD>x<EFBFBD>R <00> <02>eGGIncremental Mature Garbage Collection Using the Train Algorithm<07>We present an implementation of the Train Algorithm, an incremental collection scheme for reclamation of mature garbage in generation-based memory management systems. To the best of our knowledge, this is the rst Train Algorithm implementation ever. Using the algorithm, the traditional mark-sweep garbage collector employed by the Mjjlner run-time system for the object-oriented BETA programming language was replaced by a non-disruptive one, with only negligible time and storage overheads.ECOOP02017-09-06T01:56:18.1567639162017-09-06T01:56:18.156763916<EFBFBD>L<EFBFBD>Q <00><02>yGGChord: A scalable peer-to-peer lookup service for internet applications<07>A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents <i>Chord</i>, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.SIGCOMM02017-09-06T01:56:17.2956269532017-09-06T01:56:17.295626953<EFBFBD>w<EFBFBD>P
U<02>% GGJails: Confining the Omnipotent Root<07>The traditional UNIX security model is simple but inexpressive. Adding fine-grained access control improvest he expressiveness, but often dramatically increases both the cost of system management and implementation complexity.I nenvironments with a more complexman-agement model, with delegation of some management functions to parties under varying degrees of trust, the base UNIX model and most natural extensions are inappropriate at best. Where multiple mutually un-trusting parties are introduced, ''inappropriate''r apidly transitions to ''nightmarish'', especially with regards to data integrity and privacy protection. The FreeBSD ''Jail''facility provides the ability to partition the operating system environment, while maintaining the simplicity of the UNIX ''root''m odel. In Jail, users with privilege find that the scope of their requests is limited to the jail, allowing system administrators to delegate management capabilities for each virtual machine environment. Creating virtual machines in this manner has manyp otential uses; the most popular thus far has been for providing virtual machine services in Internet Service Provider environments.02017-09-06T01:56:16.2038339842017-09-06T01:56:16.203833984
El<0F><0F>S<05>&<0E><02><05><0E>sZV <0A><06> <0A> <0A><04> XP<02> ,  <0C><04> <0C><06> u  <0B> <0B> t Q<07> +<03><04><01>
<EFBFBD>
<EFBFBD><07>Y
<EFBFBD>1
V<03>
<09> <09> i 4v <03><01><08>s<08>S~h<02>Ul+Ykvm: the Linux Virtual Machine Monitor<01>C<04>Warp: Lightweight Multi-Key Transactions for Key-Value Stores<01>1eTowards Equal Rights for Higher-kinded Types<01>K<04>Why Do Some Men Use Violence Against Women and How Can We Prevent It?<01>=}The Pagerank Citation Ranking: Bringing Order to the Web<01>!EThe UNIX Time-Sharing System<01>?The LCA Problem Revisited<01>B<04>ZooKeeper: Wait-free Coordination for Internet-scale SystemsxV<04>-Tiered Replication: A Cost-effective Alternative to Full Cluster Geo-replicationu'QWhy Functional Programming Mattersg,[Tor: The Second-Generation Onion Routerf*WUnderstanding RFID Counting ProtocolsX"GWarnings for pattern matchingWQ<04>#Understanding the Limitations of Causally and Totally Ordered CommunicationN@<04>Zab: High-performance broadcast for primary-backup systemsL!EThe Solovay-Kitaev algorithmI0cThe extensible neuroimaging archive toolkit>S<04>'Toward a unified theory of sparse dimensionality reduction in Euclidean space2%MThe Story of the Therac in LOTOS/@<04>Viewing Control Structures as Patterns of Passing Messages,'QThe Meaning of Employee Engagement+#IThe Early History of Smalltalk)-]Toward a cloud computing research agenda''QUEG Week 2016 Poster Presentations5mTransactional storage for geo-replicated systemsO<04>The Quest for Artificial Intelligence a History of Ideas and Achievements8sThe phase transition in inhomogeneous random graphs<{Weighted Finite-state Transducers in Speech Recognition,[f4: Facebook's Warm BLOB Storage System<00>7qThere is more consensus in Egalitarian parliaments<00>Q<04>#Transactional Client-Server Cache Consistency: Alternatives and Performance<00>F<04> Time, Clocks, and the Ordering of Events in a Distributed System<00>*WWormholes: introducing effects to FRP<00>%OXen and the art of virtualizationN&OWhy Silent Updates Boost Security<00>4mWeb page classification: Features and algorithmsF3kViewstamped Replication: A General Primary Copy 4mVL2: a scalable and flexible data center networkb1gVEWS: A Wikipedia Vandal Early Warning SystemK<04>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms<00>8sUnikernels: library operating systems for the cloud<00>5mUnicorn: A System for Searching the Social Graph<00>._Uncovering network tarpits with degreaser<00>=Two Tasty Servings of Pi<00>.aTraits: A mechanism for fine-grained reuse*X<04>3Towards a next generation data center architecture: scalability and commoditization%MTop 10 algorithms in data mining<00>"ITheory in Programming Practice5$KThe Φ Accrual Failure Detector<00>H<04>The treadmill: real-time garbage collection without motion sickness7sThe semantics of x86-CC multiprocessor machine code]Z<04>7The scalable commutativity rule: designing scalable software for multicore processorso9The rendering equation<00>/aThe operating system: should there be one?<00>A<04>The effects of video games on laparoscopic simulator skills.(SThe chemical basis of morphogenesis<00>+[The algorithmization of counterfactualsmA<04>The Space Complexity of Approximating the Frequency Moments<00>B<04>The Slab Allocator: An Object-Caching Kernel Memory AllocatorH)The Redox Codeye<04>KThe Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations<00>=The Part-Time ParliamentM<}The PageRank Citation Ranking: Bringing Order to the Web._The Moral Character of Cryptographic Work<00>F<04> The Join Calculus: A Language for Distributed Mobile Programming<00>,]The Fast Johnson-lindenstrauss Transform{6qThe Dynamic Window Approach to Collision Avoidance0F<04>The Derivative of a Regular Type is its Type of One-Hole Contexts|._The Dangers of Replication and a Solution<00> <02>
<EFBFBD><08><02><00>'<27>V
W<02>yEEWormholes: introducing effects to FRP<07>Functional reactive programming (FRP) is a useful model for programming real-time and reactive systems in which one defines a <i>signal function</i> to process a stream of input values into a stream of output values. However, performing side effects (e.g. memory mutation or input/output) in this model is tricky and typically unsafe. In previous work, Winograd-Cort et al. [2012] introduced <i>resource types</i> and <i>wormholes</i> to address this problem.
This paper better motivates, expands upon, and formalizes the notion of a wormhole to fully unlock its potential. We show, for example, that wormholes can be used to define the concept of causality. This in turn allows us to provide behaviors such as looping, a core component of most languages, without building it directly into the language. We also improve upon our previous design by making wormholes less verbose and easier to use.
To formalize the notion of a wormhole, we define an extension to the simply typed lambda calculus, complete with typing rules and operational semantics. In addition, we present a new form of semantic transition that we call a <i>temporal</i> transition to specify how an FRP program behaves over time and to allow us to better reason about causality. As our model is designed for a Haskell implementation, the semantics are lazy. Finally, with the language defined, we prove that our wormholes indeed allow side effects to be performed safely in an FRP framework.Haskell02017-09-06T01:56:21.786145022017-09-06T01:56:21.78614502<EFBFBD>l<EFBFBD>U
c<02>yGGPaxos made live: an engineering perspective<07>We describe our experience in building a fault-tolerant data-base using the Paxos consensus algorithm. Despite the existing literature in the field, building such a database proved to be non-trivial. We describe selected algorithmic and engineering problems encountered, and the solutions we found for them. Our measurements indicate that we have built a competitive system.PODC02017-09-06T01:56:21.0434160162017-09-06T01:56:21.043416016<EFBFBD>V<EFBFBD>T <00><02>EEProgramming and reasoning with algebraic effects and dependent types<07>One often cited benefit of pure functional programming is that pure code is easier to test and reason about, both formally and informally. However, real programs have side-effects including state management, exceptions and interactions with the outside world. Haskell solves this problem using <i>monads</i> to capture details of possibly side-effecting computations --- it provides monads for capturing state, I/O, exceptions, non-determinism, libraries for practical purposes such as CGI and parsing, and many others, as well as <i>monad transformers</i> for combining multiple effects.
Unfortunately, useful as monads are, they do not compose very well. Monad transformers can quickly become unwieldy when there are lots of effects to manage, leading to a temptation in larger programs to combine everything into one coarse-grained state and exception monad. In this paper I describe an alternative approach based on handling <i>algebraic effects</i>, implemented in the IDRIS programming language. I show how to describe side effecting computations, how to write programs which compose multiple fine-grained effects, and how, using dependent types, we can use this approach to reason about states in effectful programs.ICFP02017-09-06T01:56:20.242385012017-09-06T01:56:20.24238501 x ;<05><02>x|<7C>Z m GGHigh-Performance Graphics in Racket with DirectX<07>ICA3PP02017-09-06T01:56:25.4711059572017-09-06T01:56:25.471105957<EFBFBD>%<25>Y
]<02>y GGA Gossip-Style Failure Detection Service<07>Failure Detection is valuable for system management, replication, load balancing , and other distributed services. To date, Failure Detection Services scale badly in the number of members that are being monitored. This paper describes a new protocol based on gossiping that does scale well and provides timely detection. We analyze the protocol, and then extend it to discover and leverage the underlying network topology for much improved resource utilization. We then combine it with another protocol, based on broadcast, that is used to handle partition failures.02017-09-06T01:56:24.6299340822017-09-06T01:56:24.629934082<EFBFBD><17>X <00>)<02>GGSolaris Zones: Operating System Support for Consolidating Commercial Workloads<07>Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and reduce costs. Consolidation is common in mainframe environments, where technology to support running multiple workloads and even multiple operating systems on the same hardware has been evolving since the late 1960's. This technology is now becoming an important differentiator in the UNIX and Linux server market as well, both at the low end (virtual web hosting) and high end (traditional data center server consolidation). This paper introduces Solaris Zones (zones), a fully realized solution for server consolidation projects in a commercial UNIX operating system. By creating virtualized application execution environments within a single instance of the operating system, the facility strikes a unique balance between competing requirements. On the one hand, a system with multiple workloads needs to run those workloads in isolation, to ensure that applications can neither observe data from other applications nor affect their operation. It must also prevent applications from over-consuming system resources. On the other hand, the system as a whole has to be flexible, manageable, and observable, in order to reduce administrative costs and increase efficiency. By focusing on the support of multiple application environments rather than multiple operating system instances, zones meets isolation requirements without sacrificing manageability.LISA02017-09-06T01:56:23.6256608892017-09-06T01:56:23.625660889<EFBFBD>A<EFBFBD>W <00><02>K=GGSinfonia: A new paradigm for building scalable distributed systems<07>We propose a new paradigm for building scalable distributed systems. Our approach does not require dealing with message-passing protocols -- a major complication in existing distributed systems. Instead, developers just design and manipulate data structures within our service called Sinfonia. Sinfonia keeps data for applications on a set of memory nodes, each exporting a linear address space. At the core of Sinfonia is a novel minitransaction primitive that enables efficient and consistent access to data, while hiding the complexities that arise from concurrency and failures. Using Sinfonia, we implemented two very different and complex applications in a few months: a cluster file system and a group communication service. Our implementations perform well and scale to hundreds of machines.ACM Trans. Comput. Syst.02017-09-06T01:56:22.6423330082017-09-06T01:56:22.642333008 <03> e<07>e<03>
<00># GGDigital Video Stabilization and Rolling Shutter Correction using Gyroscopes<07>02017-09-06T01:56:29.3857971192017-09-06T01:56:29.385797119g<EFBFBD>] O GGBreach: Reviving the Crime Attack<07>02017-09-06T01:56:28.4013530272017-09-06T01:56:28.401353027<EFBFBD><18>\
q<02>)/GGA taxonomy of suffix array construction algorithms<07>In 1990, Manber and Myers proposed suffix arrays as a space-saving alternative to suffix trees and described the first algorithms for suffix array construction and use. Since that time, and especially in the last few years, suffix array construction algorithms have proliferated in bewildering abundance. This survey paper attempts to provide simple high-level descriptions of these numerous algorithms that highlight both their distinctive features and their commonalities, while avoiding as much as possible the complexities of implementation details. New hybrid algorithms are also described. We provide comparisons of the algorithms' worst-case time complexity and use of additional space, together with results of recent experimental test runs on many of their implementations.ACM Comput. Surv.02017-09-06T01:56:27.6287919922017-09-06T01:56:27.628791992<EFBFBD>{<7B>[
U<02>5GGModularity and Scalability in Calvin<07>Calvin is a transaction scheduling and replication management layer for distributed storage systems. By first writing transaction requests to a durable, replicated log, and then using a concurrency control mechanism that emulates a deterministic serial execution of the log's transaction requests, Calvin supports strongly consistent replication and fully ACID distributed transactions while incurring significantly lower inter-partition transaction coordination costs than traditional distributed database systems. Furthermore, Calvin's declarative specification of target concurrency-control behavior allows system components to avoid interacting with actual transaction scheduling mechanisms—whereas in traditional DBMSs, the analogous components often have to explicitly observe concurrency control modules' (highly nondeterministic) procedural behaviors in order to function correctly.IEEE Data Eng. Bull.02017-09-06T01:56:26.6358898932017-09-06T01:56:26.635889893 ;<0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|qf[PE<2'<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>yncXMB7,!  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> | q f [ P E : / $    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> u j _ T I > 3 (    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> x m b W L A 6 + 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
|
q
f
[
P
E
:
/
$


 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> u j _ T I > 3 (   <08><08><08><08><08><08><08><08><08><08><08><08>xmbWLA6+ 
<07><07><07><07><07><07><07><07><07><07><07><07>{peZOD9.# <06><06><06><06><06><06><06><06><06><06><06>~sh]RG<1&<05><05><05><05><05><05><05><05><05><05><05><05>vk`UJ?4)<04><04><04><04><04><04><04><04><04><04><04><04>yncXMB7,! <03><03><03><03><03><03><03><03><03><03><03>|qf[PE:/$<02><02><02><02><02><02><02><02><02><02><02><08>c<03><08>b<03><08>a<03><08>`<03><08>_<03><08>^<03><08>]<03><08>\<03><08>[<08>Z~<08>Y}<08>X|<08>W{<08>Vz<08>Uy<08>Tx<08>Sw<08>Rv<08>Qu<08>Pt<08>Os<08>Nr<08>Mq<08>Lp<08>Ko<08>Jn<08>Im<08>Hl<08>Gk<08>Fj<08>Ei<08>Dh<08>Cg<08>Bf<08>Ae<08>@d<08>?c<08>>b<08>=a<08><`<08>;_<08>:^<08>9]<08>8\<08>7[<08>6Z<08>5Y<08>4X<08>3W<08>2V<08>1U<08>0T<08>/S<08>.R<08>-Q<08>,P<08>+O<08>*N<08>)M<08>(L<08>'K<08>&J<08>%I<08>$H<08>#G<08>"F<08>!E<08> D<08>C<08>B<08>A<08>@<08>?<08>><08>=<08><<08>;<08>:<08>9<08>8<08>7<08>6<08>5<08>4<08>3<08>2<08> 1<08> 0<08> /<08>
.<08> -<08>,<08>+<08>*<08>)<08>(<08>'<08>&<08>%<08>$<08>#<08>~"<08>}!<08>| <08>{<08>z<08>y<08>x<08>w<08>v<08>u<08>t<08>s<08>r<08>q<08>p<08>o<08>n`<08>m<08>l<08>k<08>j<08>i<01><08>h<08>g <08>f <08>e <08>d
<08>c <08>b<08>a<08>`<08>_<08>^<08>]<08>\<08>[<08>Z<08>Y<08>X<02><08>W<02><08>V<02><08>U<02><08>T<02><08>S<02><08>R<02><08>Q<02><08>P<02><08>O<02><08>N<02> <08>M<02> <08>L<02> <08>K<01> <08>J; <08>I: <08>H<02> <08>G<02>
<08>F<02>
<08>E<02>
<08>D<02> <08>C<02> <08>B<02> <08>A<02> <08>@<02> <08>?<00><08>><02><08>=<02><08><<02><08>;<02><08>:<02><08>9<02><08>8<02><08>7<02><07>6<08>5<02><08>4<02><08>3<02><08>2<02><08>1<02><08>0<02><08>/<02><08>.<02><08>-<02><08>,<02><00><08>+<02><00><08>*<02><00><08>)<02><00><08>(|<00><08>'<02><00><08>&<02><00><08>%<02><00><08>$<00><07>#<00><08>"<02><00><08>!<02><00><08> <02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><01><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08><02><00><08>C<00><08> <02><00><08> <00><00><08> <02><00><08>
d<00><08> c<00><08>a<00><08>b<00><08><02><00><08><02><00><08>e<00><08><01><00><08><00><00><08><02><00><08><02><00><08><02><00><08>~<02><00><08>}<02><00><08>|<02><00><08>{<02><00><08>z<02><00><07>y <00><08>x<02><00><08>w<02><00><08>v<02><00><08>u<02><00><08>t<02><00><08>s<02><00><08>r<02><00><08>q<02><00><08>p<02><00><08>o<02><00><08>n<02><00><08>m<02><00><08>l<02><00><08>k<02><00><08>j<02><00><08>i<02><00><08>h<02><00><08>g<02><00><08>f<02><00><08>e<02><00><08>d<02><00><08>c<02><00><08>b<02><00><08>a<02><00><08>`<02><00><08>_<02><00><08>^<02><00><08>]<00><00><08>\<02><00><08>[<02><00><08>Z<02><00><08>Y<02><00><08>X<02><00><08>W<01><00><08>V<01><00><08>U<02><00><08>T<02><00><08>S<02><00><08>R<02><00><08>Q<02><00><08>P<02><00><08>O<02><00><08>N<02><00><08>M<02><00><08>L<02><00><08>K<02><00><08>J<02><00><08>I<02><00><08>H<02><00><08>G<02><00><08>F<02><00><08>E<02><00><08>D<02><00><08>C<02><00><08>B<00><08>A~<00><07>@n<00><08>?}<00><07>>l<00><08>=|<00><08><{<00><07>;m<00><06>: <00><08>9z<00><08>8y<00><08>7x<00><08>6w<00><08>5v<00><08>4u<00><08>3t<00><08>2s<00><08>1r<00><08>0q<00><08>/p<00><08>.o<00><08>-n<00><08>,m<00><08>+l<00><08>*k<00><08>)j<00> <01> U<08>E<01><00>l<EFBFBD>c <00><02>'/GGCalvin: fast distributed transactions for partitioned database systems<07>Many distributed storage systems achieve high data access throughput via partitioning and replication, each system with its own advantages and tradeoffs. In order to achieve high scalability, however, today's systems generally reduce transactional support, disallowing single transactions from spanning multiple partitions. Calvin is a practical transaction scheduling and data replication layer that uses a deterministic ordering guarantee to significantly reduce the normally prohibitive contention costs associated with distributed transactions. Unlike previous deterministic database system prototypes, Calvin supports disk-based storage, scales near-linearly on a cluster of commodity machines, and has no single point of failure. By replicating transaction inputs rather than effects, Calvin is also able to support multiple consistency levels---including Paxos-based strong consistency across geographically distant replicas---at no cost to transactional throughput.SIGMOD Conference02017-09-06T01:56:36.9569089362017-09-06T01:56:36.956908936<EFBFBD><0F>b <00> <02>#GGTime, Clocks, and the Ordering of Events in a Distributed System<07>The concept of one event happening before another in a distributed system is examined, and is shown to define a partial ordering of the events. A distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events. The use of the total ordering is illustrated with a method for solving synchronization problems. The algorithm is then specialized for synchronizing physical clocks, and a bound is derived on how far out of synchrony the clocks can become.Commun. ACM02017-09-06T01:56:35.4512900392017-09-06T01:56:35.451290039<EFBFBD>y<EFBFBD>a
a<02>#GGFunctional reactive programming, continued<07>Functional Reactive Programming (FRP) extends a host programming language with a notion of time flow. Arrowized FRP (AFRP) is a version of FRP embedded in Haskell based on the arrow combinators. AFRP is a powerful synchronous dataflow programming language with hybrid modeling capabilities, combining advanced synchronous dataflow features with the higher-order lazy functional abstractions of Haskell. In this paper, we describe the AFRP programming style and our Haskell-based implementation. Of particular interest are the AFRP combinators that support dynamic collections and continuation-based switching. We show how these combinators can be used to express systems with an evolving structure that are difficult to model in more traditional dataflow languages.Haskell '0202017-09-06T01:56:33.9804589842017-09-06T01:56:33.980458984<EFBFBD>'<27>`
A<02>y-GGInteractive topic modeling<07>Topic models are a useful and ubiquitous tool for understanding large corpora. However, topic models are not perfect, and for many users in computational social science, digital humanities, and information studies—who are not machine learning experts—existing models and frameworks are often a “take it or leave it” proposition. This paper presents a mechanism for giving users a voice by encoding users feedback to topic models as correlations between words into a topic model. This framework, interactive topic modeling (itm), allows untrained users to encode their feedback easily and iteratively into the topic models. Because latency in interactive systems is crucial, we develop more efficient inference algorithms for tree-based topic models. We validate the framework both with simulated and real users.Machine Learning02017-09-06T01:56:32.2684160162017-09-06T01:56:32.268416016 + <07><04>+<00>S<EFBFBD>g
e<02>EGGSparrow: distributed, low latency scheduling<07>Large-scale data analytics frameworks are shifting towards shorter task durations and larger degrees of parallelism to provide low latency. Scheduling highly parallel jobs that complete in hundreds of milliseconds poses a major challenge for task schedulers, which will need to schedule millions of tasks per second on appropriate machines while offering millisecond-level latency and high availability. We demonstrate that a decentralized, randomized sampling approach provides near-optimal performance while avoiding the throughput and availability limitations of a centralized design. We implement and deploy our scheduler, Sparrow, on a 110-machine cluster and demonstrate that Sparrow performs within 12% of an ideal scheduler.SOSP02017-09-06T01:56:40.9907958982017-09-06T01:56:40.990795898<EFBFBD><12>f
a<02>EGGF1: A Distributed SQL Database That Scales<07>F1 is a distributed relational database system built at Google to support the AdWords business. F1 is a hybrid database that combines high availability, the scalability of NoSQL systems like Bigtable, and the consistency and us-ability of traditional SQL databases. F1 is built on Spanner , which provides synchronous cross-datacenter replica-tion and strong consistency. Synchronous replication implies higher commit latency, but we mitigate that latency by using a hierarchical schema model with structured data types and through smart application design. F1 also includes a fully functional distributed SQL query engine and automatic change tracking and publishing.PVLDB02017-09-06T01:56:40.0258200682017-09-06T01:56:40.025820068<EFBFBD><01>e
y<02>GGDefining gamification: a service marketing perspective<07>During recent years "gamification" has gained significant attention among practitioners and game scholars. However, the current understanding of gamification has been solely based on the act of adding systemic game elements into services. In this paper, we propose a new definition for gamification, which emphases the experiential nature of games and gamification, instead of the systemic understanding. Furthermore, we tie this definition to theory from service marketing because majority of gamification implementations aim towards goals of marketing, which brings to the discussion the notion of how customer / user is always ultimately the creator of value. Since now, the main venue for academic discussion on gamification has mainly been the HCI community. We find it relevant both for industry practitioners as well as for academics to study how gamification can fit in the body of knowledge of existing service literature because the goals and the means of gamification and marketing have a significant overlap.MindTrek02017-09-06T01:56:39.1198610842017-09-06T01:56:39.119861084<EFBFBD>_<EFBFBD>d
a<02>?7GGAn introduction to argumentation semantics<07>This paper presents an overview on the state of the art of semantics for abstract argumentation, covering both some of the most influential literature proposals and some general issues concerning semantics definition and evaluation. As to the former point the paper reviews Dung's original notions of complete, grounded, preferred, and stable semantics, as well as subsequently proposed notions like semi-stable, ideal, stage, and CF2 semantics, considering both the extension-based and the labelling-based approaches with respect to their definitions. As to the latter point the paper presents an extensive set of general properties for semantics evaluation and analyzes the notions of argument justification and skepticism. The final part of the paper is devoted to discuss some relationships between semantics properties and domain specific requirements.Knowledge Eng. Review02017-09-06T01:56:38.2641740722017-09-06T01:56:38.264174072 j<00><0F><0F><0F><0F>b@<0E><0E><0E><0E>hJ& <0A> <0A> g I  <0C> <0C> <0C> <0C> q W .  <0B> <0B> <0B> [ % 
<EFBFBD>
<EFBFBD>
<EFBFBD>
{
W
(
 <09> <09> <09> p 5 <08><08><08><08>sQ1<07><07><07><07>fB<06><06><06><06>b.
<05><05><05><05>xF&<04><04><04>}R(<03><03><03>iE!<02><02><02>qQ/
<01><01><01>vV.<00><17>m Runhui LiRunhuiLi<1D>l% Zhi-Li ZhangZhi-LiZhang%<25>k- Arvind NarayananArvindNarayanan<1D>j% Eman RamadanEmanRamadan<1D>i% Hugues HoppeHuguesHoppe#<23>h+ Matthew BolithoMatthewBolitho(<28>g1Michael M. KazhdanMichaelM.Kazhdan <20>f)John W. BackusJohnW.Backus"<22>e+Bui Tuong PhongBuiTuongPhong<1F>d' Conal ElliottConalElliott<1D>c% Andrej BauerAndrejBauer<1F>b' Steven AwodeyStevenAwodey<17>a Eric TuneEricTune'<27>`/ #David OppenheimerDavidOppenheimer'<27>_/ Madhukar KorupoluMadhukarKorupolu<1D>^% Luis PedrosaLuisPedrosa!<21>]) Abhishek VermaAbhishekVerma!<21>\) Michael RileyyMichaelRileyy'<27>[/ Fernando PereirazFernandoPereiraz!<21>Z) Mehryar MohriyMehryarMohriy$<24>Y-Andrei Z. BroderAndreiZ.Broder%<25>X- Stefan BurkhardtStefanBurkhardt<1F>W' Peter SandersPeterSanders'<27>V/ %Juha KärkkäinenJuhaKärkkäinen(<28>U1Leonard M. AdlemanLeonardM.Adleman$<24>T-Ronald L. RivestRonaldL.Rivest<1F>S' Marko VukolicMarkoVukolic<1D>R% Paolo ViottiPaoloViotti<1B>Q# Markus LippMarkusLipp<1F>P' Sanjeev KumarSanjeevKumar<1D>O% Linpeng TangLinpengTang/<2F>N7 #Sivakumar ViswanathanSivakumarViswanathan<1F>M' Shiva ShankarShivaShankar<1B>L# Satadru PanSatadruPan<19>K! Weiwen LiuWeiwenLiu<19>J! Ernest LinErnestLin<17>I Cory HillCoryHill!<21>H)! Sabyasachi RoySabyasachiRoy1<79>G9! #Muralidhar SubramanianMuralidharSubramanian<1E>F'Lov K. GroverLovK.Grover<1B>E# Eugene WongEugeneWong$<24>D-David W. ShipmanDavidW.Shipman,<2C>C5#Christopher L. ReeveChristopherL.Reeve$<24>B-Terry A. LandersTerryA.Landers!<21>A) Michael HammerMichaelHammer!<21>@) Nathan GoodmanNathanGoodman<1B>?# Stephen FoxStephenFox$<24>>-James B. RothnieJamesB.Rothnie<1D>=% Luc MarangetLucMaranget<19><! Somesh JhaSomeshJha%<25>;- Patrick McdanielPatrickMcdaniel<1F>:' Iulian MoraruIulianMoraru<1D>9% Marc ShapiroMarcShapiro<1F>8' Yasushi SaitoYasushiSaito<1D>7% Jacob AlbersJacobAlbers'<27>6/ Mitchell SpradlinMitchellSpradlin<1D>5% Brian HempelBrianHempel<19>4! Ravi ChughRaviChugh<1D>3% Peter WegnerPeterWegner<19>2! Mark KleinMarkKlein8<6E>1A1Juan A. Rodríguez-AguilarJuanA.Rodríguez-Aguilar<1F>0' Simon ParsonsSimonParsons!<21>/) Demis HassabisDemisHassabis<1F>.' Thore GraepelThoreGraepel'<27>-/ #Koray KavukcuogluKorayKavukcuoglu#<23>,+ Madeleine LeachMadeleineLeach,<2C>+5Timothy P. LillicrapTimothyP.Lillicrap!<21>*) Ilya SutskeverIlyaSutskever%<25>)- %Nal KalchbrennerNalKalchbrenner<17>( John NhamJohnNham<1F>'' Dominik GreweDominikGrewe#<23>&+ Sander DielemanSanderDieleman<1D>%% Marc LanctotMarcLanctot3<74>$; )Vedavyas PanneershelvamVedavyasPanneershelvam)<29>#1 !Ioannis AntonoglouIoannisAntonoglou-<2D>"5 'Julian SchrittwieserJulianSchrittwieser4<72>!=George Van Den DriesscheGeorgeVan DenDriessche<1F> ' Laurent SifreLaurentSifre<1B># Arthur GuezArthurGuez&<26>/Chris J. MaddisonChrisJ.Maddison<17> Aja HuangAjaHuang<1D>% David SilverDavidSilver <20>)Jean E. SammetJeanE.Sammet<1A>#L M AdlemanLMAdleman<1B># Miron LivnyMironLivny$<24>-Michael J. CareyMichaelJ.Carey0<79>9Flemming Friche RodlerFlemmingFricheRodler<1B># Rasmus PaghRasmusPagh9<68>A+ !Jean-Christophe FilliâtreJean-ChristopheFilliâtre-<2D>5# Christopher StracheyChristopherStrachey*<2A>3Frederick P. BrooksFrederickP.Brooks#<23>+ Patrick WendellPatrickWendell!<21>) !Kay OusterhoutKayOusterhout<1B># Himani ApteHimaniApte%<25>- Traian StancescuTraianStancescu<13> Ian RaeIanRae#<23> + !John CieslewiczJohnCieslewicz!<21> ) Stephan EllnerStephanEllner%<25> - !David MenestrinaDavidMenestrina%<25>
- #Kyle LittlefieldKyleLittlefield<1F> ' Mircea OanceaMirceaOancea<1D>% Eric RollinsEricRollins<1D>% Chad WhipkeyChadWhipkey<17> Ben HandyBenHandy<1B># Bart SamwelBartSamwel#<23>+ Radek VingralekRadekVingralek 
<00>q<EFBFBD>i
g<02>AWEEFundamental Concepts in Programming Languages<07>This paper forms the substance of a course of lectures given at the International Summer School in Computer Programming at Copenhagen in August, 1967. The lectures were originally given from notes and the paper was written after the course was finished. In spite of this, and only partly because of the shortage of time, the paper still retains many of the shortcomings of a lecture course. The chief of these are an uncertainty of aim—it is never quite clear what sort of audience there will be for such lectures—and an associated switching from formal to informal modes of presentation which may well be less acceptable in print than it is natural in the lecture room. For these (and other) faults, I apologise to the reader. There are numerous references throughout the course to CPL [13]. This is a programming language which has been under development since 1962 at Cambridge and London and Oxford. It has served as a vehicle for research into both programming languages and the design of compilers. Partial implementations exist at Cambridge and London. The language is still evolving so that there is no definitive manual available yet. We hope to reach another resting point in its evolution quite soon and to produce a compiler and reference manuals for this version. The compiler will probably be written in such a way that it is relatively easy to transfer it to another machine, and in the first instance we hope to establish it on three or four machines more or less at the same time. The lack of a precise formulation for CPL should not cause much difficulty in this course, as we are primarily concerned with the ideas and concepts involved rather than with their precise representation in a programming language. Any discussion on the foundations of computing runs into severe problems right at the start. The difficulty is that although we all use words such as 'name', 'value', 'program', 'expression' or 'command' which we think we understand, it often turns out on closer investigation that in point of fact we all mean different things by these words, so that communication is at best precarious. These misunderstandings arise in at least two ways. The first is straightforwardly incorrect or muddled thinking. An investigation of the meanings of these basic terms is undoubtedly an exercise in mathematical logic and neither to the taste nor within the field of …Higher-Order and Symbolic Computation02017-09-06T01:56:43.569385012017-09-06T01:56:43.56938501<EFBFBD>m<EFBFBD>h <00> <02>Y GGNo Silver Bullet: Essence and Accidents of Software Engineering<07>All software construction involves essential tasks, the fashioning of the complex conceptual structures that compose the abstract software entity, and accidental tasks, the representation of these abstract entities in programming languages and the mapping of these onto machine languages within space and speed constraints. Most of the big past gains in software productivity have come from removing artificial barriers that have made the accidental tasks inordinately hard, such as severe hardware constraints, awkward programming languages, lack of machine time. How much of what software engineers now do is still devoted to the accidental, as opposed to the essential? Unless it is more than 9/10 of all effort, shrinking all the accidental activities to zero time will not give an order of magnitude improvement. Therefore it appears that the time has come to address the essential parts of the software task, those concerned with fashioning abstract conceptual structures of great complexity. I suggest: • exploiting the mass market to avoid constructing what can be bought. • using rapid prototyping as part of a planned iteration in establishing software require-· ments. • growing software organically, adding more and more function to systems as they are run, used, and tested. • identifying and developing the great conceptual designers of the rising generation.02017-09-06T01:56:41.9367990722017-09-06T01:56:41.936799072 Y <0C>
<EFBFBD>!Y<00>D<EFBFBD>n
_<02>#GGProgramming Languages: History and Future<07>This paper discusses both the history and future of programming languages ( = higher level languages). Some of the difficulties in writing such a history are indicated. A key part of the paper is a tree showing the chronological development of languages and their interrelationships. Reasons for the proliferation of languages are given. The major languages are listed with the reasons for their importance. A section on chronology indicates the happenings of the significant previous time periods and the major topics of 1972. Key concepts other than specific languages are discussed.Commun. ACM02017-09-06T01:56:48.9082380372017-09-06T01:56:48.908238037<EFBFBD>^<5E>m <00><02>5EEMolecular computation of solutions to combinatorial problems.<07>The tools of molecular biology were used to solve an instance of the directed Hamiltonian path problem. A small graph was encoded in molecules of DNA, and the "operations" of the computation were performed with standard protocols and enzymes. This experiment demonstrates the feasibility of carrying out computations at the molecular level.Science02017-09-06T01:56:47.772645022017-09-06T01:56:47.77264502<EFBFBD><11>l <00>#<02>W?GGTransactional Client-Server Cache Consistency: Alternatives and Performance<07>Client-server database systems based on a data shipping model can exploit client memory resources by caching copies of data items across transaction boundaries. Caching reduces the need to obtain data from servers or other sites on the network. In order to ensure that such caching does not result in the violation of transaction semantics, a transactional cache consistency maintenance algorithm is required. Many such algorithms have been proposed in the literature and, as all provide the same functionality, performance is a primary concern in choosing among them. In this article we present a taxonomy that describes the design space for transactional cache consistency maintenance algorithms and show how proposed algorithms relate to one another. We then investigate the performance of six of these algorithms, and use these results to examine the tradeoffs inherent in the design choices identified in the taxonomy. The results show that the interactions among dimensions of the design space impact performance in many ways, and that classifications of algorithms as simply &#8220;pessimistic&#8221; or &#8220;optimistic&#8221; do not accurately characterize the similarities and differences among the many possible cache consistency algorithms.ACM Trans. Database Syst.02017-09-06T01:56:46.5355878912017-09-06T01:56:46.535587891<EFBFBD><16>k
)<02>CCCuckoo Hashing<07>We present a simple and efficient dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. The space usage is similar to that of binary search trees, i.e., three words per key on average. The practicality of the scheme is backed by extensive experiments and comparisons with known methods, showing it to be quite competitive also in the average case.ESA02017-09-06T01:56:45.29634792017-09-06T01:56:45.2963479<EFBFBD>J<EFBFBD>j
9<02>cGGBacktracking iterators<07>Iterating over the elements of an abstract collection is usually done in ML using a fold-like higher-order function provided by the data structure. This article discusses a different paradigm of iteration based on purely functional, immutable cursors. Contrary to fold-like iterators, the iteration can be cleanly interrupted at any step. Contrary to imperative cursors (such as those found in C++ and Java libraries) it is possible to backtrack the iterator to a previous step. Several ways to iterate over binary trees are examined and close links with G&#233;rard Huet's <i>Zipper</i> are established. Incidentally, we show the well-known two-lists implementation of functional queues arising from a <i>Zipper</i>-based breadth-first traversal.ML02017-09-06T01:56:44.5668100592017-09-06T01:56:44.566810059 <00><01><0F><0F><0F><0F><0F><0F><0F>~lYI<$<0E><0E><0E><0E><0E><0E><0E>waSG;2 <0A> <0A> <0A> <0A> <0A> <0A> <0A> p c O D .   <0C> <0C> <0C> <0C> <0C> <0C> t j a X A 8 ! <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> s j U H - 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>

r
d
V
M
1
(

 <09> <09> <09> <09> <09> <09> <09> <09> <09> q ` V *   <08><08><08><08><08><08><08>~reOF* <07><07><07><07><07><07>vh]B0'<06><06><06><06><06><06><06>pYB*! <05><05><05><05><05><05><05>qdUI'<04><04><04><04><04><04><04>|l`KA5'<03><03><03><03><03><03><03>xhNB.$<02><02><02><02><02><02><02><02><02>ueTC7+<01><01><01><13>-observer pattern"<22>Ksoftware engineering principles<06>par <0B>downtime <0B>pre-copy <09>kelips <09>pastry <09>lookup<0E>#hypersphere<0E>#binary code <0A>!hyperplane<11>)hashing method<06>snr<08>stant<15> 1source and channel<06> bms <09> reduct <0A>
!repository <0B> indexing <0A>!percolator <0B>sparsity<1B>=dimensionality reduction<07>nnza<11>)linear algebra <09>dynamo<17>5eventual consistency <0A>!amazon.com
<EFBFBD>napster<0F>%unstructured<06>~dht<17>}5potential antecedent<16>|3employee engagement<08>{facet <0C>zsynchrony<15>y1personal computing
<EFBFBD>xsixties<12>w+object-oriented <0B>vthinking <09>usqueak<07>tebay<12>s+cloud computing <09>ragenda <0A>q!widespread<07>psink<14>o/byzantine failure<08>nmovie <0A>m!graph data<12>l+correct process<11>k)crash-recovery<12>j+paxos algorithm<18>i7logic and computation<13>h-relational model<1F>gElarge-scale software systems <09>fcrisis <0C>einvariant
<EFBFBD>dbitcoin<0E>c#choi matrix<12>b+quantum channel<10>a'test instance<15>`1inductive learning<15>_1de finetti theorem<0E>^#certificate <09>]atomic<0F>\%registration<15>[1snapshot isolation<06>Zpsi<15>Y1causal consistency<14>X/partial synchrony<14>W/synchronous model<16>V3synchronous systems <0B>Usumption<12>T+dominant thread
<EFBFBD>Slocking<0E>R#shared data<0F>Q%non-dominant<07>Psafe<19>O9network virtualization<12>N+virtual network <0A>M!networking<06>Lisp<0F>K%ossification<18>J7language capabilities<08>Ichess <0B>Hfootnote <0A>G!conceptnet <0B>Fbigtable<06>Eity<10>D'crash failure<1B>C=asynchronous environment<17>B5replication protocol<1A>A;transactions per second<07>@hash<0E>?#fm sketches<07>>pcsa<19>=9probabilistic counting<06><e.g<13>;-phase transition
<EFBFBD>:special <09>9bollob<0F>8%random graph<0F>7%transparency
<EFBFBD>6masking<10>5'memory access<07>4lazy<12>3+non-determinism<0E>2#memoization<13>1-call-time choice<08>0arrow<08>/occam <09>.malism)<29>-Ycsp communicating sequential processes<07>,loto<0E>+#ccs and csp<1A>*;deep learning technique<15>)1reference database<0F>(%colorization<06>'cde
<EFBFBD>&natural<06>%nde<06>$dox <0C>#mediation<06>"pmv<19>!9poisson reconstruction<06> mvs<08>guage<06>lev<19>9functional programming<06>suc <0B>lighting <0B>specular
<EFBFBD>shading<0E>#reflectance<06>tod<07>memo<1B>=efficient implementation<0E>#irrelevance<10>'bracket types<14>/first-order logic<13>-regular category<18>7dependent type theory<18>7different application
<EFBFBD>minhash<12> +minwise hashing<06> lsh
<EFBFBD> shingle<0E>
#resemblance<11> )data structure <0B>length n<08>motif<1A>;public-key cryptosystem<11>)decryption key<06>ecc<12>+electronic mail<11>)encryption key<14>/key cryptosystems<06>dsa<14>/encryption method<06>~tes<06>}des<07>|weak<18>{7consistency semantics<12>z+linearizability <0B>ysemantic<18>x7different consistency<07>wblob<14>v/quantum computing<11>u)famous example<06>tbad<11>s)quantum search <0C>rfactoring<13>q-query processing<08>psdd-1<11>o)relative error
<EFBFBD>ncounter<17>m5approximate counting<13>l-frequency moment<14>k/non-negative data<11>j)decision trees <0C>idata flow <0A>h!smartphone<11>g)essential step<16>f3market applications<18>e7n.a. n.a. pc analysis<06>dicc <09>cleader <09>bepaxos <0B>aeventual<13>`-weak consistency <0C>_timestamp<19>^9optimistic replication<0F>]%programmatic
<EFBFBD>\spacing <0B>[workflow<06>Zfun <0C>Ysubtyping<17>X5economics literature
<EFBFBD>Wauction
<EFBFBD>Vbidding<06>Ubid<15>T1computer scientist
<EFBFBD>Salphago <0A>R!board game<10>Q'reinforcement<0F>P%intelligence <0A>O!artificial
<EFBFBD>Nblockin<13>M-hamiltonian path<06>Lhpp<10>K'dna computing
<EFBFBD>Jgraph g<0E>I#coordinator<12>H+serializability
<00>N<05><0F><0F><0F><0F><0F>g<0F><07><0F><05>}<0F><06>i[<04>I{D7-#<0E><08>j<0E><07><06><0E><0E><0E><0E><0E><0E><06><0E><06><0E><08>v<06>v1<05>YlhbSJN_<06>s<06><05>@* <0A> <0A> <0A> <0A> <0A><05><04> <0A> <0A> u f [<03><05> R\ D<08>P 8<07><03> /  <0C> <0C> <07> <0C><07>5<05> <0C>_ <0C><04> <0C> <0C> <0C> } q h Y L<08><07><06> 3 "2 Q <0B> <0B><06><03><04><08><03><04>tb <0B> <0B> <0B><04> <0B>=<04> <0B> <0B> j<03>> ` L >?sk 1 ' Z *<04><03>&<03> 
<EFBFBD>
<EFBFBD>
<EFBFBD>#
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>L
<EFBFBD>
<EFBFBD>
w|
f
SS3
?
&
 <09> <09><03><07> <09><04> <09> <09> <09>u <09> <09> <09><03> <09><03><08><08> u e \ Mk C<08> 5 (   <08>)square pattern<04>tom<04> trie<04> vmware<04>5support transactions<04> time pad}vulzwarx+virtual machines!translatorq stripeotlan undpm un womenl violencek
unfpai/understandabilitya-traffic analysisVvfsR subclassHsmcEssmCvdf>ues9/single individual6+storage systems2tmi%+traffic changesvlb tarzantor 1time-varying value#tree search<03>
succe<03>uct<03> victim<03>Atree augmented naive bayes<03>)tan classifier<03> tribute<03>+storage service<03>1strong consistency<03>#spectrogram<03> shazam<03>'system design<03>+sequence number<03>!starvation<03>
stack<03>$Ksynchronous distributed systems<03>5theoretical research<03> vanadium<03> tutorial<03> splicing<03> sparse<03> testbed<03> tiling<03> spartan<03>
ssion<03>#side-effect<03>$Ksoftware engineering principles<03>snr<03>
stant<03>1source and channel<03> sparsity<03>%unstructuredsynchronyz sixtiesx thinkingv squeaku!widespreadq sinkp'test instancea1snapshot isolation[/synchronous modelW3synchronous systemsV sumptionU#shared dataR+virtual networkN;transactions per secondA special:%transparency7suc specular shadingtod shingle tes<02> weak<02>!smartphone<02>-weak consistency<02>timestamp<02> spacing<02> workflow<02>subtyping<02>zookeeperByarn
yampa<02>xen<00> writing<02> wormholev wildWwide-area<00>wep%!well-known<00>;web page classification<00>wait-freec vserver|
voxel<00> void<00>vms8vmm2vllt)virtualization5 virtual:;viewstamped replication) viewer*3video stabilization<02>)video analysis<01>)vertices of g.%vector fieldivarc3vandalism detection?
vandal<'user activity5ure8 uptime<00> upgrade<01> unix<01>%unit testingE!unikernels9 unicorn<01> typingp ture, tsdf<00> truffleV treadmillO)traversability<01> trap47transactional support<02>7trajectory generationG-train algorithms<01>
tpc-c<02>)topic modeling<02>#topic model<02> toolkit_ ties<00> ticast<00>3theoretical results^#theoretical<02>3text classification<00> tension<02>temporale tem\ techni<01>tdd<00>tcp<00>
tationS'task duration<02>
tanceZ talk<01>;synchronous replication<01># synchronous?synchronization primitive sync<01> swim<00>swiftnessHsvm<01> suffix<02> subspace<00>sts
street!!streamlineh+streaming modelstreaming<00>/stream processing<00> stereo<01>5statistical database<01>-statistical data<01>
static9+state of motionD?state machine replicationu-state estimation<01> stat<00>sqlPspreading split# spel<02> spdyV#source-codedsom<02>#soft typing8)social support<01>%social graph<01> soapsoasns7smrw%small subset<02> sloc)slam algorithm<01> slam= slab<00>%skin surface<01>%single photo* sinfoniax-simple 3d shapes, silver<02> shutter<02>7shared representation<01> shadow+ shader'sgszsgd+serializability<02>!sequence x  <00>_<EFBFBD>p
w<02>5/EEAuctions and bidding: A guide for computer scientists<07>There is a veritable menagerie of auctions&#8212;single-dimensional, multi-dimensional, single-sided, double-sided, first-price, second-price, English, Dutch, Japanese, sealed-bid&#8212;and these have been extensively discussed and analyzed in the economics literature. The main purpose of this article is to survey this literature from a computer science perspective, primarily from the viewpoint of computer scientists who are interested in learning about auction theory, and to provide pointers into the economics literature for those who want a deeper technical understanding. In addition, since auctions are an increasingly important topic in computer science, we also look at work on auctions from the computer science literature. Overall, our aim is to identifying what both these bodies of work these tell us about creating electronic auctions.ACM Comput. Surv.02017-09-06T01:56:50.839992922017-09-06T01:56:50.83999292<EFBFBD>|<7C>o <00><02>eGGMastering the game of Go with deep neural networks and tree search<07>The game of Go has long been viewed as the most challenging of classic games for artificial intelligence owing to its enormous search space and the difficulty of evaluating board positions and moves. Here we introduce a new approach to computer Go that uses 'value networks' to evaluate board positions and 'policy networks' to select moves. These deep neural networks are trained by a novel combination of supervised learning from human expert games, and reinforcement learning from games of self-play. Without any lookahead search, the neural networks play Go at the level of state-of-the-art Monte Carlo tree search programs that simulate thousands of random games of self-play. We also introduce a new search algorithm that combines Monte Carlo simulation with value and policy networks. Using this search algorithm, our program AlphaGo achieved a 99.8% winning rate against other Go programs, and defeated the human European Go champion by 5 games to 0. This is the first time that a computer program has defeated a human professional player in the full-sized game of Go, a feat previously thought to be at least a decade away.Nature02017-09-06T01:56:49.8940668952017-09-06T01:56:49.894066895
<00><01><0F><0F><0F><0F><0F><0F>pXA+<0E><0E><0E><0E><0E><0E>}kVG. <0A> <0A> <0A> <0A> <0A> <0A> r ^ L 8 &   <0C> <0C> <0C> <0C> <0C> <0C> <0C> { l \ K 9 !
<0B> <0B> <0B> <0B> <0B> <0B> <0B>  p b P E : ( 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
x
h
S
B
4
 <09> <09> <09> <09> <09> <09> <09> v ] F 3  <08><08><08><08><08><08>jUC3
<07><07><07><07><07><07><07>q_N.<06><06><06><06><06><06>v`F2<05><05><05><05><01><05><05><05>sXC.<04><04><04><04><04><04>mZE0<03><03><03><03><03>zdO7! <02><02><02><02><02><02>~m[L9&<01><01><01><01><01>#Miron)Matija Pretnar"GMohammad Ali Akhavan-Behabadi/Mitchell Spradlin<02>#Miron Livny<02>'Mircea Oancea<02> Min Wu!Milo Polte<05>%Mikel Larrea'Mike Sharplest'Mike Patersona!Mike Fagan5%Mike Burrows<05>#Mihai Budiu<00>'Miguel Castroo+Michal H. Palka4)Michael Wimmer'Michael WelzlF'Michael Stumm<00>/Michael Steinbach()Michael Rileyy<02>1Michael M. Kazhdan<02>-Michael L. Scott<01>1Michael L. Roberts<00>+Michael Krainin/-Michael Kaminsky<01>3Michael J. Freedman<01>3Michael J. Franklin<00>1Michael J. Fischer`-Michael J. Carey<02>/Michael I. Jordan<05>)Michael Hammer<02>-Michael F. Cohen--Michael D. Ernst<00>+Michael Curtiss<01>+Michael Burrows3)Michael Ashley+-Michael Armbrust<01>5Michael Abd-El-Malek1Michael A. Nielsenc/Michael A. Bender<05>#Micah Sherr<05>-Mendel Rosenblum<05>'Mehul A. Shahb)Mehryar Mohriy<02>+Mauro Cherubini+Maurice Herlihy@+Matti Pitkänen;7Matthew J. Hausknecht<01>1Matthew H. AusternK'Matthew Flatt?+Matthew Bolitho<02>#Matt ToltonA'Mathias Payer<05>'Matei Zaharia<01>-Masumi Shirakawa<01>7Massimiliano Giacomin<02>1Marvin D. Tretkoff)Martin OderskyG5Martin Farach-Colton<05>/Martin E. Hellmanz%Martin CookeK+Martin Caminada+Martin A. Keane 5Marta Z. Kwiatkowska/Marshall C. Pease)Markus Völter<00>#Markus Lipp<02>+Markus H. Grossq'Marko Vukolic<02>AMarko C. J. D. Van Eekelen#Mark Robson<05>%Mark Purcell !Mark Klein<02>#Mark Hayden<00>%Mark Hartner~'Mario WolczkoP'Mario Szegedy 1Marcos K. Aguilera`)Marco Serafinii+Marco Scandurra<05>%Marc Shapiro<02>/Marc Schuilenburg<05>!Marc Levoyq%Marc Lanctot<02>+Manos Kapritsos<00>9Manon J. N. L. Benders<01>%Manoj Plakal<05>/Malte Schwarzkopf'Mahadev Konar<05>-Magnus O. Myreen
-Maged M. Michael<01>5Magdalena Balazinska<00>/Madhukar Korupolu<02>+Madeleine Leach<02>'Madan Jampani)/Maarten Van Steen<01>3Maarten M. Fokkinga&-Maarten B Jalink%M. ČarapinaJM. Yousef.#M. Yalınay_-M. Van Der Voort+M. V. Kabrawala<04>!M. Trauner<03> M. Tada<04>7M. Surendranath Reddy<04>)M. Steinberger<01> M. Silva<03>#M. Shiffmanv+M. Sharaf-Eldin!M. Schoder<03>M. Sawada<04>!M. S. ChoiH M. Rocha7M. Peck-Radosavljevic<03>M. Parola)/M. Papatheodoridi+M. O. MavlikeevqM. Nakura M. MinO%M. Matsuyama<04>%M. Mandorfer<03>
M. Luh
M. Li<03>%M. L. Rincon<03> M. Kraus<03>M. Kenzel<01> M. Kangh3M. K. K. Neijenhuis{#M. J. Bruno<04> M. Iancu<03>M. Harada<04>/M. Gravito-Soares<03>M. Gordan<03>#M. Giuricin9/M. Frans Kaashoek<00>1M. Feldner-Busztin<03>%M. El Gharib-#M. Diermayr<03>!M. Di Maso0M. Danila.'M. D. De Juan<03>'M. Celikbilek<03> M. Cejna<03>!M. Cardoso<03>!M. C. Sulz<04>#M. C. Hogan}M. Bilzer%M. B. Afonso@!M. Attalla<03>+M. Abd El-Kader%M. A. Titovau)M. A. Munteanu<03>%M. A. Eljaky<03>)M. A. El Zahry<03>1M. A. Dassuncao<04>)László Babai'Lyle Franklin7Luís E. T. Rodrigues<00>#Luís DamasZ'Lukas StadlerK3Luiz André Barroso<05>)Luis Rodriguez(%Luis Pedrosa<02>3Luis Leopoldo Perez<02>Luis Ceze<01>+Lucian Grijincu<01>'Luca Cardelli %Luc Van Gool%Luc Maranget<02>'Lov K. Grover<02>%Linpeng Tang<02>)Levan AtanelovX) Leslie Lamport1Leonard M. Adleman<02>#Leo Breiman<00>-Lennart E. Nacke<01>-Lennart Berggren<01>1Leith Casey Leedoma1Lawrence R Rabiner<00>1Laurie A. Williams<00>-Lauretta O. Osho0'Laurent Sifre<02>+Laszlo Szekeres<05>3Larry J. StockmeyerLance Alt
%L. Zubiaurre<03> cjc<00><03>r
y<02>GGProgrammatic and direct manipulation, together at last<07>Direct manipulation interfaces and programmatic systems have distinct and complementary strengths. The former provide intuitive, immediate visual feedback and enable rapid prototyping, whereas the latter enable complex, reusable abstractions. Unfortunately, existing systems typically force users into just one of these two interaction modes. We present a system called Sketch-n-Sketch that integrates programmatic and direct manipulation for the particular domain of Scalable Vector Graphics (SVG). In Sketch-n-Sketch, the user writes a program to generate an output SVG canvas. Then the user may directly manipulate the canvas while the system immediately infers a program update in order to match the changes to the output, a workflow we call live synchronization. To achieve this, we propose (i) a technique called trace-based program synthesis that takes program execution history into account in order to constrain the search space and (ii) heuristics for dealing with ambiguities. Based on our experience with examples spanning 2,000 lines of code and from the results of a preliminary user study, we believe that Sketch-n-Sketch provides a novel workflow that can augment traditional programming systems. Our approach may serve as the basis for live synchronization in other application domains, as well as a starting point for yet more ambitious ways of combining programmatic and direct manipulation.PLDI02017-09-06T01:56:53.5958378912017-09-06T01:56:53.595837891<EFBFBD><12>q <00><02>/EEOn Understanding Types, Data Abstraction, and Polymorphism<07>Our objective is to understand the notion of <I>type</I> in programming languages, present a model of typed, polymorphic programming languages that reflects recent research in type theory, and examine the relevance of recent research to the design of practical programming languages.
Object-oriented languages provide both a framework and a motivation for exploring the interaction among the concepts of type, data abstraction, and polymorphism, since they extend the notion of type to data abstraction and since type inheritance is an important form of polymorphism. We develop a &#955;-calculus-based model for type systems that allows us to explore these interactions in a simple setting, unencumbered by complexities of production programming languages.
The evolution of languages from untyped universes to monomorphic and then polymorphic type systems is reviewed. Mechanisms for polymorphism such as overloading, coercion, subtyping, and parameterization are examined. A unifying framework for polymorphic type systems is developed in terms of the typed &#955;-calculus augmented to include binding of types by quantification as well as binding of values by abstraction.
The typed &#955;-calculus is augmented by universal quantification to model generic functions with type parameters, existential quantification and packaging (information hiding) to model abstract data types, and bounded quantification to model subtypes and type inheritance. In this way we obtain a simple and precise characterization of a powerful type system that includes abstract data types, parametric polymorphism, and multiple inheritance in a single consistent framework. The mechanisms for type checking for the augmented &#955;-calculus are discussed.
The augmented typed &#955;-calculus is used as a programming language for a variety of illustrative examples. We christen this language Fun because fun instead of &#955; is the functional abstraction keyword and because it is pleasant to deal with.
Fun is mathematically simple and can serve as a basis for the design and implementation of real programming languages with type facilities that are more powerful and expressive than those of existing programming languages. In particular, it provides a basis for the design of strongly typed object-oriented languages.ACM Comput. Surv.02017-09-06T01:56:51.972510012017-09-06T01:56:51.97251001 <01> =<06><01><00>J<EFBFBD>u <00><02> GGEffective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis<07>Many threats present in smartphones are the result of interactions between application components, not just ar-tifacts of single components. However, current techniques for identifying inter-application communication are ad hoc and do not scale to large numbers of applications. In this paper, we reduce the discovery of inter-component communication (ICC) in smartphones to an instance of the Interprocedural Distributive Environment (IDE) problem, and develop a sound static analysis technique targeted to the Android platform. We apply this analysis to 1,200 applications selected from the Play store and characterize the locations and substance of their ICC. Experiments show that full specifications for ICC can be identified for over 93% of ICC locations for the applications studied. Further the analysis scales well; analysis of each application took on average 113 seconds to complete. Epicc, the resulting tool, finds ICC vulnerabilities with far fewer false positives than the next best tool. In this way, we develop a scalable vehicle to extend current security analysis to entire collections of applications as well as the interfaces they export.02017-09-06T01:56:56.2902980962017-09-06T01:56:56.290298096<EFBFBD>H<EFBFBD>t
q<02>+CCThere is more consensus in Egalitarian parliaments<07>This paper describes the design and implementation of Egalitarian Paxos (EPaxos), a new distributed consensus algorithm based on Paxos. EPaxos achieves three goals: (1) optimal commit latency in the wide-area when tolerating one and two failures, under realistic conditions; (2) uniform load balancing across all replicas (thus achieving high throughput); and (3) graceful performance degradation when replicas are slow or crash.
Egalitarian Paxos is to our knowledge the first protocol to achieve the previously stated goals efficiently---that is, requiring only a simple majority of replicas to be non-faulty, using a number of messages linear in the number of replicas to choose a command, and committing commands after just one communication round (one round trip) in the common case or after at most two rounds in any case. We prove Egalitarian Paxos's properties theoretically and demonstrate its advantages empirically through an implementation running on Amazon EC2.SOSP02017-09-06T01:56:55.49627712017-09-06T01:56:55.4962771<EFBFBD>?<3F>s
9<02>//GGOptimistic replication<07>Data replication is a key technology in distributed systems that enables higher availability and performance. This article surveys optimistic replication algorithms. They allow replica contents to diverge in the short term to support concurrent work practices and tolerate failures in low-quality communication links. The importance of such techniques is increasing as collaboration through wide-area and mobile networks becomes popular.Optimistic replication deploys algorithms not seen in traditional &#8220;pessimistic&#8221; systems. Instead of synchronous replica coordination, an optimistic algorithm propagates changes in the background, discovers conflicts after they happen, and reaches agreement on the final contents incrementally.We explore the solution space for optimistic replication algorithms. This article identifies key challenges facing optimistic replication systems---ordering operations, detecting and resolving conflicts, propagating changes efficiently, and bounding replica divergence---and provides a comprehensive survey of techniques developed for addressing these challenges.ACM Comput. Surv.02017-09-06T01:56:54.6390310062017-09-06T01:56:54.639031006 <02> <0C> <09><05><02><00>G<EFBFBD>y
{<02>GGA Fast Quantum Mechanical Algorithm for Database Search<07>An unsorted database contains N records, of which just one satisfies a particular property. The problem is to identify that one record. Any classical algorithm, deter-ministic or probabilistic, will clearly take O (N) steps since on the average it will have to examine a large fraction of the N records. Quantum mechanical systems can do several operations simultaneously due to their wave like properties. This paper gives an O (JN) step quantum mechanical algorithm for identifying that record. It is within a constant factor of the fastest possible quantum mechanical algorithm.STOC02017-09-06T01:57:00.8550080572017-09-06T01:57:00.855008057<EFBFBD>j<EFBFBD>x <00><02>+?GGIntroduction to a System for Distributed Databases (SDD-1)<07>The declining cost of computer hardware and the increasing data processing needs of geographically dispersed organizations have led to substantial interest in distributed data management. SDD-1 is a distributed database management system currently being developed by Computer Corporation of America. Users interact with SDD-1 precisely as if it were a nondistributed database system because SDD-1 handles all issues arising from the distribution of data. These issues include distributed concurrency control, distributed query processing, resiliency to component failure, and distributed directory management. This paper presents an overview of the SDD-1 design and its solutions to the above problems.
This paper is the first of a series of companion papers on SDD-1 (Bernstein and Shipman [2], Bernstein et al. [4], and Hammer and Shipman [14]).ACM Trans. Database Syst.02017-09-06T01:56:59.7475458982017-09-06T01:56:59.747545898<EFBFBD>z<EFBFBD>w
s<02>{#EECounting Large Numbers of Events in Small Registers<07>It is possible to use a small counter to keep approximate counts of large numbers. The resulting expected error can be rather precisely controlled. An example is given in which 8-bit counters (bytes) are used to keep track of as many as 130,000 events with a relative error which is substantially independent of the number <italic>n</italic> of events. This relative error can be expected to be 24 percent or less 95 percent of the time (i.e. <italic>&sgr;</italic> = <italic>n</italic>/8). The techniques could be used to advantage in multichannel counting hardware or software used for the monitoring of experiments or processes.Commun. ACM02017-09-06T01:56:58.349885012017-09-06T01:56:58.34988501<EFBFBD>a<EFBFBD>v
o<02>cCCCompiling pattern matching to good decision trees<07>We address the issue of compiling ML pattern matching to compact and efficient decisions trees. Traditionally, compilation to decision trees is optimized by (1) implementing decision trees as dags with maximal sharing; (2) guiding a simple compiler with heuristics. We first design new heuristics that are inspired by necessity, a concept from lazy pattern matching that we rephrase in terms of decision tree semantics. Thereby, we simplify previous semantic frameworks and demonstrate a straightforward connection between necessity and decision tree runtime efficiency. We complete our study by experiments, showing that optimizing compilation to decision trees is competitive with the optimizing match compiler of Le Fessant and Maranget (2001).ML02017-09-06T01:56:57.25697292017-09-06T01:56:57.2569729
:|)/<07><07>DZ<0F><0F>e<04>|<0E><0E><0E>{3<03> <0A> <0A> t U w <0C> ~ 1 <05> <0B><06> 2
<EFBFBD>
<EFBFBD><03>
<EFBFBD>
,J <09>X9<06> <09>.<05> | `<04> 2<08>o<08><08>TE<04> RAY: Integrating Rx and Async for Direct-Style Reactive Streams<01>ASoK: Eternal War in Memory<01>,[Reducing Garbage Collector Cache Misses<01>?Secure network provenance<01>+YStasis: Flexible Transactional Storage<01>1eQuantum vacuum pressure on a conducting slab~U<04>+RADOS: a scalable, reliable storage service for petabyte-scale storage clusters{1eSymbolic Representation and Natural Languageq?Qualitative data analysiso$KRecent SRI work in verificationZ/Sparse PartitionsUL<04>Techniques for Automated Generation of Testbed Infrastructures for SOAA>Stronger Semantics for Low-Latency Geo-Replicated Storage@=}Self-stabilizing Systems in Spite of Distributed Control?=}Spartan: A Distributed Array Framework with Smart Tiling=c<04>GRewriting nation-state: borderland literatures of India and the question of state sovereignty7/Spherical hashing6<{Signal/Collect: Graph Algorithms for the (Semantic) Web&7Propositions as types"4kSpanner: Google's globally-distributed databaseA<04>The BUDS Language for Distributed Bayesian Machine Learning8sPurely functional lazy nondeterministic programming ._Push-pull functional reactive programming7Propositions as Types!PushPull++<00>1eThe Case for Determinism in Database Systems<00>!I The Byzantine Generals Problem9uTesting ecological models: the meaning of validation<00>O<04>!Teaching Garbage Collection without Implementing Compilers or Interpreters%-_Systematic Review in Software EngineeringL;Support-vector networksPJ<04>Structural asymmetries of perisylvian regions in the preterm newborn<00>2iSqueak: a language for communicating with mice1eSparrow: distributed, low latency scheduling<00>T<04>)Solaris Zones: Operating System Support for Consolidating Commercial Workloads<00>#Soft TypingH<04>Sinfonia: A new paradigm for building scalable distributed systems<00>W<04>/Simple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithms<00><><04>Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive SystemsTN<04>Shape Grammars and the Generative Specification of Painting and Sculpturel-_Security Concerns in Android mHealth AppsL<04>ScatterAlloc: Massively parallel dynamic memory allocation for the GPU<00>0cSafety Verification of Deep Neural Networks<00>W<04>1SWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocol<M<04>Reverend Bayes on Inference Engines: A Distributed Hierarchical ApproachSAResilient Overlay Networks4>Replication, history, and grafting in the Ori file system<00>0eRemoving gamification from an enterprise SNSg!GReflections on Trusting Trustwt<04>kRealizing quality improvement through test driven development: results and experiences of four industrial teamsK'Real-Time FRP<00>B<04>Rapidly-Exploring Random Trees: A New Tool for Path Planning<00>)Random ForestsX+YRRB-Trees: Efficient Immutable Vectors<00>T<04>+RGB-D Mapping: Using Depth Cameras for Dense 3D Modeling of Indoor EnvironmentsiJ<04>QuickCheck: a lightweight tool for random testing of Haskell programs?)WQuickCheck Testing for Fun and Profit
%OQuantum-enhanced machine learning` <00> (-<00><00>><3E>| <00><02>_/GGConsistency in Non-Transactional Distributed Storage Systems<07>Over the years, different meanings have been associated with the word <i>consistency</i> in the distributed systems community. While in the &#8217;80s &#8220;consistency&#8221; typically meant <i>strong consistency</i>, later defined also as <i>linearizability</i>, in recent years, with the advent of highly available and scalable systems, the notion of &#8220;consistency&#8221; has been at the same time both weakened and blurred.
In this article, we aim to fill the void in the literature by providing a structured and comprehensive overview of different consistency notions that appeared in distributed systems, and in particular <i>storage</i> systems research, in the last four decades. We overview more than 50 different consistency notions, ranging from linearizability to eventual and weak consistency, defining precisely many of these, in particular where the previous definitions were ambiguous. We further provide a partial order among different consistency predicates, ordering them by their semantic &#8220;strength,&#8221; which we believe will be useful in future research. Finally, we map the consistency semantics to different practical systems and research prototypes.
The scope of this article is restricted to non-transactional semantics, that is, those that apply to single storage object operations. As such, our article complements the existing surveys done in the context of transactional, database consistency semantics.ACM Comput. Surv.02017-09-06T01:57:03.5196101072017-09-06T01:57:03.519610107<EFBFBD>w<EFBFBD>{
!<02>7/GGPushPull++<07>PushPull tools are implemented in most commercial 3D modeling suites. Their purpose is to intuitively transform a face, edge, or vertex, and then to adapt the polygonal mesh locally. However, previous approaches have limitations: Some allow adjustments only when adjacent faces are orthogonal; others support slanted surfaces but never create new details. Moreover, self-intersections and edge-collapses during editing are either ignored or work only partially for solid geometry. To overcome these limitations, we introduce the PushPull++ tool for rapid polygonal modeling. In our solution, we contribute novel methods for adaptive face insertion, adjacent face updates, edge collapse handling, and an intuitive user interface that automatically proposes useful drag directions. We show that PushPull++ reduces the complexity of common modeling tasks by up to an order of magnitude when compared with existing tools.ACM Trans. Graph.02017-09-06T01:57:02.4539660642017-09-06T01:57:02.453966064<EFBFBD>T<EFBFBD>z
[<02>QGGf4: Facebook's Warm BLOB Storage System<07>Facebook's corpus of photos, videos, and other Binary Large OBjects (BLOBs) that need to be reliably stored and quickly accessible is massive and continues to grow. As the footprint of BLOBs increases, storing them in our traditional storage system, Haystack, is becoming increasingly inefficient. To increase our storage efficiency, measured in the effective-replication-factor of BLOBs, we examine the underlying access patterns of BLOBs and identify temperature zones that include hot BLOBs that are accessed frequently and warm BLOBs that are accessed far less often. Our overall BLOB storage system is designed to isolate warm BLOBs and enable us to use a specialized warm BLOB storage system, f4. f4 is a new system that lowers the effective-replication-factor of warm BLOBs while remaining fault tolerant and able to support the lower throughput demands. f4 currently stores over 65PBs of logical BLOBs and reduces their effective-replication-factor from 3.6 to either 2.8 or 2.1. f4 provides low latency; is resilient to disk, host, rack, and datacenter failures; and provides sufficient throughput for warm BLOBs.OSDI02017-09-06T01:57:01.6733889162017-09-06T01:57:01.673388916 <01>
@<04><01><00>u<EFBFBD>
k<02> GGOn the resemblance and containment of documents<07>Given two documents A and B we define two mathematical notions: their resemblance r(A, B) and their containment c(A, B) that seem to capture well the informal notions of " roughly the same " and " roughly contained. " The basic idea is to reduce these issues to set intersection problems that can be easily evaluated by a process of random sampling that can be done independently for each document. Furthermore, the resemblance can be evaluated using a fixed size sample for each document. This paper discusses the mathematical properties of these measures and the efficient implementation of the sampling process using Rabin fingerprints.02017-09-06T01:57:07.6683969732017-09-06T01:57:07.668396973<EFBFBD><02>
<00> GGA New Approach to Linear Filtering and Prediction Problems1<07>02017-09-06T01:57:06.6483000492017-09-06T01:57:06.648300049<EFBFBD>$<24>~
W<02>qGGLinear work suffix array construction<07>Suffix trees and suffix arrays are widely used and largely interchangeable index structures on strings and sequences. Practitioners prefer suffix arrays due to their simplicity and space efficiency while theoreticians use suffix trees due to linear-time construction algorithms and more explicit structure. We narrow this gap between theory and practice with a simple linear-time construction algorithm for suffix arrays. The simplicity is demonstrated with a C&plus;&plus; implementation of 50 effective lines of code. The algorithm is called DC3, which stems from the central underlying concept of <i>difference cover</i>. This view leads to a generalized algorithm, DC, that allows a space-efficient implementation and, moreover, supports the choice of a space--time tradeoff. For any <i>v</i> &#8712; &lsqb;1,<i>&nradic;</i>&rsqb;, it runs in O(<i>vn</i>) time using O(<i>n</i>/<i>&vradic;</i>) space in addition to the input string and the suffix array. We also present variants of the algorithm for several parallel and hierarchical memory models of computation. The algorithms for BSP and EREW-PRAM models are asymptotically faster than all previous suffix tree or array construction algorithms.J. ACM02017-09-06T01:57:05.3405290532017-09-06T01:57:05.340529053<EFBFBD><<3C>} <00><02>S#GGA Method for Obtaining Digital Signatures and Public-Key Cryptosystems<07>An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be &#8220;signed&#8221; using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in &#8220;electronic mail&#8221; and &#8220;electronic funds transfer&#8221; systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, <italic>n</italic>, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d &#8801; 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, <italic>n</italic>.Commun. ACM02017-09-06T01:57:04.4086818852017-09-06T01:57:04.408681885 w
<EFBFBD> w<00>%<25>
7<02>+GGPropositions as Types<07>Image factorizations in regular categories are stable under pull-backs, so they model a natural modal operator in dependent type theory. This unary type constructor [A] has turned up previously in a syntactic form as a way of erasing computational content, and formalizing a notion of proof irrelevance. Indeed, semantically, the notion of a support is sometimes used as surrogate proposition asserting inhab-itation of an indexed family. We give rules for bracket types in dependent type theory and provide complete semantics using regular categories. We show that dependent type theory with the unit type, strong extensional equality types, strong dependent sums, and bracket types is the internal type theory of regular categories, in the same way that the usual dependent type theory with dependent sums and products is the internal type theory of locally cartesian closed categories. We also show how to interpret first-order logic in type theory with brackets, and we make use of the translation to compare type theory with logic. Specifically, we show that the propositions-as-types interpretation is complete with respect to a certain fragment of intuitionistic first-order logic. As a consequence, a modified double-negation translation into type theory (without bracket types) is complete for all of classical first-order logic.J. Log. Comput.02017-09-06T01:57:10.4186379392017-09-06T01:57:10.418637939<EFBFBD>\<5C>
q<02>EGGLarge-scale cluster management at Google with Borg<07>Google's Borg system is a cluster manager that runs hundreds of thousands of jobs, from many thousands of different applications, across a number of clusters each with up to tens of thousands of machines.
It achieves high utilization by combining admission control, efficient task-packing, over-commitment, and machine sharing with process-level performance isolation. It supports high-availability applications with runtime features that minimize fault-recovery time, and scheduling policies that reduce the probability of correlated failures. Borg simplifies life for its users by offering a declarative job specification language, name service integration, real-time job monitoring, and tools to analyze and simulate system behavior.
We present a summary of the Borg system architecture and features, important design decisions, a quantitative analysis of some of its policy decisions, and a qualitative examination of lessons learned from a decade of operational experience with it.EuroSys02017-09-06T01:57:09.3312939452017-09-06T01:57:09.331293945<EFBFBD>|<7C>
{<02> GGWeighted Finite-state Transducers in Speech Recognition<07>We survey the weighted finite-state transducer (WFST) approach to speech recognition developed at AT&T over the last several years. We show that WFSTs provide a common and natural representation for HMM models, context-dependency, pronunciation dictionaries, grammars, and alternative recognition outputs. Furthermore, general finite-state operations combine these representations flexibly and efficiently. Weighted determinization and minimization algorithms optimize their time and space requirements , and a weight pushing algorithm distributes the weights along the paths of a weighted transducer optimally for speech recognition. As an example, we describe a North American Business News (NAB) recognition system built using these techniques that combines the HMMs, full crossword triphones, a lexicon of forty thousand words, and a large trigram grammar into a single weighted transducer that is only somewhat larger than the trigram word grammar and that runs NAB in real-time on a very simple decoder. In another example, we show that the same techniques can be used to optimize lattices for second-pass recognition. In a third example , we show how finite-state operations can be used to assemble lattices from different recognizers to improve recognition performance .02017-09-06T01:57:08.5653798832017-09-06T01:57:08.565379883 5 <0B>5<00>Y<EFBFBD>
e<02>C#GGIllumination for Computer Generated Pictures<07>The quality of computer generated images of three-dimensional scenes depends on the shading technique used to paint the objects on the cathode-ray tube screen. The shading algorithm itself depends in part on the method for modeling the object, which also determines the hidden surface algorithm. The various methods of object modeling, shading, and hidden surface removal are thus strongly interconnected. Several shading techniques corresponding to different methods of object modeling and the related hidden surface algorithms are presented here. Human visual perception and the fundamental laws of optics are considered in the development of a shading rule that provides better quality and increased realism in generated images.Commun. ACM02017-09-06T01:57:13.6259418952017-09-06T01:57:13.625941895<EFBFBD>j<EFBFBD>
_<02>sGGPush-pull functional reactive programming<07>Functional reactive programming (FRP) has simple and powerful semantics, but has resisted efficient implementation. In particular, most past implementations have used demand-driven sampling, which accommodates FRP's continuous time semantics and fits well with the nature of functional programming. Consequently, values are wastefully recomputed even when inputs don't change, and reaction latency can be as high as the sampling period. This paper presents a way to implement FRP that combines data- and demand-driven evaluation, in which values are recomputed only when necessary, and reactions are nearly instantaneous. The implementation is rooted in a new simple formulation of FRP and its semantics and so is easy to understand and reason about. On the road to a new implementation, we'll meet some old friends (monoids, functors, applicative functors, monads, morphisms, and improving values) and make some new friends (functional future values, reactive normal form, and concurrent "unambiguous choice").Haskell02017-09-06T01:57:12.6106779792017-09-06T01:57:12.610677979 <03>!<03><00>s<EFBFBD>
I<02>iMGGPoisson surface reconstruction<07>We show that surface reconstruction from oriented points can be cast as a spatial Poisson problem. This Poisson formulation considers all the points at once, without resorting to heuristic spatial partitioning or blending, and is therefore highly resilient to data noise. Unlike radial basis function schemes, our Poisson approach allows a hierarchy of locally supported basis functions, and therefore the solution reduces to a well conditioned sparse linear system. We describe a spatially adaptive multiscale algorithm whose time and space complexities are proportional to the size of the reconstructed model. Experimenting with publicly available scan data, we demonstrate reconstruction of surfaces with greater detail than previously achievable.Symposium on Geometry Processing02017-09-06T01:57:15.5506870122017-09-06T01:57:15.550687012<EFBFBD>[<5B> <00>[<02>S#EECan Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs<07>Conventional programming languages are growing ever more enormous, but not stronger. Inherent defects at the most basic level cause them to be both fat and weak: their primitive word-at-a-time style of programming inherited from their common ancestor&#8212;the von Neumann computer, their close coupling of semantics to state transitions, their division of programming into a world of expressions and a world of statements, their inability to effectively use powerful combining forms for building new programs from existing ones, and their lack of useful mathematical properties for reasoning about programs.
An alternative functional style of programming is founded on the use of combining forms for creating programs. Functional programs deal with structured data, are often nonrepetitive and nonrecursive, are hierarchically constructed, do not name their arguments, and do not require the complex machinery of procedure declarations to become generally applicable. Combining forms can use high level programs to build still higher level ones in a style not possible in conventional languages.
Associated with the functional style of programming is an algebra of programs whose variables range over programs and whose operations are combining forms. This algebra can be used to transform programs and to solve equations whose &#8220;unknowns&#8221; are programs in much the same way one transforms equations in high school algebra. These transformations are given by algebraic laws and are carried out in the same language in which programs are written. Combining forms are chosen not only for their programming power but also for the power of their associated algebraic laws. General theorems of the algebra give the detailed behavior and termination conditions for large classes of programs.
A new class of computing systems uses the functional programming style both in its programming language and in its state transition rules. Unlike von Neumann languages, these systems have semantics loosely coupled to states&#8212;only one state transition occurs per major computation.Commun. ACM02017-09-06T01:57:14.625104982017-09-06T01:57:14.62510498 ,<05>,<00>r<EFBFBD> ]<02>q<EFBFBD>-GGBIG Cache Abstraction for Cache Networks<07>In this paper, we advocate the notion of &#x0022;BIG&#x0022; cache as an innovative abstraction for effectively utilizing the distributed storage and processing capacities of all servers in a cache network. The &#x0022;BIG&#x0022; cache abstraction is proposed to partly address the problem of (cascade) thrashing in a hierarchical network of cache servers, where it has been known that cache resources at intermediate servers are poorly utilized, especially under classical cache replacement policies such as LRU. We lay out the advantages of &#x0022;BIG&#x0022; cache abstraction and make a strong case both from a theoretical standpoint as well as through simulation analysis. We also develop the dCLIMB cache algorithm to minimize the overheads of moving objects across distributed cache boundaries and present a simple yet effective heuristic for addressing the cache allotment problem in the design of &#x0022;BIG&#x0022; cache abstraction.2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)02017-09-06T01:57:17.3869318852017-09-06T01:57:17.386931885<EFBFBD>Z<EFBFBD>
C<02>wGGDirect and Indirect Effects<07>The direct effect of one event on another can be defined and measured by holding constant all intermediate variables between the two. Indirect effects present conceptual and prac­ tical difficulties (in nonlinear models), be­ cause they cannot be isolated by holding cer­ tain variables constant. This paper presents a new way of defining the effect transmit­ ted through a restricted set of paths, without controlling variables on the remaining paths. This permits the assessment of a more nat­ ural type of direct and indirect effects, one that is applicable in both linear and nonlinear models and that has broader policy-related interpretations. The paper establishes con­ ditions under which such assessments can be estimated consistently from experimen­ tal and nonexperimental data, and thus ex­ tends path-analytic techniques to nonlinear and nonparametric models. The distinction between total, direct, and indirect ef­ fects is deeply entrenched in causal conversations, and attains practical importance in many applications, in­ cluding policy decisions, legal definitions and health care analysis. Structural equation modeling (SEM) (Goldberger 1972), which provides a methodology of defining and estimating such effects, has been re­ stricted to linear analysis, and no comparable method­ ology has been devised to extend these capabilities to models involving nonlinear dependencies,1 as those 1 A notable exception is the counterfactual analysis of Robins and Greenland (1992) which is applicable to non­ linear models, but does not incorporate path-analytic tech­ niques. The causal relationship that is easiest to interpret, define and estimate is the total effect. Written as P(Y"' = y), the total effect measures the probability that response variable Y would take on the value y when X is set to x by external intervention.2 This probability function is what we normally assess in a controlled experiment in which X is randomized and in which the distribution of Y is estimated for each level x of X. In many cases, however, this quantity does not ade­ quately represent the target of investigation and at­ tention is focused instead on the direct effect of X on Y. The term "direct effect" is meant to quantify an influence that is not mediated by other variables in the model or, more accurately, the sensitivity of Y to changes in X while all other factors in the analysis are held fixed. Naturally, holding those factors fixed would sever all causal paths from X to Y with the exception of the direct link …UAI02017-09-06T01:57:16.5243999022017-09-06T01:57:16.524399902 ~<0F><0F><0F><0F>c9<0E><0E><0E><0E>nO1 <0A> <0A> <0A> l J & <0C> <0C> <0C> <0C> x S '  <0B> <0B> <0B> <0B> b 5 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
y
Y
?

 <09> <09> <09> <09> <09> i O 3  <08><08><08><08>wY?#<07><07><07><07><07>vb3<06><06><06><06>wW7<05><05><05>u[=% <04><04><04><04>vXF2<03><03><03><03>tT4<02><02><02><02><02>dL,
<01><01><01><01>vdF,<17>k N. HüserN.Hüser<17>j H. FriessH.Friess<1B>i# B. HolzmannB.Holzmann<0F>h M. LuM.Lu<19>g! S. SchulzeS.Schulze<13>f C. MadlC.Madl<1D>e% T. ReibergerT.Reiberger!<21>d) #J. FeichtingerJ.Feichtinger<1B>c# C. IlliaschC.Illiasch<1F>b' !F. PleiningerF.Pleininger<1D>a% N. PfistererN.Pfisterer<15>` E. FuchsE.Fuchs<1B>_# M. YalınayM.Yalınay<1B>^# C. ErdoğduC.Erdoğdu<19>]! T. KarakanT.Karakan<15>\ C. SofiaC.Sofia<1D>[% C. GregórioC.Gregório<1B>Z# A. OliveiraA.Oliveira<1F>Y' !D. BranquinhoD.Branquinho<1D>X% I. SydorchukI.Sydorchuk<1D>W% L. SydorchukL.Sydorchuk<15>V P. FominP.Fomin<1D>U% R. SydorchukR.Sydorchuk<1D>T% A. SydorchukA.Sydorchuk<17>S V. BocharV.Bochar<17>R O. BocharO.Bochar<1B>Q# E. SklyarovE.Sklyarov<11>P Y. LiuY.Liu<11>O M. MinM.Min<0F>N Y. BiY.Bi<1B>M# B. GrahovacB.Grahovac<17>L D. StimacD.Stimac<17>K D. KovačD.Kovač<1D>J% M. ČarapinaM.Čarapina<15>I S. MilicS.Milic$<24>H-B. Mohar VitezicB.MoharVitezic<19>G! J. PrakashJ.Prakash<15>F G. StormG.Storm<1B>E# B. ÖztürkB.Öztürk<17>D R. BansalR.Bansal<1C>C%R. E. CastroR.E.Castro%<25>B- C.m.p. RodriguesC.m.p.Rodrigues"<22>A+P. M. RodriguesP.M.Rodrigues<1C>@%M. B. AfonsoM.B.Afonso<1C>?%A. L. SimãoA.L.Simão<15>> N. RossoN.Rosso<1D>=% C. TiribelliC.Tiribelli<1D><% F. ZanconatiF.Zanconati<19>;! D. BonazzaD.Bonazza<1D>:% N. DemanziniN.Demanzini<1B>9# M. GiuricinM.Giuricin<1D>8% S. PalmisanoS.Palmisano<1E>7'S. E. GambaroS.E.Gambaro<1E>6'P. J. GiraudiP.J.Giraudi,<2C>55)C. M. ChackeleviciusC.M.Chackelevicius<11>4 Y. NieY.Nie<0F>3 H. HeH.He<11>2 X. LiuX.Liu<15>1 F. BendeF.Bende<18>0!R. G. MareR.G.Mare<17>/ A. StepanA.Stepan<17>. M. DanilaM.Danila<1D>-% R.l.d. SirliR.l.d.Sirli<19>,! A. PopescuA.Popescu<17>+ I. SporeaI.Sporea<1B>*# R. LupusoruR.Lupusoru<17>) M. ParolaM.Parola<17>( E. AlbanoE.Albano<1D>'% E. BugianesiE.Bugianesi<1B>&# P. PontissoP.Pontisso<19>%! G. VillanoG.Villano<15>$ C. BoccaC.Bocca<13># E. NovoE.Novo<19>"! S. BruzzìS.Bruzzì<17>! B. FogliaB.Foglia<19> ! S. CannitoS.Cannito<15> S. SuttiS.Sutti<19>! E. MorelloE.Morello<13> T. OhtaT.Ohta<1B># Y. YamamotoY.Yamamoto<17> S. TakadaS.Takada<15> S. KanouS.Kanou<1D>% T. MiyashitaT.Miyashita<17> M. NakuraM.Nakura<1D>% Peter WittekPeterWittek<1D>% Gael SentísGaelSentís<1D>% Alex MonràsAlexMonràs<1D>% Wenbing ZhaoWenbingZhao<19>! Jinyang LiJinyangLi<1F>' Russell PowerRussellPower<1B># Yair SovranYairSovran*<2A>3!Larry J. StockmeyerLarryJ.Stockmeyer <20>)Nancy A. LynchNancyA.Lynch<1B># David GreggDavidGregg<1D> % Mark PurcellMarkPurcell<1F> ' Owen CallananOwenCallanan<1D> % Jimmy ClearyJimmyCleary<1F>
' Raouf BoutabaRaoufBoutaba)<29> 1 Mosharaf ChowdhuryMosharafChowdhury"<22>+Nils J. NilssonNilsJ.Nilsson"<22>+Brian F. CooperBrianF.Cooper#<23>+ Nicolas SchiperNicolasSchiper<11> Chi HoChiHo"<22>+G. Nigel MartinG.NigelMartin'<27>/ Philippe FlajoletPhilippeFlajolet!<21>) Oliver RiordanOliverRiordan<1F>' Svante JansonSvanteJanson#<23>+ Béla BollobásBélaBollobás!<21>) Keith PlayfordKeithPlayford'<27>~/ Jonathan BachrachJonathanBachrach!<21>}) Chris JermaineChrisJermaine*<2A>|3Luis Leopoldo PerezLuisLeopoldoPerez<1B>{# Shangyu LuoShangyuLuo<1C>z%Zekai J. GaoZekaiJ.Gao&<26>y/Samuel C. KendallSamuelC.Kendall<1D>x% Ann WollrathAnnWollrath<1B>w# Geoff WyantGeoffWyant<17>v Jim WaldoJimWaldo%<25>u-# Chung-Chieh ShanChung-ChiehShan<1F>t' Oleg KiselyovOlegKiselyov'<27>s/ Sebastian FischerSebastianFischer <20>r)C. A. R. HoareC.A. R.Hoare<17>q Bin ShengBinSheng!<21>p) Qingxiong YangQingxiongYang<1D>o% Zezhou ChengZezhouCheng<19>n! Gong ZhangGongZhang <02>
ZZ<02><00>d<EFBFBD>
-<02>'CCEvent-Driven FRP<07>Functional Reactive Programming (FRP) is a high-level declarative language for programming reactive systems. Previous work on FRP has demonstrated its utility in a wide range of application domains, including animation, graphical user interfaces, and robotics. FRP has an elegant continuous-time denotational semantics. However, it guarantees no bounds on execution time or space, thus making it unsuitable for many embedded real-time applications. To alleviate this problem, we recently developed Real-Time FRP (RT-FRP), whose operational semantics permits us to formally guarantee bounds on both execution time and space. In this paper we present a formally verifiable compilation strategy from a new language based on RT-FRP into imperative code. The new language , called Event-Driven FRP (E-FRP), is more tuned to the paradigm of having multiple external events. While it is smaller than RT-FRP, it features a key construct that allows us to compile the language into efficient code. We have used this language and its compiler to generate code for a small robot controller that runs on a PIC16C66 micro-controller. Because the formal specification of compilation was crafted more for clarity and for technical convenience, we describe an implementation that produces more efficient code.PADL02017-09-06T01:57:20.83715212017-09-06T01:57:20.8371521<EFBFBD>|<7C>
Q<02>#GGCommunicating Sequential Processes<07>This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method. When combined with a development of Dijkstra's guarded command, these concepts are surprisingly versatile. Their use is illustrated by sample solutions of a variety of a familiar programming exercises.Commun. ACM02017-09-06T01:57:19.9567060552017-09-06T01:57:19.956706055<EFBFBD>"<22>
/<02>+<2B>EEDeep Colorization<07>This paper investigates into the colorization problem which converts a grayscale image to a colorful version. This is a very difficult problem and normally requires manual adjustment to achieve artifact-free quality. For instance, it normally requires human-labelled color scribbles on the grayscale target image or a careful selection of colorful reference images (e.g., capturing the same scene in the grayscale target image). Unlike the previous methods, this paper aims at a high-quality fully-automatic colorization method. With the assumption of a perfect patch matching technique, the use of an extremely large-scale reference database (that contains sufficient color images) is the most reliable solution to the colorization problem. However, patch matching noise will increase with respect to the size of the reference database in practice. Inspired by the recent success in deep learning techniques which provide amazing modeling of large-scale data, this paper re-formulates the colorization problem so that deep learning techniques can be directly employed. To ensure artifact-free quality, a joint bilateral filtering based post-processing step is proposed. Numerous experiments demonstrate that our method outperforms the state-of-art algorithms both in terms of quality and speed.2015 IEEE International Conference on Computer Vision (ICCV)02017-09-06T01:57:18.345239992017-09-06T01:57:18.34523999 X <07>X<00>M<EFBFBD> <00><02>/GGThe BUDS Language for Distributed Bayesian Machine Learning<07>We describe BUDS, a declarative language for succinctly and simply specifying the implementation of large-scale machine learning algorithms on a distributed computing platform. The types supported in BUDS--vectors, arrays, etc.--are simply logical abstractions useful for programming, and do not correspond to the actual implementation. In fact, BUDS automatically chooses the physical realization of these abstractions in a distributed system, by taking into account the characteristics of the data. Likewise, there are many available implementations of the abstract operations offered by BUDS (matrix multiplies, transposes, Hadamard products, etc.). These are tightly coupled with the physical representation. In BUDS, these implementations are co-optimized along with the representation. All of this allows for the BUDS compiler to automatically perform deep optimizations of the user's program, and automatically generate efficient implementations.SIGMOD Conference02017-09-06T01:57:25.1383999022017-09-06T01:57:25.138399902<EFBFBD>[<5B>
K<02>M7GGA Note on Distributed Computing<07>We argue that objects that interact in a distributed system need to be dealt with in ways that are intrinsically different from objects that interact in a single address space. These differences are required because distributed systems require that the programmer be aware of latency, have a different model of memory access, and take into account issues of concurrency and partial failure. We look at a number of distributed systems that have attempted to paper over the distinction between local and remote objects, and show that such systems fail to support basic requirements of robustness and reliability. These failures have been masked in the past by the small size of the distributed systems that have been built. In the enterprise-wide distributed systems foreseen in the near future, however, such a masking will be impossible. We conclude by discussing what is required of both systems-level and application-level programmers and designers if one is to take distribution seriously.Mobile Object Systems02017-09-06T01:57:24.1960529792017-09-06T01:57:24.196052979<EFBFBD>t<EFBFBD>
s<02>]1GGPurely functional lazy nondeterministic programming<07>Functional logic programming and probabilistic programming have demonstrated the broad benefits of combining laziness (non-strict evaluation with sharing of the results) with non-determinism. Yet these benefits are seldom enjoyed in functional programming, because the existing features for non-strictness, sharing, and non-determinism in functional languages are tricky to combine.
We present a practical way to write purely functional lazy non-deterministic programs that are efficient and perspicuous. We achieve this goal by embedding the programs into existing languages (such as Haskell, SML, and OCaml) with high-quality implementations, by making choices lazily and representing data with non-deterministic components, by working with custom monadic data types and search strategies, and by providing equational laws for the programmer to reason about their code.J. Funct. Program.02017-09-06T01:57:21.7149570312017-09-06T01:57:21.714957031 <05><05><00>j<EFBFBD>
Y<02> ??D-Expressions: Lisp Power, Dylan Style<07>1 Abstract This paper aims to demonstrate that it is possible for a language with a rich, conventional syntax to provide Lisp-style macro power and simplicity. We describe a macro system and syntax manipulation toolkit designed for the Dylan programming language that meets, and in some areas exceeds, this standard. The debt to Lisp is great, however, since although Dylan has a conventional algebraic syntax, the approach taken to describe and represent that syntax is distinctly Lisp-like in philosophy. 2 Introduction The ability to extend a programming language with new constructs is a valuable tool. With it, system designers can grow a language towards their problem domain and enhance productivity and ease of maintenance. A macro system provides this capability in a portable, high-level fashion by allowing new constructs to be implemented in terms of existing ones via programmer-defined source-to-source transformations. Beyond the above, the ability to read, write, and easily manipulate the syntax of a language from within that language can be especially powerful. It can allow the full language to be brought to bear when implementing macros. It can provide a convenient means of saving and restoring structured data in text form. It can form the basis of code analysis tools and be the starting point for experiments with new language processors or into modified language semantics. Lisp is the only language family (cf [9], [10]) that has succeeded in providing integrated macro systems along with simple and powerful syntax manipulation tools like these. They are considered one of Lisp's unique strengths, perhaps even the most important and distinctive feature of the language. But the key to their viability in Lisp is the simplicity and regularity of its syntax. Recognizing their utility, attempts have been made to provide powerful macro facilities in languages with more conventional syntaxes like those of C or Pascal, but in comparison with what Lisp provides, the solutions have been restrictive, difficult to explain and use, or both. None have been standardized. Further, the utility of syntax manipulation tools independent of the macroex-pansion process is typically forgotten. This paper aims finally to demonstrate that it is possible for a language with a richer, more conventional syntax to provide Lisp-style macro power and simplicity. We describe a macro system and syntax manipulation toolkit designed for the Dylan programming language (cf [13], [7]) that meets our goals as well as, if not better than, those commonly …02017-09-06T01:57:25.952252017-09-06T01:57:25.95225 r{r<00><05>
C<02>!5GGByzantine Chain Replication<07>We present a new class of Byzantine-tolerant State Machine Replication protocols for asynchronous environments that we term Byzan-tine Chain Replication. We demonstrate two implementations that present different trade-offs between performance and security, and compare these with related work. Leveraging an external reconfiguration service, these protocols are not based on Byzantine consensus, do not require majority-based quorums during normal operation, and the set of replicas is easy to reconfigure. One of the implementations is instantiated with t + 1 replicas to tolerate t failures and is useful in situations where perimeter security makes malicious attacks unlikely. Applied to in-memory BerkeleyDB replication, it supports 20,000 transactions per second while a fully Byzantine implementation supports 12,000 transactions per second—about 70% of the throughput of a non-replicated database.OPODISdistributed_systems/2017-09-06T01:57:30.0607590332017-09-06T01:57:30.060759033<EFBFBD><18>
<00> 7GGProbabilistic Counting Algorithms for Data Base Applications<07>J. Comput. Syst. Sci.02017-09-06T01:57:28.2746000982017-09-06T01:57:28.274600098<EFBFBD>e<EFBFBD>
s<02>1?GGThe phase transition in inhomogeneous random graphs<07>The 'classical' random graph models, in particular G(n, p), are 'homogeneous', in the sense that the degrees (for example) tend to be concentrated around a typical value. Many graphs arising in the real world do not have this property, having, for example, power-law degree distributions. Thus there has been a lot of recent interest in defining and studying 'inhomogeneous' random graph models. One of the most studied properties of these new models is their 'robust-ness', or, equivalently, the 'phase transition' as an edge density parameter is varied. For G(n, p), p = c/n, the phase transition at c = 1 has been a central topic in the study of random graphs for well over 40 years. Many of the new inhomogeneous models are rather complicated; although there are exceptions, in most cases precise questions such as determining exactly the critical point of the phase transition are approachable only when there is independence between the edges. Fortunately, some models studied have this property already, and others can be approximated by models with independence. Here we introduce a very general model of an inhomogeneous random graph with (conditional) independence between the edges, which scales so that the number of edges is linear in the number of vertices. This scaling corresponds to the p = c/n scaling for G(n, p) used to study the phase transition; also, it seems to be a property of many large real-world graphs. Our model includes as special cases many models previously studied. We show that, under one very weak assumption (that the expected number of edges is 'what it should be'), many properties of the model can be determined, in particular the critical point of the phase transition, and the size of the giant component above the transition. We do this by relating our random graphs to branching processes, which are much easier to analyze. We also consider other properties of the model, showing, for example, that when there is a giant component, it is 'stable': for a typical random graph, no matter how we add or delete o(n) edges, the size of the giant component does not change by more than o(n).Random Struct. Algorithms02017-09-06T01:57:26.8461479492017-09-06T01:57:26.846147949
<00>5<07>"<07><07><07>xmVM@8-<04>"\<06><06>p<06><06><06><06><06><06>xk[RH:,# <05><05>d<05><05><05><05>lbM9/&<03><04><04><0F><08><0F><0F><0F><0F>,<0F><0F><0F><0F>sa<03>X<07>OL04
m<04><0E>p<0E>C<04><0E><0E><0E>?<0E><0E><0E><0E><0E><04>g<03>U>!<03><08> <0A> <0A> <0A> <0A> <0A>5 <0A><08> <0A> <0A> p e U G 3 ' <07>A <0C> <0C> <0C>" <0C> <0C> <0C> <0C>5<04> <0C> <0C> <0C> { k M >Q -  <0B> <0B><08> <0B> <0B> <0B><08> <0B> s<03> d Z M 3] #  
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
~
t
j
^
S<03>
A
4
<07>

 <09> <09><08> <09> <09> <09> <09> <09> <09> <09> t f [ Q<04> ; "  <08>H<08> qemu<04>pri|9senders and recipientst parityppracticalc!relativity^+process crashes\/reliable delivery[!provenanceY Cperformance and consistencyPrmqJ
pmcmcGpgaD3resource allocation?%object store= popular8 ramcloud0 poincar')optimal scheme)order function
onion secrecy 5reactive programmingpow<03> prob<03>predicate<03>1persistent storage<00>%Operformance and energy efficiency!percolator<03>pen<02> pcsa>)paxos protocol<00>+paxos algorithmj paxos('path planningn pastry<03> pass%partial view<00>/partial synchronyX1partial evaluationW1paravirtualization<00>;parametric polymorphism<02>1parallel operation<01>par<03> panorama<01> pagerank paceowsr!own action<03> overlay<01>#overfitting!out-of-bag)others' action<01>otgC%ossificationKosdoory<03> oracle(9optimistic replication<02>%optical flow<01>operating
opera<01>
olognlodtf octrees<01>och/occurrence typing=
occam/
ocaml!1obstacle avoidance<00>-observer pattern<03>+object-orientedw)number of tags<03>)rough estimate<03>
radio<03> pnut<03> quorum<03>'pop operation<03> rati<03>pig<03> reactive<03> pre-copy<03> reduct<03>!repository<03>5potential antecedent}1personal computingy-relational modelh+quantum channelb%registration\psiZ safeP seniorS sender<01> seminal semantic<02>5security and privacy /security analysisa seam<01>
sdd-1<02> scheduler schedul sch rli} scanning<01>/scaling procedure<00> scalable<00>-sampling service<01>!same topic<02>
salsa saa<01>rushrrus; run-time7rpc[)ros productioni roadway<01>%road surface<01>
rithm<00> ripemd<01> rime<01> rgbd>'rgb-d mapping@%rgb-d camera<rfs=rest architectural style1resource discovery}Aresilient overlay networks<00>!resilience<01>#resemblance
!reputation45replication protocolB replica<01> replirendering& relevant<00>)relative error<02>3relational database<02>'reinforcement<02>-regular category#reflectance1reference database)1reference counting<00>+reference count<00>#refactoringrecursion2=reconstruction algorithm<01>#reclamation| recent<02> reboot<00> realism% read<01>rcuzrbf<00>#ray tracing)rayX%randomforest)random testing<00>%random graph8 random<00> radiance\ racket?)race conditionD quotient&!quickcheck<00>
queued-query processing<02>)quantum search<02>/quantum computing<02>qos<00> puzzle<01>put<02> push
pulseC;public-key cryptosystem!public-key<00>!psychology<01>=prototype-based languageD/programming model<00>%programmatic<02>9probabilistic counting= proach<01>privilege<01>1priority inversionprimitive<01> primary&prf<01> preterm
preterlpreW!powergraphi
posixQ port<01>#polymorphico9poisson reconstruction! pointerQpmv"%plementation<01> plementY plannero plaid pitfall` ping<00>!photograph+-phase transition;pes<00> pertur<01>/personal computer <<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>}rg\QF;0%<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>vk`UJ?4* <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> } r g \ Q F ; 0 %    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> w l a V K @ 5 + 
<0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> | q f [ P E : / $   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>

t
i
^
S
H
=
2
'


 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> x m b W L A 6 + 
<08><08><08><08><08><08><08><08><08><08><08><08>{peZOD:0%<07><07><07><07><07><07><07><07><07><07><07><07>vk`VK@5* <06><06><06><06><06><06><06><06><06><06><06><06>zodYNC8-" <05><05><05><05><05><05><05><05><05><05><05>~sh]SH=2'<04><04><04><04><04><04><04><04><04><04><04><04>wlaVK@5* <03><03><03><03><03><03><03><03><03><03><03><03>zoeZOE:/$<02><02><02><02><02><02><02><02><02><02><02><02><08>%gs<08>$,s<07>#ns<08>"+p<07>!(p<08> *n<08>)n<08>(n<08>'n<08>&n<08>%m<08>Pl<07>(l<08><01>l<08>gl<08>$l<08>#k<08>"k<07>(k<08>!k<08> k<07>Tj<08>j<08>~j<08> j<08> <01>i<08> <01>i<08>
i<08> i<08>i<08>h<08>h<08>h<08>h<08>h<08>g<08>g<08>g<08>g<08>~g<08>}g<08>|g<08>{g<08>zf<08>y f<08>x f<08>w<01>f<08>vZf<08>u f<08>t
f<08>s f<08>rf<08>qf<08>pe<08>oe<08>ne<08>m<02>e<08>le<08>k<02>d<08>jd<08>id<08>hd<08>g<03>d<08>f<03>c<08>e<03>c<08>d<03>c<07>cgc<08>bHc<08>a<03>a<08>`<03>a<08>_<03>a<08>^<03>a<08>]<03>a<08>\<03>]<08>[<03>]<08>Zd]<08>Y<03>]<08>X<03>]<07>Wm[<08>V<02>[<08>U<03>[<08>T<03>[<08>S<03>[<08>R<03>[<08>Q<03>[<08>P<03>[<08>O<03>[<08>N<03>Y<08>M<03>Y<08>L<03>Y<08>KY<08>J<03>X<08>I<03>X<08>H<03>X<08>G<03>X<08>F<03>X<08>E<03>V<08>D<03>V<08>C<03>V<08>B<03>V<08>A<03>V<08>@<03>U<08>?<03>U<08>><03>U<08>=<03>U<08><<03>U<08>;<03>S<08>:<03>S<08>9<03>S<08>8<03>S<08>7<03>S<08>6<03>R<08>5<03>R<07>4&R<08>3<03>R<08>2<03>R<08>1<03>P<08>0<03>P<08>/<03>P<08>.<03>P<08>-<03>P<08>,<03>O<08>+<03>O<08>*<03>O<08>)<03>O<07>(nO<08>'<03>M<08>&<03>M<08>%<03>M<08>$MM<08>#<03>M<08>"<03>L<08>!BL<07> (L<07>&L<08><03>L<08><03>K<08><03>K<08>cK<08><03>K<08><03>K<08><03>H<08><03>H<08>]H<08>~H<08><03>H<08><03>G<08><03>G<08><03>G<08><03>E<08><03>E<08><03>E<08> <03>E<08> <03>E<08> <03>C<08>
<03>C<08> <03>C<08><03>C<08><03>C<08><03>B<08><03>B<08><00>B<08>]B<08><00>B<08><03>A<08><03>A<08>A<08>~<03>A<08>}<03>A<08>|<02>@<08>{<01>@<08>z<01>@<08>y<03>@<08>xY@<08>w<03>@<07>vn@<08>u<03>=<08>t<03>=<08>s<03>=<08>r<03>=<08>q<03>=<08>p<03>=<08>o<03><<08>n<03><<08>m<03><<08>l<03><<08>k<03><<08>j<03>;<08>i<03>;<08>h<03>;<08>g<03>;<08>f<03>;<08>e59<08>dg9<08>c<03>9<08>br9<08>a<03>9<08>`<03>8<08>_<01>8<08>^<03>8<08>]~8<08>\<03>8<08>[<03>6<08>Z<03>6<08>Y<03>6<08>X 6<08>W<03>6<08>V<03>5<08>U<03>5<08>T<03>5<08>S<03>5<08>R<03>5<08>Q<03>3<08>P[3<08>O<03>3<08>N<03>3<07>ME3<08>L<03>2<08>K<00>2<08>J<03>2<08>I<03>2<08>H<03>2<08>G<01>0<08>F<03>0<08>E<03>0<08>D<03>0<07>CE0<08>B<03>.<08>A<01>.<08>@.<08>?~.<08>>j.<08>=}+<08><|+<08>;{+<07>:u*<08>9z*<08>8y)<08>7x)<08>6w)<08>5v)<08>4u)<08>33(<08>2t'<08>1<00>'<08>0s'<08>/r'<08>.<01>'<07>-L'<08>,q'<08>+<00>'<08>*p'<08>)o'<08>(n&<08>'<00>&<08>&<00>&<08>%m&<07>$E&<08>#<00>%<07>"'%<08>!~%<08> l%<08>k%<08>j#<08><02>#<08><01>#<07>'#<08>i"<08>h!<08>g!<08>f!<08>!<08>e <07>( <08>d<08>c<08>b<08>a<08>`<08>_<08> <02><08> ^<08> ]<07>
<08> \<08><01><08>[<08><01><08>Z<08>Y<08>X<08>W<08>V<08><00><08>U<08>~T<08>}S<08>|R<08>{Q<08>zP<08>yO<08>xN<08>wM<08>vL<08>uK<08>tJ<08>s<00><08>rI<08>qH<08>pG<08>o<01><07>n(<08>m<02><08>lF<08>kE<08>jD 
<EFBFBD> 
<EFBFBD><00>@<40> <00><02>) QGGThe Quest for Artificial Intelligence a History of Ideas and Achievements<07>In the second full paragraph of page 21, change George A. Miller's dates from " (1920—) " to " (1920—2012) " In the last full paragraph of page 33, replace " The claim that these " in the sentence " The claim that these two ... " by " That these " and eliminate the parenthetical sentence following that sentence, (" The claim has not. .. "). Move footnote #51 to occur along with footnote #50.comp_sci_fundamentals_and_history/2017-09-06T01:57:31.8308889162017-09-06T01:57:31.830888916<EFBFBD>{<7B>
k<02>w#GGSpanner: Google's globally-distributed database<07>Spanner is Google&#8217;s scalable, multiversion, globally distributed, and synchronously replicated database. It is the first system to distribute data at global scale and support externally-consistent distributed transactions. This article describes how Spanner is structured, its feature set, the rationale underlying various design decisions, and a novel time API that exposes clock uncertainty. This API and its implementation are critical to supporting external consistency and a variety of powerful features: nonblocking reads in the past, lock-free snapshot transactions, and atomic schema changes, across all of Spanner.SYSTORdatastores/2017-09-06T01:57:31.0758159182017-09-06T01:57:31.075815918 MM<00>/<2F>
Q<02>%/aGGA survey of network virtualization<07>Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute of the future inter-networking paradigm. By introducing a plurality of heterogeneous network architectures cohabiting on a shared physical substrate, network virtualization promotes innovations and diversified applications. In this paper, we survey the existing technologies and a wide array of past and state-of-the-art projects on network virtualization followed by a discussion of major challenges in this area. The Internet has been stunningly successful over the course of past three decades in supporting multitude of distributed applications and a wide variety of network technologies. However, its popularity has become the biggest impediment to its further growth. Due to its multi-provider nature, adopting a new architecture or modification of the existing one requires consensus among competing stakeholders. As a result, alterations to the Internet architecture have become restricted to simple incremental updates and deployment of new network technologies have become increasingly difficult [1,2]. To fend off this ossification, network virtualization has been propounded as a diversifying attribute of the future inter-networking paradigm. Even though architectural purists view network virtualization as a means for evaluating new architectures, the pluralist approach considers vir-tualization as a fundamental attribute of the architecture itself [1]. They believe that network virtualization can eradicate the ossifying forces of the Internet and stimulate innovation [1,2]. A networking environment supports network virtual-ization if it allows coexistence of multiple virtual networks on the same physical substrate. Each virtual network (VN) in a network virtualization environment (NVE) is a collection of virtual nodes and virtual links. Essentially, a virtual network is a subset of the underlying physical network resources. Network virtualization proposes decoupling of func-tionalities in a networking environment by separating the role of the traditional Internet Service Providers (ISPs) into two: infrastructure providers (InPs), who manage the physical infrastructure, and service providers (SPs), who create 1389-1286/$-see front matter Ó 2009 Elsevier B.V. All rights reserved.Computer Networksparadigms/functional_reactive_programming/2017-09-06T01:57:33.1342109382017-09-06T01:57:33.134210938 <00>
*<03><00><00><1D>
m<02>=#GGTransactional storage for geo-replicated systems<07>We describe the design and implementation of Walter, a key-value store that supports transactions and replicates data across distant sites. A key feature behind Walter is a new property called <i>Parallel Snapshot Isolation</i> (PSI). PSI allows Walter to replicate data asynchronously, while providing strong guarantees within each site. PSI precludes write-write conflicts, so that developers need not worry about conflict-resolution logic. To prevent write-write conflicts and implement PSI, Walter uses two new and simple techniques: preferred sites and counting sets. We use Walter to build a social networking application and port a Twitter-like application.SOSPdatastores/2017-09-06T01:57:35.9804140622017-09-06T01:57:35.980414062<EFBFBD>/<2F>
i<02>O5GGConsensus in the presence of partial synchrony<07>The concept of partial synchrony in a distributed system is introduced. Partial synchrony lies between the cases of a synchronous system and an asynchronous system. In a synchronous system, there is a known fixed upper bound &#916; on the time required for a message to be sent from one processor to another and a known fixed upper bound &PHgr; on the relative speeds of different processors. In an asynchronous system no fixed upper bounds &#916; and &PHgr; exist. In one version of partial synchrony, fixed bounds &#916; and &PHgr; exist, but they are not known a priori. The problem is to design protocols that work correctly in the partially synchronous system regardless of the actual values of the bounds &#916; and &PHgr;. In another version of partial synchrony, the bounds are known, but are only guaranteed to hold starting at some unknown time <italic>T</italic>, and protocols must be designed to work correctly regardless of when time <italic>T</italic> occurs. Fault-tolerant consensus protocols are given for various cases of partial synchrony and various fault models. Lower bounds that show in most cases that our protocols are optimal with respect to the number of faults tolerated are also given. Our consensus protocols for partially synchronous processors use new protocols for fault-tolerant &#8220;distributed clocks&#8221; that allow partially synchronous processors to reach some approximately common notion of time.J. ACMdistributed_systems/2017-09-06T01:57:35.0608120122017-09-06T01:57:35.060812012<EFBFBD>R<EFBFBD>
Y<02>-1GGFast asymmetric thread synchronization<07>For most multi-threaded applications, data structures must be shared between threads. Ensuring thread safety on these data structures incurs overhead in the form of locking and other synchronization mechanisms. Where data is shared among multiple threads these costs are unavoidable. However, a common access pattern is that data is accessed primarily by one dominant thread, and only very rarely by the other, non-dominant threads. Previous research has proposed biased locks, which are optimized for a single dominant thread, at the cost of greater overheads for non-dominant threads. In this article we propose a new family of biased synchronization mechanisms that, using a modified interface, push accesses to shared data from the non-dominant threads to the dominant one, via a novel set of message passing mechanisms. We present mechanisms for protecting critical sections, for queueing work, for caching shared data in registers where it is safe to do so, and for asynchronous critical section accesses. We present results for the conventional Intel&#174; Sandy Bridge processor and for the emerging network-optimized many-core IBM&#174; PowerEN#8482; processor. We find that our algorithms compete well with existing biased locking algorithms, and, in particular, perform better than existing algorithms as accesses from non-dominant threads increase.TACOmemory_management/2017-09-06T01:57:33.9853110352017-09-06T01:57:33.985311035 <02> <0B>m<06><02><00>#<23>
g<02>C/CCHigh-throughput DNA sequence data compression<07>The exponential growth of high-throughput DNA sequence data has posed great challenges to genomic data storage, retrieval and transmission. Compression is a critical tool to address these challenges, where many methods have been developed to reduce the storage size of the genomes and sequencing data (reads, quality scores and metadata). However, genomic data are being generated faster than they could be meaningfully analyzed, leaving a large scope for developing novel compression algorithms that could directly facilitate data analysis beyond data transfer and storage. In this article, we categorize and provide a comprehensive review of the existing compression methods specialized for genomic data and present experimental results on compression ratio, memory usage, time for compression and decompression. We further present the remaining challenges and potential directions for future research.Briefings in Bioinformaticsdata_compression/2017-09-06T01:57:46.13952712017-09-06T01:57:46.1395271y<EFBFBD> Q 1GGUEG Week 2016 Poster Presentations<07>languages/haskell/2017-09-06T01:57:40.3913911132017-09-06T01:57:40.391391113<EFBFBD>~<7E>
Y<02>_;1GGInductive Supervised Quantum Learning.<07>In supervised learning, an inductive learning algorithm extracts general rules from observed training instances, then the rules are applied to test instances. We show that this splitting of training and application arises naturally, in the classical setting, from a simple independence requirement with a physical interpretation of being nonsignaling. Thus, two seemingly different definitions of inductive learning happen to coincide. This follows from the properties of classical information that break down in the quantum setup. We prove a quantum de Finetti theorem for quantum channels, which shows that in the quantum case, the equivalence holds in the asymptotic setting, that is, for large numbers of test instances. This reveals a natural analogy between classical learning protocols and their quantum counterparts, justifying a similar treatment, and allowing us to inquire about standard elements in computational learning theory, such as structural risk minimization and sample complexity.Physical review lettersquantum_computing/2017-09-06T01:57:38.1712590332017-09-06T01:57:38.171259033<EFBFBD> <0A> y<02>M<EFBFBD>E5GGA Byzantine Fault Tolerant Distributed Commit Protocol<07>In this paper, we present a Byzantine fault tolerant distributed commit protocol for transactions running over un- trusted networks. The traditional two-phase commit protocol is enhanced by replicating the coordinator and by running a Byzantine agreement algorithm among the coordinator replicas. Our protocol can tolerate Byzantine faults at the coordinator replicas and a subset of malicious faults at the participants. A decision certificate, which includes a set of registration records and a set of votes from participants, is used to facilitate the coordinator replicas to reach a Byzantine agreement on the outcome of each transaction. The certificate also limits the ways a faulty replica can use towards non-atomic termination of transactions, or semantically incorrect transaction outcomes.Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007)distributed_systems/2017-09-06T01:57:37.1361069342017-09-06T01:57:37.136106934
<0F><00><01>s`L4#<0E><0E><0E><0E><0E><0E>whRB. <0A> <0A> <0A> <0A> <0A> <0A> <0A> v b I 5 !
<0C> <0C> <0C> <0C> <0C> <0C> <0C> q \ D 0  <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> x d P 7 $ 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
v
e
R
D
6
#
 <09> <09> <09> <09> <09> <09> <09> <09> x h Z G 5 ! <08><08><08><08><08><08>}kUB-<07><07><07><07><07><0F><07><01>pYD4"<06><06><06><06><06><06><06>m[I9! <05><05><05><05><05><05><05>s]F1<04><04><04><04><04>{dPC3<03><03><03><03><03><03><03><03>ubI>- <02><02><02><02><02><02><02><02>nYE)<0F><01><01><01><01><01><0F><0F>)Paula Tretkoff'Raouf Boutaba
-Randy L. BucknerQ!Randy Katz<01>'Randy H. Katz<01>)Randolph Lopez<01>!Rami YaredS#Rajat Monga<01>9Rafael Pérez Y Pérezs)Raed M. Kafafy+Radek Vingralek<02>-Rachid Guerraoui'Rachel Jewkes<05>%R.l.d. Sirli-R. Uchino<04>'R. T. Marinho<03>%R. SydorchukU'R. Slim Karam6R. Shirey<01>R. Sayegh5!R. Quispel~!R. MasettiL#R. Lupusoru*
R. Li<03>3R. Ha-Vinh Leuchter<01>'R. Gonçalves<03>R. Gaspar<03>!R. G. Mare0 R. Frei<04>%R. E. CastroCR. Daegon<04>R. Coelho<03>R. Casale$#R. Carvalho<03>R. BansalD!R. Araújo<03>Qiong Fei<05>)Qingxiong Yang<02>!Qiang Yang! Qi ChenK)Pushmeet Kohli<00>1Przemyslaw Wegrzyn\!EProofreader Jennifer Mcclain-Prasad Kawthekar!#Pranay Jain<00>'Prakash Linga@/Poul-Henning KampU)Pooja Aggarwale'Pietro Baroni~;Pierre-Évariste Dagand<01>+Phillip Rogaway<01>/Philippe Flajolet-Philippas Tsigas<01>)Philipp Haller<05>'Philip Wadler<01>%Philip Stutz#Philip Shao}%Philip S. Yu&'Philip Pronin<01>3Philip A. BernsteinC%Phil Bagwell<01>)Petra S. Huppi<01>3Peter-Pike J. Sloan,#Peter Wonka%Peter Wittek%Peter Wegner<02>)Peter Vosshall.%Peter Sewell'Peter Sanders<02>#Peter Marks-Peter J. Bentley #Peter Henry.-Peter G. Neumann})Peter Druschel<05>5Peter Boehler Bishop<05>%Peter Bailis#Perry Cheng2+Per-Åke Larson<00>/Pedro M. Domingos9Pedro J. Muñoz Merino<05>-Paula Gomes Mian<00>)Paul R. Wilson<01>)Paul Nordstrom<00>!Paul Hudak<01>-Paul F. Syverson<05>-Paul E. Mckenneyq#Paul Barham<00>/Paul A. Beardsleyn+Patrick Wendell<02>)Patrick StuediV-Patrick Mcdaniel<02>%Patrick Hunt<05>/Patrick E. O'neil<01>3Patrick D. Mcdanielf)Pat Stephenson<05>#Pat Helland<01>)Pascal Müller'Parveen PatelG Part One<05>7Parisa Jalili Marandi<05>+Parantap LahiriE%Paolo Viotti<02>'P. T. Kroener<04> P. Sousa<03>!P. Schwabl<03> P. Radu;#P. Queirós<03>#P. Pontisso&!P. Pockrosq!P. Pereira<03>P. Otazua<03>)P. N. N. Desai<04>#P. Ministro<03>+P. M. RodriguesA'P. J. Giraudi6'P. Invernizzip P. Geyer<03> P. FominV'P. Figueiredo<03>#P. Buggisch<03>%P. Azimzadehz#P. Andreonel)P. Alexandrino<03>%P. A. Mircea<03>+Owen S. Hofmann<05>'Owen Callanan )Otmar Hilliges<00>)Oskar Sandberg#-Oscar Nierstraszt'Oriol Vinyals<01>3Opim Salim Sitompul<00>)Oluwafemi Osho2)Oliver Riordan'Oleg Kiselyov<02>!Ole Agesen#O. Plehutsaj O. Negm+O. BocharR%Nuria OliverNoga Alon!Nir ShavitA%Nir Friedmanu!Ning Zhang<01>+Nils J. Nilsson+Nikolas IoannouT1Nikolaos Laoutaris<05>+Nicolas Schiper)Nick Mathewson<05>#Nick Benton<01>1Nicholas Smallbone5-Nhan Nguyen Dang<01>'Neha Narkhede#Neal Harrisl%Navendu Jain#Naty LeiserO1Nathanael Schärliu)Nathan Goodman<02>)Natalie Sebanz<01>3Naohiro HayashibaraQ)Nancy A. Lynch-Nal Kalchbrenner<02>-Naga Rekha Malae<01>3Nachiappan Nagappan<00>#N. Yamamoto<04>#N. Takahara<04>#N. Sasahira<04>#N. SakiyamaZ N. Rosso>%N. PfistereraN. Ohashi<04>)N. Muscatiello1!N. Machida<03>-N. L. H. Bekkali<04>N. Hüserk!N. Göschl<03>%N. Demanzini:%N. Al Hajjar>)Márk Jelasity~9Mustansir Hatim Pancha<04>9Muralidhar Subramanian<02>1Murali S. Kodialam<05>+Muhammad Naveed #Mu Y Thomas&1Mosharaf Chowdhury )Morteza Khayat'Moran TzafrirB1Moisés Goldszmidtw)Mohana RamaratnamP"GMohammad Ali A+Ramana M. Idury 'Raunaq Rewari"#Rasmus Pagh<02>)Paula B. Cohen <00><0F><0F><0F>}_: <0E><0E><0E><0E>zX< <0A> <0A> <0A> <0A> p N )   <0C> <0C> <0C> <0C> <0C> f N /  <0B> <0B> <0B> <0B> ~ ` C 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
b
B
 <09> <09> <09> <09> <09> a C / <08><08><08><08>oS7<07><07><07><07>u]=<06><06><06>z[C$
<05><05><05><05><05>V:"
<04><04><04><04>~fJ2<03><03><03><03><03>bF,<02><02><02><02>eG-<01><01><01><01><01>kO3<17>l R. GasparR.Gaspar<19>k! A. PeixotoA.Peixoto<19>j! H. CardosoH.Cardoso!<21>i) #A. AlbuquerqueA.Albuquerque<15>h M. SilvaM.Silva<13>g J. ReisJ.Reis<19>f! A. MartinsA.Martins<17>e L. SantosL.Santos<1B>d# R. CarvalhoR.Carvalho<19>c! M. CardosoM.Cardoso<17>b E. BrancoE.Branco<1B>a# J. CarvalhoJ.Carvalho<17>` V. AnapazV.Anapaz <20>_)M. A. El ZahryM.A. ElZahry<1A>^#Z. M. HefnyZ.M.Hefny"<22>]+A. T. AbdelmoezA.T.Abdelmoez<13>\ E. AdelE.Adel<19>[! M. AttallaM.Attalla<13>Z I. AokiI.Aoki<17>Y H. SasakiH.Sasaki<19>X! N. MachidaN.Machida<1B>W# T. IchikawaT.Ichikawa<15>V A. SilvaA.Silva<1B>U# P. MinistroP.Ministro!<21>T) #A. CastanheiraA.Castanheira<19>S! E. CancelaE.Cancela<19>R! R. AraújoR.Araújo<1D>Q% J. FernandesJ.Fernandes<15>P J. PinhoJ.Pinho<19>O! D. MartinsD.Martins<15>N P. SousaP.Sousa<19>M! J. RoseiraJ.Roseira<13>L T. GagoT.Gago<15>K L. ToméL.Tomé<1D>J% C. AgostinhoC.Agostinho<1F>I' !P. FigueiredoP.Figueiredo<15>H D. GomesD.Gomes<15>G S. LopesS.Lopes<19>F! C. LériasC.Lérias'<27>E/ )M. Gravito-SoaresM.Gravito-Soares<17>D E. SoaresE.Soares<19>C! I. LupescuI.Lupescu<19>B! G. ChiriacG.Chiriac<1F>A' !S. IoanitescuS.Ioanitescu<13>@ L. MicuL.Micu<17>? I. CopaciI.Copaci<1C>>%M. A. EljakyM.A.Eljaky<15>= S. AbbasS.Abbas<1C><%E. S. TharwaE.S.Tharwa <20>;)E. M. AbdelaalE.M.Abdelaal<17>: F. KarnelF.Karnel<17>9 J. KarnerJ.Karner/<2F>87 1M. Peck-RadosavljevicM.Peck-Radosavljevic<19>7! M. TraunerM.Trauner<1B>6# W. SieghartW.Sieghart<1D>5% A. FerlitschA.Ferlitsch<15>4 M. CejnaM.Cejna<1D>3% B. AngermayrB.Angermayr<1D>2% M. MandorferM.Mandorfer<19>1! P. SchwablP.Schwabl<19>0! N. GöschlN.Göschl)<29>/1 +M. Feldner-BusztinM.Feldner-Busztin<1B>.# M. DiermayrM.Diermayr<19>-! M. SchoderM.Schoder<19>,! T. BucsicsT.Bucsics<1D>+% H. GuerreiroH.Guerreiro <20>*)A. P. OliveiraA.P.Oliveira(<28>)1B. M. Santos PeixeB.M. SantosPeixe<15>( A. AlvesA.Alves<1B>'# P. QueirósP.Queirós<19>&! C. MartinsC.Martins<11>% A. VazA.Vaz<1B>$# C. TeixeiraC.Teixeira$<24>#-A. G. G. AntunesA.G. G.Antunes<0F>" R. LiR.Li"<22>!+J. I. EmparanzaJ.I.Emparanza<1C> %M. L. RinconM.L.Rincon<1B># U. MendarteU.Mendarte<1D>% L. ZubiaurreL.Zubiaurre#<23>+ %B. ArrizabalagaB.Arrizabalaga<1D>% G. LetamendiG.Letamendi<1E>'M. D. De JuanM.D. DeJuan<17> P. OtazuaP.Otazua<1B># E. SalvadorE.Salvador <20>)J. M. AlustizaJ.M.Alustiza<17> I. UrretaI.Urreta<17> E. ZapataE.Zapata.<2E>7A. Castiella EguzkizaA.CastiellaEguzkiza<1A>#H. I. SerinH.I.Serin<1B># T. YildirimT.Yildirim<15> A. AktasA.Aktas<1E>'Z. T. OzdemirZ.T.Ozdemir<1F>' !M. CelikbilekM.Celikbilek<15> B. ZhongB.Zhong<17> W. YanqinW.Yanqin<0F>  M. LiM.Li<0F>  J. YeJ.Ye<1C> %P. A. MirceaP.A.Mircea<15>
 M. IancuM.Iancu<1C> %S. D. ValeanS.D.Valean<17> M. GordanM.Gordan<18>!G. A. NagyG.A.Nagy <20>)M. A. MunteanuM.A.Munteanu<0F> Y. LiY.Li<0F> C. YuC.Yu<0F> C. XuC.Xu<13> Y. ChenY.Chen"<22>+J. P. H. DrenthJ.P. H.Drenth<1F>' T.j.g. GeversT.j.g.Gevers<17> W. KievitW.Kievit<1A>~#J. A. SloanJ.A.Sloan<1A>}#M. C. HoganM.C.Hogan(<28>|1S. M. H. VerheesenS.M. H.Verheesen*<2A>{3!M. K. K. NeijenhuisM.K. K.Neijenhuis<1D>z% P. AzimzadehP.Azimzadeh<19>y! S. IravaniS.Iravani<1F>x' !A. EshraghianA.Eshraghian<1E>w'A. P. KiyasovA.P.Kiyasov<1B>v# A. RizvanovA.Rizvanov<1C>u%M. A. TitovaM.A.Titova <20>t)A. A. GumerovaA.A.Gumerova"<22>s+G. R. BurganovaG.R.Burganova<17>r G. PevnevG.Pevnev"<22>q+M. O. MavlikeevM.O.Mavlikeev<1B>p# E. GaraninaE.Garanina#<23>o+ %A. ShafigullinaA.Shafigullina<17>n A. TitovaA.Titova"<22>m+E. I. SharipovaE.I.Sharipova<1B>l# D. HartmannD.Hartmann :<02><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|qf[PE:/$<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>ti^SH=2' <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> w l a V K @ 5 *   <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> z o d Y N C 8 - "   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> } r g \ Q F ; 0 %   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
u
j
_
T
I
>
3
(


 <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> x m b W L A 6 + 
<08><08><08><08><08><08><08><08><08><08><08><08>{peZOD9.# <07><07><07><07><07><07><07><07><07><07><07>~sh]RG<1&<06><06><06><06><06><06><06><06><06><06><06><06>vk`UJ?4)<05><05><05><05><05><05><05><05><05><05><05><05>yncXMB7,! <04><04><04><04><04><04><04><04><04><04><04>|qf[PE:/$<03><03><03><03><03><03><03><03><03><03><03>ti^SH=2'<02><02><02><02><02><02><02><02><02><02><02><02><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08> <04><08> <04><08> <04><08>
<04><08> <04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08><04><08>~<04><08>}<04><08>|<04><08>{<04><08>z<04><08>y<04><08>x<04><08>w<04><08>v<04><08>u<04><08>t<04><08>s<04><08>r<04><08>q<04><08>p<04><08>o<04><08>n<04><08>m<04><08>l<04><08>k<04><08>j<04><08>i<04><08>h<04><08>g<04><08>f<04><08>e<04><08>d<04><08>c<04><08>b<04><08>a<04><08>`<04><08>_<04><08>^<04><08>]<04><08>\<04><08>[<08>Z~<08>Y}<08>X|<08>W{<08>Vz<08>Uy<08>Tx<08>Sw<08>Rv<08>Qu<08>Pt<08>Os<08>Nr<08>Mq<08>Lp<08>Ko<08>Jn<08>Im<08>Hl<08>Gk<08>Fj<08>Ei<08>Dh<08>Cg<08>Bf<08>Ae<08>@d<08>?c<08>>b<08>=a<08><`<08>;_<08>:^<08>9]<08>8\<08>7[<08>6Z<08>5Y<08>4X<08>3W<08>2V<08>1U<08>0T<08>/S<08>.R<08>-Q<08>,P<08>+O<08>*N<08>)M<08>(L<08>'K<08>&J<08>%I<08>$H<08>#G<08>"F<08>!E<08> D<08>C<08>B<08>A<08>@<08>?<08>><08>=<08><<08>;<08>:<08>9<08>8<08>7<08>6<08>5<08>4<08>3<08>2<08> 1<08> 0<08> /<08>
.<08> -<08>,<08>+<08>*<08>)<08>(<08>'<08>&<08>%<08>$<08>#<08>~"<08>}!<08>| <08>{<08>z<08>y<08>x<08>w<08>v<08>u<08>t<08>s<08>r<08>q<08>p<08>o<08>n<08>m<08>l<08>k<08>j<08>i <08>h <08>g <08>f
<08>e <08>d<08>c<08>b<08>a<08>`<08>_<08>^<08>]<08>\<08>[<03><08>Z<03><08>Y<03><08>X<03><08>W<03><08>V<03><08>U<03><08>T<03><08>S<03><08>R<03><08>Q<03><08>P<03><08>O<03><08>N<03><08>M<03><08>L<03><08>K<03><08>J<03><08>I<03><08>H<03><08>G<03><08>F<03><08>E<03><08>D<03><08>C<03><08>B<03><08>A<03><08>@<03><08>?<03><08>><03><08>=<03><08><<03><08>;<03><08>:<03><08>9<03><08>8<03><08>7<03><08>6<03><08>5<03><08>4<03><08>3<03><08>2<03><08>1<03><08>0<03><08>/<03><08>.<03><08>-<03><08>,<03><08>+<03><08>*<03><08>)<03><08>(<03><08>'<03><08>&<03><08>%<03><08>$<03><08>#<03><08>"<03><08>!<03><08> <03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08> <03><08> <03><08> <03><08>
<03><08> <03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08><03><08>~<03><08>}<03><08>|<03><08>{<03><08>z<03><08>y<03><08>x<03><08>w<03><08>v<03><08>u<03><08>t<03><08>s<03><08>r<03><08>q<03><08>p<03><08>o<03><08>n<03><08>m<03><08>l<03><08>k<03><08>j<03><08>i<03><08>h<03><08>g<03><08>f<03><08>e<03><08>d<03>
<0F><00><01><0F><0F><0F><0F>}fQ<* <0E><0E><0E><0E><0E><0E>r\H4 <0A> <0A> <0A> <0A> <0A> <0A> y d J 4 #  <0C> <0C> <0C> <0C> <0C> <0C> <0C> p Z G 3 "  <0B><0F><0F> <0B> <0B> <0B> <0B> <0B> <0B> <0B> } k X I : .  
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
}
q
c
K
;
$

 <09> <09> <09> <09> <09> <09> <09> ~ p a R A 3 $  <08><08><08><08><08><08><08>raJ7" <07><07><07><07><07><07><07>ta<01>H1<06><06><06><06><06><06><06>{jZG0<05><05><05><05><05><05>nTC0<04><04><04><04><04><04>t^F5! <01><03><03><03><03><03><03><03>veN<'<02><02><02><02><02><02>r_K8'Scott Wallace<05>/Stephanie Miedema<05>/Srecko Joksimovic<05> CSwaminathan Sivasubramanian-'Svante Janson+Suvrat Bhooshan#'Susmit Sarkar)Sunny Consolvo<01>%Sunil Shukla31Sunil Kumar Shinde<04>'Sung-Eui Yoon>-Sudipta SenguptaH CSudheendra Vijayanarasimhan<01>/Stéphane Ducasses3Stéphane Clinchanti+Stijn Mostinckx<05>%Steven Smith1/Steven M. Lavalle[#Steven Hand<00>'Steven Awodey<02>#Steven Arzt^+Steve Marschnero%Steve Hodges<00>/Stephen M. Rumble<05>%Stephen Kell<01>#Stephen Fox<02>'Stephen ChongN)Stephan Ellner<02>)Steffen GrarupY#Stefan Frei<01>1Stefan Dziembowski<04>-Stefan Burkhardt<02>'Sriram Sankar<01>3Srinath T. V. Setty<00>-Srikanth Kandula%Srijan Kumar6!Somesh Jha<02>'Sofia Syntila<05>/Smruti R. Sarangif)Slava Chernyak<00>7Sivakumar Viswanathan<02>'Simon Parsons<02>%Simon MarlowO7Simon L. Peyton JonesR/Simon J. Thompson|-Simon J. Puglisih'Simon Haegler3Siegfried Rasthofer_'Shu-Chun Weng|7Shriram Krishnamurthie)Shojiro Nishio-Shiva Shivakumar@'Shiva Shankar<02>/Shinichi Kawamoto+'Shih-Fu Chang=!Shi-Min Hu##Sharad Goel<05>#Shangyu Luo<02> Shan He<04>'Shahram Izadi<00>'Sergey Melnik</Sergey Doroshenko<01>%Sergey BykovD Sen WangSeep Goeld/Sebastian Thrunyz<00>+Sebastian Thrun<01>/Sebastian Fischer<02>3Sebastian Deterding<01>'Scott Shenker<00>#Scott Owens+Scott A. Brandti#Saul Jaspan<05>#Satadru Pan<02>)Sanni Siltanen<00>+Sanjoy Dasgupta<00>'Sanjeev Kumar<02>+Sanjay GhemawatI-Sandhya Kunnatur<01>+Sander Dieleman<02>'Samuel Madden<00>/Samuel C. Kendall<02>#Samuel Benz<05>#Sam Whittle<00>3Sam Tobin-Hochstadt5#Sam Mcveety<00>#Salim Virjir%Sage A. Weilh%Sachin Katti<05>)Sabyasachi Roy<02>S. Y. Seo<04>!S. W. ShinA!S. W. PaikGS. W. Kim<04> S. Vitor<03>#S. TawefeekS. TakadaS. T. Lee<04> S. Sutti#S. Strassern!S. Schulzeg!S. Ryozawa<04>1S. R. R. Fernandes<03> S. Park<04>%S. Palmisano8S. O. Lee<04>S. Mizuno<04> S. MilicI%S. Matsubara<04>/S. Manolakopoulos!S. M. Park<04>1S. M. H. Verheesen| S. Lopes<03> S. Kim<04> S. KanouS. K. ChoB
S. Jo? S. Jang^!S. Ivashuki S. Ito<04>!S. Iravaniy'S. Ioanitescu<03> S. Iio<04>'S. Hohenestert S. Hefny!S. Hayashi<04> S. HanaS. H. Lee<04>S. H. Kim<04>'S. E. Gambaro7%S. D. Valean<03>!S. Cannito !S. Bruzzì"!S. BarakatS. B. Kim<04> S. Arai<04>%S. Abou Saif,)S. Abd-Elsalam S. Abbas<03>%Rémi Coulom<05>'Ryan Stutsman<05>#Ryan Farell<05>)Ryan CulpepperI'Russell Power-Russell C. Sears<05>3Russell C. Eberhart -Rusmin Soetjipto_Runhui Li<02>+Ruey-Lung HsiaoB3Roy Thomas Fielding%Rowan Davies4'Ross Paterson'+Roshan P. JamesQ#Rose F. Liu^#Ronald Parr<01>-Ronald L. Rivest<02>5Romi Fadillah Rahmat<00>+Rolf Neugebauer<00>-Roger Dingledine<05>!Roel Wuytsv3Rodrigo De Oliveira%Robin Milner?-Robert W. Sumnerp+Robert S. Boyer<01>/Robert N M WatsonV'Robert Morris<00>-Robert Griesemer]+Robert Fenichel=)Robert Escriva /Robert E. Shostak-Robert E. Gruberp/Robert D. Blumofe<01>/Robert Cartwright45Robert Bruce Findlerg)Robert Beverly %Robert Beals3Robbert Van Renesse Rob Pike !Rob Arthan<01>%Rilla Khaled<01>+Richard Steiger<05>+Richard Mortier,/Richard L. Hudsony-Richard Carlsson.3Richard A. Newcombe<00>!Reuven Lax<00>'Rean Griffith<01>!Ravi KumarU S Kabbaj!S Bouchiba <00>/<0F><0F><0F><0F>rZ/ <0E><0E><0E><0E><0E>bJ2 <0A> <0A> <0A> <0A> <0A> ] C  <0C> <0C> <0C> <0C> y [ 5  <0B> <0B> <0B> <0B> <0B> d H %
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
v
Z
,
<09> <09> <09> <09> k Q 5  <08><08><08>`A'<07><07><07><07>u[:<06><06><06><06><06>sTB' <05><05><05><05><05>z_A!<04><04><04><04>wcM7# <03><03><03><03><03>}cQ;%<02><02><02><02><02><02><02>mQ3<01><01><01><01><01>gM/<1B>s# A. FloreaniA.Floreani<17>r J. RegulaJ.Regula<19>q! P. PockrosP.Pockros<1F>p' !P. InvernizziP.Invernizzi<17>o C. BowlusC.Bowlus<1B>n# S. StrasserS.Strasser<1B>m# G. MazzellaG.Mazzella<1B>l# P. AndreoneP.Andreone<17>k F. NevensF.Nevens<1B>j# O. PlehutsaO.Plehutsa<19>i! S. IvashukS.Ivashuk<13>h M. KangM.Kang<11>g H. KooH.Koo<13>f K. SongK.Song<11>e T. LeeT.Lee<11>d K. HuhK.Huh<13>c Y. KangY.Kang<0F>b K. YuK.Yu<11>a S. HanS.Han<11>` K. RyuK.Ryu<13>_ Y. ChoiY.Choi<13>^ S. JangS.Jang<0F>] X. LiX.Li<17>\ K. TanakaK.Tanaka<17>[ A. SuzukiA.Suzuki<1B>Z# N. SakiyamaN.Sakiyama<13>Y H. WangH.Wang<13>X X. WangX.Wang<11>W X. ZhuX.Zhu<15>V L. ZhangL.Zhang<13>U W. MengW.Meng<11>T J. YanJ.Yan<13>S L. MiaoL.Miao<13>R W. ZhouW.Zhou<11>Q K. ZhuK.Zhu<15>P D. FestiD.Festi<19>O! A. PessionA.Pession<15>N A. PreteA.Prete#<23>M+ %K. KleinschmidtK.Kleinschmidt<19>L! R. MasettiR.Masetti<19>K! G. MarascoG.Marasco<1D>J% A. ColecchiaA.Colecchia<1B>I# F. RavaioliF.Ravaioli<18>H!M. S. ChoiM.S.Choi<18>G!S. W. PaikS.W.Paik<16>FK. C. KohK.C.Koh<16>EJ. H. LeeJ.H.Lee<13>D G. GwakG.Gwak<13>C W. KangW.Kang<16>BS. K. ChoS.K.Cho<18>A!S. W. ShinS.W.Shin<18>@!D. H. SinnD.H.Sinn<0F>? S. JoS.Jo<1C>>%N. Al HajjarN.AlHajjar<15>= C. IancuC.Iancu<15>< I. GrozaI.Groza<13>; P. RaduP.Radu <20>:)Z. A. SparchezZ.A.Sparchez<17>9 K. HoneinK.Honein<1E>8'J. Bou JaoudeJ.BouJaoude <20>7)A. Abou RachedA.AbouRached<1E>6'R. Slim KaramR.SlimKaram<17>5 R. SayeghR.Sayegh<15>4 J. HajalJ.Hajal<15>3 C. YaghiC.Yaghi<1C>2%A. S. HanafyA.S.Hanafy!<21>1) #N. MuscatielloN.Muscatiello<18>0!M. Di MasoM.DiMaso!<21>/) #A. FacciorussoA.Facciorusso<17>. M. YousefM.Yousef<1C>-%M. El GharibM.ElGharib<1C>,%S. Abou SaifS.AbouSaif<13>+ O. NegmO.Negm<1F>*' !L. SandulescuL.Sandulescu$<24>)-!L. M. SconfienzaL.M.Sconfienza<1F>(' !F. SardanelliF.Sardanelli<16>'G. Di LeoG.DiLeo<19>&! D. OrlandiD.Orlandi<19>%! C. MessinaC.Messina<17>$ R. CasaleR.Casale<1E>#'G. E. TontiniG.E.Tontini(<28>"1L. Carlo PescatoriL.CarloPescatori<1B>!# V. IvashkinV.Ivashkin<17>  C. PavlovC.Pavlov<19>! E. LiusinaE.Liusina<1E>'T. Voicu MogaT.VoicuMoga+<2B>3 -C. Ivascu-SiegfriedC.Ivascu-Siegfried<19>! A. MansourA.Mansour"<22>+M. Abd El-KaderM.AbdEl-Kader<19>! E. ShehataE.Shehata<15> S. HefnyS.Hefny<1B># W. El-GendyW.El-Gendy<19>! S. BarakatS.Barakat<19>! I. PedrotoI.Pedroto <20>)J. M. FerreiraJ.M.Ferreira<19>! T. MoreiraT.Moreira<1A>#J. C. SousaJ.C.Sousa<15> M. RochaM.Rocha<1B># S. TawefeekS.Tawefeek<15> Y. AhmadY.Ahmad#<23>+ %M. Sharaf-EldinM.Sharaf-Eldin!<21>) #S. Abd-ElsalamS.Abd-Elsalam<19> ! G. DalekosG.Dalekos#<23> + %K. ZisimopoulosK.Zisimopoulos<1B> # C. ΤsoulasC.Τsoulas<1B>
# A. KourikouA.Kourikou<1D> % A. KoukofikiA.Koukofiki'<27>/ )M. PapatheodoridiM.Papatheodoridi<17> K. ZachouK.Zachou<1B># C. TriantosC.Triantos'<27>/ )S. ManolakopoulosS.Manolakopoulos<17> J. GoulisJ.Goulis.<2E>7+G. V. PapatheodoridisG.V.Papatheodoridis<17> M. BilzerM.Bilzer<17> B. DreherB.Dreher<19>! E. ZehnterE.Zehnter<19>! U. NaumannU.Naumann<1D>~% T. WitthöftT.Witthöft<15>} B. WeberB.Weber<15>| P. GeyerP.Geyer<15>{ M. KrausM.Kraus<1B>z# H. SteffensH.Steffens<17>y G. TeuberG.Teuber<15>x H. LöhrH.Löhr<1B>w# P. BuggischP.Buggisch<17>v J. VelosaJ.Velosa<1E>u'R. T. MarinhoR.T.Marinho!<21>t) #P. AlexandrinoP.Alexandrino(<28>s1S. R. R. FernandesS.R. R.Fernandes<15>r S. VitorS.Vitor<19>q! P. PereiraP.Pereira<1F>p' !R. GonçalvesR.Gonçalves<19>o! H. RibeiroH.Ribeiro<17>n R. CoelhoR.Coelho<17>m G. MacedoG.Macedo <00>/<0F><0F><0F><0F>gK1<0E><0E><0E><0E>s[> <0A> <0A> <0A> <0A> \ 9  <0C> <0C> <0C> <0C> <0C> q U 7 ! <0B> <0B> <0B> <0B> <0B> j Q 8 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
r
R
:
"
<09> <09> <09> <09> <09> v b ; <08><08><08><08><08>x\B.<07><07><07><07>rX< <06><06><06><06>zZ<$
<05><05><05><05><05>lS:!<04><04><04><04><04>nT>*<03><03><03><03><03><03><03>pZD.<02><02><02><02>cG# <01><01><01><01>S/!<21>{) Ketaki SolankiKetakiSolanki0<69>z9Mustansir Hatim PanchaMustansirHatimPancha(<28>y1Sunil Kumar ShindeSunilKumarShinde)<29>x1 #Stefan DziembowskiStefanDziembowski<17>w Xiao YangXiaoYang<13>v Shan HeShanHe<13>u Zhen JiZhenJi!<21>t) Yongpeng ZhangYongpengZhang<19>s! Zexuan ZhuZexuanZhu<1F>r' !A. GalyavievaA.Galyavieva#<23>q+ %A. AbdulkhakovaA.Abdulkhakova$<24>p-!K. N. SaifullinaK.N.Saifullina<15>o Z. HuangZ.Huang<13>n H. TongH.Tong<15>m L. HuangL.Huang<13>l C. TangC.Tang<13>k W. YangW.Yang<13>j B. SongB.Song<13>i F. YuanF.Yuan<11>h Y. XieY.Xie<0F>g J. LiJ.Li<13>f J. ParkJ.Park<11>e J. ChoJ.Cho<13>d H. JangH.Jang<11>c H. NamH.Nam<11>b S. KimS.Kim<13>a S. ParkS.Park<13>` C. ChoiC.Choi<11>_ H. KimH.Kim<13>^ D. KangD.Kang<17>] R. DaegonR.Daegon<18>\!S. M. ParkS.M.Park<18>[!H. B. ChaeH.B.Chae<16>ZJ. H. HanJ.H.Han<16>YS. O. LeeS.O.Lee<16>XD. G. KimD.G.Kim<16>WS. T. LeeS.T.Lee<16>VS. W. KimS.W.Kim<16>UI. H. KimI.H.Kim<16>TS. H. KimS.H.Kim<16>SS. B. KimS.B.Kim<16>RI. S. MinI.S.Min<16>QS. Y. SeoS.Y.Seo<15>P K. KoikeK.Koike<13>O M. TadaM.Tada<1B>N# N. SasahiraN.Sasahira<1D>M% M. MatsuyamaM.Matsuyama<17>L T. SasakiT.Sasaki<15>K Y. NakaiY.Nakai<1B>J# N. YamamotoN.Yamamoto<1D>I% S. MatsubaraS.Matsubara<17>H S. MizunoS.Mizuno<1B>G# N. TakaharaN.Takahara<17>F R. UchinoR.Uchino<1B>E# T. WatanabeT.Watanabe<17>D K. TakagiK.Takagi<19>C! D. AkiyamaD.Akiyama<19>B! G. UmefuneG.Umefune<19>A! H. IsayamaH.Isayama<17>@ A. YamadaA.Yamada<17>? H. KogureH.Kogure<1B>># K. IshigakiK.Ishigaki"<22>=+M. V. KabrawalaM.V.Kabrawala <20><)P. N. N. DesaiP.N. N.Desai<11>; E. KimE.Kim<11>: D. KimD.Kim<11>9 K. MinK.Min<11>8 B. SonB.Son<17>7 N. OhashiN.Ohashi<19>6! S. HayashiS.Hayashi<19>5! H. HachiyaH.Hachiya<17>4 T. YumuraT.Yumura<17>3 M. SawadaM.Sawada<11>2 S. ItoS.Ito<13>1 A. MoriA.Mori$<24>0-G. J. M. WebsterG.J. M.Webster<1F>/' !A. WinstanleyA.Winstanley$<24>.-N. L. H. BekkaliN.L. H.Bekkali<11>- K. LeeK.Lee<11>, Y. KimY.Kim<16>+J. K. RyuJ.K.Ryu<16>*S. H. LeeS.H.Lee<16>)J. W. LeeJ.W.Lee<16>(J. H. SonJ.H.Son<18>'!D. K. JangD.K.Jang<16>&J. K. LeeJ.K.Lee<15>% H. KounoH.Kouno<15>$ T. KuwaiT.Kuwai<1D>#% T. YamaguchiT.Yamaguchi<19>"! H. ImagawaH.Imagawa<11>! S. IioS.Iio<1D> % T. NishimuraT.Nishimura<17> Y. SumidaY.Sumida<1B># T. TakasagoT.Takasago<1B># Y. MiyasakoY.Miyasako<1D>% A. YamaguchiA.Yamaguchi<16>Y. J. KimY.J.Kim<16>D. H. KohD.H.Koh<18>!J. H. YoonJ.H.Yoon"<22>+J. P. GutierrezJ.P.Gutierrez<15> U. KumarU.Kumar<1D>% J. BorovickaJ.Borovicka<18>!M. C. SulzM.C.Sulz!<21>) #C. MeyenbergerC.Meyenberger<13> R. FreiR.Frei<1B># G. SemadeniG.Semadeni<19>! Y. MashimoY.Mashimo<13> S. AraiS.Arai<1B># T. KobatakeT.Kobatake<17> M. HaradaM.Harada<15>  H. IwanoH.Iwano<19> ! S. RyozawaS.Ryozawa<1B> # Y. TanisakaY.Tanisaka%<25>
- 'L. Taberna-AranaL.Taberna-Arana <20> )J. Garcia CanoJ.GarciaCano%<25>- 'K. MönkemüllerK.Mönkemüller<19>! H. NeumannH.Neumann(<28>1%M. A. DassuncaoM.A.Dassuncao<1D>% I. JovanovicI.Jovanovic/<2F>7 /Á. Martínez-AlcaláÁ.Martínez-Alcalá<1E>'P. T. KroenerP.T.Kroener<1A>#M. J. BrunoM.J.Bruno<15> B. VeldtB.Veldt"<22>+L. M. Van DrielL.M. VanDriel$<24>-M. Van Der VoortM.Van DerVoort<19>~! R. QuispelR.Quispel<19>}! D. ShapiroD.Shapiro<17>| T. MarmonT.Marmon<1D>{% L. MacconellL.Macconell<17>z B. HansenB.Hansen<19>y! C. VincentC.Vincent<17>x V. VargasV.Vargas <20>w)K. Van ErpecumK.VanErpecum<1B>v# M. ShiffmanM.Shiffman<19>u! V. LuketicV.Luketic<1F>t' !S. HohenesterS.Hohenester ;<0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|qf[PE:/$<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>ti^SH=2' <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> w l a V K @ 5 *   <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> | q f [ P E : / $    <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B>  t i ^ S H = 2 '   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
w
l
a
V
K
@
5
*


<09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> <09> z o d Y N C 8 - "  <08><08><08><08><08><08><08><08><08><08><08>}rg\QF;0%<07><07><07><07><07><07><07><07><07><07><07><07>uj_TI>3(<06><06><06><06><06><06><06><06><06><06><06><06>xmbWLA6+ 
<05><05><05><05><05><05><05><05><05><05><05><05>|qf[PE:/$<04><04><04><04><04><04><04><04><04><04><04><04>vk`UJ?4)<03><03><03><03><03><03><03><03><03><03><03><03>{peZOD9.# <02><02><02><02><02><02><02><02><02><02><02><07>Xh{<08>W<05>z<08>V<05>z<08>Uy<08>T=x<08>Sgx<08>R<05>x<08>Q<05>x<08>P<00>w<08>O<05>v<08>Nu<08>M<05>u<08>L<05>u<08>K u<08>J<05>u<08>I<05>t<08>H<05>t<08>G<05>t<08>F<05>t<08>E<05>t<08>D<05>t<08>C<05>s<08>B<00>s<08>A<05>s<08>@<05>s<08>?<05>s<08>><05>s<06>= r<08><<05>q<08>;<05>p<08>:<05>p<08>9<05>p<08>8<05>p<08>7<05>o<08>6<05>n<08>5<05>m<08>4<05>m<08>3<05>l<08>2<05>l<08>1<05>l<08>0<05>l<08>/<05>l<08>.<05>l<08>-<05>l<08>,<05>l<08>+<05>l<08>*<05>l<08>)<01>k<08>(j<08>'<05>j<08>&i<08>%<05>i<08>$<05>i<08>#<05>i<07>"Hh<08>!<05>h<08> <05>h<08><05>h<07>g<08><05>f<08><05>f<08><05>f<08><05>e<08><05>e<08><05>e<08><05>d<08><05>d<08><05>d<08><05>d<08><05>d<08><01>c<08><02>c<08><05>b<08><05>b<08><05>b<08> <05>b<08> <05>b<08> <05>b<08>
<05>b<08> <05>b<08><05>a<07>H_<08><05>_<08><05>_<08><05>_<08><05>^<08><05>^<08><05>^<08><05>^<08><05>]<08>~<05>\<08>}[<08>|~[<08>{}Z<08>z|Z<08>y{Y<08>xzX<08>wyX<08>vxX<08>u<02>W<08>twV<08>svV<08>ruV<08>qtU<08>psU<08>orT<08>n<01>S<08>m<01>S<08>l<00>R<08>kR<08>jqP<08>ipO<08>hoO<08>gnO<08>f3O<08>emO<08>dlO<08>cIO<08>bHO<08>akO<08>`jM<08>_iL<08>^hL<08>]gL<08>\fK<08>[eK<08>ZdK<08>Y<01>J<08>XcI<08>WbI<08>VaH<08>UH<08>T`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
(0<08> '0<08>&/<08>%.<08>$.<08>#.<08>".<08>!-<08> ,<08>+<08>+<08><00>*<08>~)<08>}(<08>|(<08>{'<08>z'<08>y<00>'<08>x&<08>w&<08>v&<08>u%<08>t%<08>s%<08>r$<08>q$<08>p$<08>o$<08>n$<08>m$<08>l $<08>k $<08>j $<08>i
$<08>h $<08>g$<08>f$<06>e #<08>d<01>"<08>c!<08>b!<08>a <08>` <08>_<08>^<08>]<08>\<08>[<04><08>Z<04><08>Y<04><08>X<04><08>W<04><08>V<04><08>U<04><08>T<04><08>S<04><08>R<04><08>Q<04><08>P<04><08>O<04><08>N<04><08>M<04><08>L<04><08>K<04><08>J<04><08>I<04><08>H<04><08>G<04><08>F<04><08>E<04><08>D<04><08>C<04><08>B<04><08>A<04><08>@<04><08>?<04><08>><04><08>=<04><08><<04><08>;<04><08>:<04><08>9<04><08>8<04><08>7<04><08>6<04><08>5<04><08>4<04><08>3<04><08>2<04><08>1<04><08>0<04><08>/<04><08>.<04><08>-<04><08>,<04><08>+<04><08>*<04><08>)<04><08>(<04><08>'<04><08>&<04><08>%<04><08>$<04><08>#<04><08>"<04><08>!<04><08> <04><08><04><08><04> j Y <0B> <09><06>j<00>0<EFBFBD>#
/<02> 5GGPaxos Made Simple<07>The Paxos algorithm, when presented in plain English, is very simple.distributed_systems/2017-09-06T01:57:54.2872338872017-09-06T01:57:54.287233887<EFBFBD>R<EFBFBD>"
7<02>]#GGPropositions as types<07>Connecting mathematical logic and computation, it ensures that some aspects of programming are absolute.Commun. ACMplt/2017-09-06T01:57:51.1922929692017-09-06T01:57:51.192292969<EFBFBD>(<28>!
1<02># EEOut of the Tar Pit<07>Complexity is the single major difficulty in the successful development of large-scale software systems. Following Brooks we distinguish accidental from essential difficulty, but disagree with his premise that most complexity remaining in contemporary systems is essential. We identify common causes of complexity and discuss general approaches which can be taken to eliminate them where they are accidental in nature. To make things more concrete we then give an outline for a potential complexity-minimizing approach based on functional programming and Codd's relational model of data.design/2017-09-06T01:57:49.534877932017-09-06T01:57:49.53487793<EFBFBD>;<3B>
G<02>s/5GGPaxos Made Moderately Complex<07>This article explains the full reconfigurable multidecree Paxos (or multi-Paxos) protocol. Paxos is by no means a simple protocol, even though it is based on relatively simple invariants. We provide pseudocode and explain it guided by invariants. We initially avoid optimizations that complicate comprehension. Next we discuss liveness, list various optimizations that make the protocol practical, and present variants of the protocol.ACM Comput. Surv.distributed_systems/2017-09-06T01:57:48.6079309082017-09-06T01:57:48.607930908w<EFBFBD> W /EECompressors with Vanes-Based Diffuserdata_replication/2017-09-06T01:57:47.748107912017-09-06T01:57:47.74810791<EFBFBD>#<23>
M<02>yy/GGIntroduction to Cryptocurrencies<07>We provide a research-oriented introduction to the cryptographic currencies. We start with a description of Bitcoin and its main design principles. We then discuss some of its weaknesses, and show some ideas for dealing with them. We also talk about the mechanics of the mining pools and ideas for discouraging the mining pool creation. We provide an introduction to the smart contracts, and give some examples of them, including the multiparty lotteries.
We then present alternative currencies that were designed to remedy some of the problems of Bitcoin. In particular, we talk about the Litecoin, the Primecoin, the Permacoin, the Zerocoin, the Proofs of Stake and the Proofs of Space. We also discuss the most important research challenges in this area.ACM Conference on Computer and Communications Securitydigital_currency/2017-09-06T01:57:46.8329709472017-09-06T01:57:46.832970947 f<00><0F><0F>Z7<0E><0E><0E>mO1 <0A> <0A> <0A>  X 3
<0C> <0C> <0C> r 3 <0B> <0B> <0B> y R %
<EFBFBD>
<EFBFBD>
<EFBFBD>
q
E
'
 <09> <09> <09> ~ a 7 <08><08><08>u7<07><07><07>xV4<06><06><06><06>b@$<05><05><05>i@(<04><04><04><04>kE<03><03><03>{Q*<02><02><02><02>oD <01><01><01><01><01>e,<00><1F>a' Mike PatersonMikePaterson(<28>`1Michael J. FischerMichaelJ.Fischer6<72>_?'Christos H. PapadimitriouChristosH.Papadimitriou!<21>^) Jonathan EvansJonathanEvans<1D>]% Asim ShankarAsimShankar<19>\! Ankur TalyAnkurTaly <20>[)Eric A. BrewerEricA.Brewer<13>Z Yi XingYiXing<1F>Y' Barmak ModrekBarmakModrek!<21>X) Levan AtanelovLevanAtanelov(<28>W1#Christopher J. LeeChristopherJ.Lee!<21>V) Tamás SarlósTamásSarlós<19>U! Ravi KumarRaviKumar%<25>T- Anirban DasguptaAnirbanDasgupta%<25>S- Łukasz JuszczykŁukaszJuszczyk(<28>R1Edsger W. DijkstraEdsgerW.Dijkstra$<24>Q-Randy L. BucknerRandyL.Buckner'<27>P/ !Mohana RamaratnamMohanaRamaratnam$<24>O-Timothy R. OlsenTimothyR.Olsen$<24>N-Daniel S. MarcusDanielS.Marcus<1B>M# Jorge OrtizJorgeOrtiz<1D>L% Zhaoguo WangZhaoguoWang<13>K Qi ChenQiChen%<25>J-! Chien-Chin HuangChien-ChinHuang#<23>I+ Sanjay GhemawatSanjayGhemawat<1D>H% Jeffrey DeanJeffreyDean!<21>G) Martin OderskyMartinOdersky<19>F! Ingo MaierIngoMaier0<72>E9Gerth Stølting BrodalGerthStøltingBrodal'<27>D/ Christian LimpachChristianLimpach<15>C Eric JulEricJul&<26>B/Jacob Gorm HansenJacobGormHansen'<27>A/# Christopher ClarkChristopherClark<1F>@' Prakash LingaPrakashLinga(<28>?1Amit Rahul BaishyaAmitRahulBaishya<1F>>' Sung-Eui YoonSung-EuiYoon<1F>=' Shih-Fu ChangShih-FuChang<19><! Junfeng HeJunfengHe<1F>;' Youngwoon LeeYoungwoonLee<1B>:# Jae-Pil HeoJae-PilHeo&<26>9/Claude E. ShannonClaudeE.Shannon<1D>8% Xin-She YangXin-SheYang,<2C>75Amir Hossein GandomiAmirHosseinGandomi<1B>6# Frank DabekFrankDabek<1B>5# Daniel PengDanielPeng<1F>4' Jelani NelsonJelaniNelson<1F>3' Jean BourgainJeanBourgain!<21>2) Oluwafemi OshoOluwafemiOsho+<2B>13 Francisca OgwuelekaFranciscaOgwueleka$<24>0-Lauretta O. OshoLaurettaO.Osho<1F>/' Werner VogelsWernerVogels!<21>.) Peter VosshallPeterVosshall;<3B>-C# +Swaminathan SivasubramanianSwaminathanSivasubramanian<1D>,% Alex PilchinAlexPilchin%<25>+- Avinash LakshmanAvinashLakshman1<6E>*9# !Gunavardhan KakulapatiGunavardhanKakulapati<1F>)' Madan JampaniMadanJampani!<21>() Deniz HastorunDenizHastorun'<27>'/ Giuseppe DecandiaGiuseppeDecandia<1A>&#Mu Y ThomasMuYThomas$<24>%-Theodore W. HongTheodoreW.Hong<1F>$' Brandon WileyBrandonWiley!<21>#) Oskar SandbergOskarSandberg<19>"! Ian ClarkeIanClarke<1D>!% Harris HymanHarrisHyman<1B> # Carl HewittCarlHewitt)<29>1 Benjamin SchneiderBenjaminSchneider$<24>-William H. MaceyWilliamH.Macey<1A>#Alan C. KayAlanC.Kay8<79>A%Marko C. J. D. Van EekelenMarkoC. J. D. VanEekelen2<6E>;Achilleas L. D. BuismanAchilleasL. D.Buisman*<2A>3Gregory V. ChocklerGregoryV.Chockler$<24>-William W. CohenWilliamW.Cohen'<27>/ Abraham BernsteinAbrahamBernstein<1D>% Philip StutzPhilipStutz%<25>- Ernesto JiménezErnestoJiménez<1D>% Mikel LarreaMikelLarrea%<25>- Cristian MartínCristianMartín<<3C>E#Proofreader Jennifer McclainProofreaderJenniferMcclain!<21>) !Ken DellapentaKenDellapenta<1F>' Emilia ThiuriEmiliaThiuri,<2C>5Denise E. M. PenroseDeniseE. M.Penrose <20>)David W. CorneDavidW.Corne&<26>/Frank D. FranconeFrankD.Francone"<22> +Martin A. KeaneMartinA.Keane$<24> -Peter J. BentleyPeterJ.Bentley#<23> + Christian JacobChristianJacob<17>
 Yuhui ShiYuhuiShi*<2A> 3Russell C. EberhartRussellC.Eberhart<1F>' James KennedyJamesKennedy <20>)David B. FogelDavidB.Fogel<1B># Peter MarksPeterMarks<1B># Ben MoseleyBenMoseley'<27>/ #Deniz AltinbükenDenizAltinbüken8<6E>A!Chandra Shekhar ChandrakarChandraShekharChandrakar!<21>) Morteza KhayatMortezaKhayat><3E>G-Mohammad Ali Akhavan-BehabadiMohammadAliAkhavan-Behabadi <20>)Raed M. KafafyRaedM.Kafafy"<22>+Hesham A. RakhaHeshamA.Rakha"<22>~+Waleed F. FarisWaleedF.Faris.<2E>}7%M. Surendranath ReddyM.SurendranathReddy(<28>|1Venkata Rami ReddyVenkataRamiReddy <00>
j<00><00>*<2A>&
{<02>uW5GGSignal/Collect: Graph Algorithms for the (Semantic) Web<07>The Semantic Web graph is growing at an incredible pace, enabling opportunities to discover new knowledge by interlinking and analyzing previously unconnected data sets. This confronts researchers with a conundrum: Whilst the data is available the programming models that facilitate scalability and the infrastructure to run various algorithms on the graph are missing. Some use MapReduce a good solution for many problems. However, even some simple iterative graph algorithms do not map nicely to that programming model requiring programmers to shoehorn their problem to the MapReduce model. This paper presents the Signal/Collect programming model for synchronous and asynchronous graph algorithms. We demonstrate that this abstraction can capture the essence of many algorithms on graphs in a concise and elegant way by giving Signal/Collect adaptations of various relevant algorithms. Furthermore, we built and evaluated a prototype Signal/Collect framework that executes algorithms in our programming model. We empirically show that this prototype transparently scales and that guiding computations by scoring as well as asyn-chronicity can greatly improve the convergence of some example algorithms. We released the framework under the Apache License 2.0 (atInternational Semantic Web Conferencedistributed_systems/2017-09-06T01:57:58.0298410642017-09-06T01:57:58.029841064<EFBFBD>#<23>% <00>#<02>]75GGImplementing the Omega failure detector in the crash-recovery failure model<07>a r t i c l e i n f o a b s t r a c t Unreliable failure detectors are mechanisms providing information about process failures, that allow to solve several problems in asynchronous systems, e.g., Consensus. A particular failure detector, Omega, provides an eventual leader election functionality. This paper addresses the implementation of Omega in the crash-recovery failure model. We first propose an algorithm assuming that processes are reachable from the correct process that crashes and recovers a minimum number of times. Then, we propose two algorithms which assume only that processes are reachable from some correct process. Besides this, one of the algorithms requires the membership to be known a priori, while the other two do not.J. Comput. Syst. Sci.distributed_systems/2017-09-06T01:57:57.0338330082017-09-06T01:57:57.033833008<EFBFBD>k<EFBFBD>$
U<02>M OGGGenetic Programming: An Introduction<07>1. viii Line 13, change " iteration s " to " iterations " 2. xv Line 17, change " Figure 99.1 " to " Figure 1 " 3. xv Lines 20-21, delete the sentence " GP-related resources are provided in an appendix. " 4. xvi Figure 99.1, change " 99.1 " to " 1 " 5. xvii After the 2 nd bulleted item beginning " Part III, " insert the following, additional bullet, Y Four appendices summarize valuable resources available for the reader: Appendix A contains printed and recorded resources, Appendix B suggests web-related resources, Appendix C discusses GP software tools, including Discipulus tm , the GP software developed by the authors, and Appendix D mentions events most closely related to the field of genetic programming. URLs can be found online at http://mkp.com/GP-Intro. 6. 52 Line 3, change " and and " to " and " 7. 88 Line 18, change " deGaris " to " de Garis " 8. 128 Line 5, change " derivations " to " deviations " 9. i c N c N c p i = 1 1 to i c N c N c p i = 1 1 11. 142 Exercise 13, line 1, insert " set " after " function " 12. 147 Equation 6.1, change " E[m(H , t]… " to " E[m(H , t + 1)]… " 13. 167 Line 10, change " separarately " to " separately " 14. 168 Equation 6.6, change ∑ k D F (k, jmin (k)) to ∑ j D F (j, jmin (j)) * All line numbers refer to running text and do not include tables, figures, bulleted text, or code samplesparadigms/functional_programming/2017-09-06T01:57:55.2484809572017-09-06T01:57:55.248480957 M <0A> <0B>M<00>E<EFBFBD>)
I<02> )5GGThe Early History of Smalltalk<07>Most ideas come from previous ideas. The sixties, particularly in the ARPA community, gave rise to a host of notions about &#8220;human-computer symbiosis&#8221; through interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-intelligent behavior. The soon to follow paradigm shift of modern personal computing, overlapping window interfaces, and object-oriented design came from seeing the work of the sixties as something more than a &#8220;better old thing&#8221;. That is, more than a better way: to do mainframe computing; for end-users to invoke functionality; to make data structures more abstract. Instead the promise of exponential growth in computing/$/volume demanded that the sixties be regarded as &#8220;<italic>almost</italic> a new thing&#8221; and to find out what the actual &#8220;new things&#8221; might be. For example, one would compute with a handheld &#8220;Dynabook&#8221; in a way that would not be possible on a shared mainframe; millions of potential users meant that the user interface would have to become a learning environment along the lines of Montessori and Bruner; and needs for large scope, reduction in complexity, and end-user literacy would require that data and control structures be done away with in favor of a more biological scheme of protected universal cells interacting only through messages that could mimic any desired behavior.
Early Smalltalk was the first complete realization of these new points of view as parented by its many predecessors in hardware, language and user interface design. It became the exemplar of the new computing, in part, because we were actually trying for a qualitative shift in belief structures&#8212;a new Kuhnian paradigm in the same spirit as the invention of the printing press&#8212;and thus took highly extreme positions which almost forced these new styles to be invented.HOPL Preprintslanguages/smalltalk/2017-09-06T01:58:01.8934318852017-09-06T01:58:01.893431885<EFBFBD>~<7E>(
m<02>}'EEGamification in educational software development<07>Software development education often suffers from the image of tedious programming, leading to low levels of activity. In general, gamification can help making tasks more attractive. This paper reports on a gamification case study, indicating that the use of gamification may be an effective instrument to increase the activity of students in Educational Software Development.CSERCgamification/2017-09-06T01:57:59.873502932017-09-06T01:57:59.87350293<EFBFBD>d<EFBFBD>'
]<02>;#5GGToward a cloud computing research agenda<07>The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while some of their practical challenges seem to pose new questions to us as systems researchers. This brief note summarizes our impressions.SIGACT Newsdistributed_systems/2017-09-06T01:57:58.9878420412017-09-06T01:57:58.987842041
<05><00><01>
R<04>n=<02>YT&<05>y<05>+<02>%<03>-<g<04>> ?<0F> .  <06> <07>R <0C><07> <0C> <0C><0E> <0C> <0C> <0C> y e S ;<06> * ' <0F> <0B> <0B><0E><08>F <0B> <0B> <0B>q<07> <0B><02><04>, <0B>I <0A> zNM<03>D c R5z < ) )
<EFBFBD>_oO
<EFBFBD>w
<EFBFBD><03><03><03><04><01><04><03>J<08>
<EFBFBD><06><05>e<06>
<EFBFBD>
<EFBFBD><07>m<0E>
<EFBFBD><06><0F><0E>
x
gz<03><03>)8<05>
U
C
0


h<04>m<02>`M<04>\<02><02>s<02><02><05><05> <0A> <09><06><05>=` <09> <09> <09> <09><07> <09><01> <09><0F> x<07>; e<0E> R<03><01>]<04><01><08><08> E<01> 6 $&`  <08>9<08><0E><0F>exuan Zhu<04> Z. Shan He<04> Zhen Ji<04>)Yongpeng Zhang<04>!Zexuan Zhu<04> Z. Huang<04> W. Yang<04> Y. Xie<04>T. Sasaki<04> Y. Nakai<04>#T. Watanabe<04>T. Yumura<04> Y. Kim<04> T. Kuwai<04>%T. Yamaguchi<04>%T. Nishimura<04>Y. Sumida<04>#T. Takasago<04>#Y. Miyasako<04>Y. J. Kim<04> U. Kumar<04>!Y. Mashimo<04>#T. Kobatake<04>#Y. Tanisaka<04>7Á. Martínez-Alcalá<04>T. Marmon|V. Vargasx!V. Luketicu T. Leee Y. Kangc Y. Choi_
X. Li] X. WangX X. ZhuW W. MengU W. ZhouR W. KangC)Z. A. Sparchez:#V. Ivashkin!'T. Voicu Moga#W. El-Gendy!T. Moreira Y. Ahmad!U. Naumann<03>%T. Witthöft<03>V. Anapaz<03>#Z. M. Hefny<03>#T. Ichikawa<03> T. Gago<03>#W. Sieghart<03>!T. Bucsics<03>#U. Mendarte<03>#T. Yildirim<03>'Z. T. Ozdemir<03>W. Yanqin<03>
Y. Li<03> Y. Chen<03>'T.j.g. Gevers<03>W. Kievit%T. Reibergere!T. Karakan]V. BocharS Y. LiuP
Y. BiN Y. Nie4 X. Liu2 T. Ohta#Y. Yamamoto%T. Miyashita%Wenbing Zhao#Yair Sovran<06>S Yawei Li<05>8Xiao Yang<04>%Zekai J. Gao<02>%Zezhou Cheng<02>%Zhi-Li Zhang<02><06>Yuhui Shi
+Waleed F. Faris<04>1Venkata Rami Reddy<04><06>+Vadim Yushprakh<05>!Weiwen Liu<02>-Terry A. Landers<02>\ Stephen-William W. Cohen'Yasushi Saito<02>'Werner Vogels/'Thore Graepel<02>5Timothy P. Lillicrap<02>;Vedavyas Panneershelvam<02>-Traian Stancescu<02>g Yi XingZ-William H. Macey-Thaddeus Diamond{!Yuening Huu!Yoel Gluckk-William F. Smythi-Theodore W. Hong%7Tushar Deepak Chandra\g%Xin-She Yang8+Takuya KatayamaT)Xavier DéfagoR+Yehia El-KhatibD+Theo VassilakisB hShiv CVenugopalan Ramasubramanian<05>!Walid Taha;%Zhanyong Wan:+Torsten Kröger8%Zhaoguo WangL+Öznur Özkasap<00>)Éric Gaussierj%Ákos Seress!Ziv Scully<00>%Zhi-Hua Zhou'Zhen Xiao<00> Zhe Zhu!'Yves Le Traond'Yuichi Fujiki, Yu Luo<00>%Yossi Matias%Yongle Zhang<00>%Yoann Baveye<00>Yingyi Bu<00>1Yifeng Frank Huang<01>!Yifan Gong<01>%Yaron Minsky<00> Xu Zhao<00>!Xindong Wu!Xin Zhuang<00>'Xiaowei Huang %Xiaoguang Qi<00>%Xiaofeng Ren1#Wyatt Lloyd<01>-Wolfram Burgardy<00>-William Ribarsky -Whitfield DiffieyWes Irish<00>#Weimin Chen]+Vladimir Vapnik<00>#Vipin Kumar'Vedran Dunjko5Vasileios Trigonakis'Valient Gough-Valerio Pascucci<01>#V. T. Rajan<00>1V. S. Subrahmanian8#Urs Hölzle<%Ulf T. Wiger8%Tyler Akidau<00>)Turner Whitted#Tudor David%Tudor Bosman<01>Tom Ridge#Tom Jackson<01>/Timothy L. HarrisP!Tim Kraska<00>#Tiark Rompf<01>1Thomas WürthingerH%Thomas Vermag+Thomas R. GrossZ/Thomas Gazagnaire0)Thomas E. Hartp3Thomas Duebendorfer<01>+Thomas Braibant #Thomas Arts7-Thirumalesh Bhat<00>-Theodore Johnson<00>%Thabo Beelerk Tao Chen #Tanja Lange<01>'Takahiro Hara-Søren B. Lassen<01><0F>wSylvain Lefebvret<0F>{Suvrat Bhooshan#'Susmit Sarkar)Sunny Consolvo<01>%Sunil Shukla3<0F>/Sudipta SenguptaH!Uri Lublin5Yaniv Kamay Qumranet Tao Wei<05>#Ted Kaehler<05>#Tim Roselli<05>#Xian Warner<05>9Ulises Cortés García<05>%Wenchao Zhou<05>/Vitomir Kovanovic<05>-Thomas B. Schön<05>%Yutaka Suzue<05>'Torben Thrane<05>3William P. Thurston<05>/Úlfar Erlingsson<05>1Wolfgang De Meuter<05>)Tom Van Cutsem<05>)T. V. Lakshman<05>-Özalp Babaoğlu~#Vern Paxson{#Ziling Zhouy)Tushar Chandran+Wilson C. Hsiehl)Tamás SarlósV-Łukasz JuszczykS-Timothy R. OlsenOSung-Eui Yoon>'Youngwoon Lee; <06><06>
u<02>Q#5GGA History of the Virtual Synchrony Replication Model<07>In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical question of how best to embed replication into distributed systems. Virtual synchrony defines dynamic process groups that have self-managed membership. Applications can join or leave groups at will: a process group is almost like a replicated variable that lives in the network. The second need relates to performance. Although state machine replication is relatively easy to understand, protocols that implement state machine replication in the standard manner are too slow to be useful in demanding settings, and are hard to deploy in very large data centers of the sort seen in today's cloud-computing environments. Virtual synchrony implementations, in contrast, are able to deliver updates at the same data rates (and with the same low latencies) as IP multicast: the fast (but unreliable) Internet multi-cast protocol, often supported directly by hardware. The trick that makes it possible to achieve these very high levels of performance is to hide overheads by piggyback-ing extra information on regular messages that carry updates. The virtual synchrony replication model has been very widely adopted, and was used in everything from air traffic control and stock market systems to data center management platforms marketed by companies like IBM and Microsoft. Moreover, in recent years, state machine protocols such as those used in support of Paxos have begun to include elements of the virtual synchrony model, such as self-managed and very dynamic membership. Our exploration of the model takes the form of a history. We start by exploring the background, and then follow evolution of the model over time. A " Cloud Computing " revolution is underway, supported by massive data centers that often contain thousands (if not hundreds of thousands) of servers. In such systems , scalability is the mantra and this, in turn, compels application developers to replicate various forms of information. By replicating the data needed to handle client requests, many services can be spread over a cluster to exploit parallelism.Replicationdistributed_systems/2017-09-06T01:58:02.9281169432017-09-06T01:58:02.928116943 <03><04>K<03><00><1B>- { #5GGComments on a problem in concurrent programming control<07>Commun. ACMdistributed_systems/2017-09-06T01:58:07.2896909182017-09-06T01:58:07.289690918<EFBFBD>"<22>,
<00> )5GGViewing Control Structures as Patterns of Passing Messages<07>Artif. Intell.distributed_systems/2017-09-06T01:58:05.4866870122017-09-06T01:58:05.486687012<EFBFBD> <0B>+
Q<02>' 9GGThe Meaning of Employee Engagement<07>The meaning of employee engagement is ambiguous among both academic researchers and among practitioners who use it in conversations with clients. We show that the term is used at different times to refer to psychological states, traits, and behaviors as well as their antecedents and outcomes. Drawing on diverse relevant literatures, we offer a series of propositions about (a) psychological state engagement; (b) behavioral engagement; and (c) trait engagement. In addition, we offer propositions regarding the effects of job attributes and leadership as main effects on state and behavioral engagement and as moderators of the relationships among the 3 facets of engagement. We conclude with thoughts about the measurement of the 3 facets of engagement and potential antecedents, especially measurement via employee surveys. The notion of employee engagement is a relatively new one, one that has been heavily marketed by human resource (HR) consulting firms that offer advice on how it can be created and leveraged. Academic researchers are now slowly joining the fray, and both parties are saddled with competing and inconsistent interpretations of the meaning of the construct. Casual observation suggests that much of the appeal to organizational management is driven by claims that employee engagement drives bottom-line results. Indeed, at least one HR consulting firm (Hewitt Associates LLC, 2005, p. 1) indicates that they ''have established a conclusive, compelling relationship between engagement and profitability through higher productivity, sales, customer satisfaction, and employee retention .'' Some practitioners view engagement as having evolved from prior research on work attitudes, directly implying that this newer concept adds interpretive value that extends beyond the boundaries of those traditions. We agree with this thought and hope to show why we agree in what follows. Although compelling on the surface, the meaning of the employee engagement concept is unclear. In large part, this can be attributed to the ''bottom-up'' manner in which the engagement notion has quickly evolved within the practitioner community. This is not an unfamiliar stage in the incre-mental evolution of an applied psychological construct. Thus, similar to the manner in which burnout was at first a construct attributed to pop psychology (Maslach, Schaufeli, & Leiter, 2001) engagement is a concept with a sparse and diverse theoretical and empirically demonstrated nomological net— the relationships among potential antecedents and consequences of engagement as well as the components of engagement have We appreciate the thoughtful comments of our colleagues Karen Barbera and Scott …logic_and_programming/2017-09-06T01:58:04.4709121092017-09-06T01:58:04.470912109 V <0B>([V<00><01>1
]<02>o QGGAxiomatic Basis for Computer Programming<07>This paper considers a formal method, known as axiomatic semantics, used to prove the correctness of a computer program. This formal method extracts, using some proof rules, the mathematical verification conditions from a computer program. The axioms of program flow, including, sequential flow, iteration, and alternation flows are presented. Using the axiomatic basis the completeness of two variants of integer multiplication program is proved. Results show that computer programs can actually be verified sufficiently for correctness without necessarily testing them, or more practically put, to complement their testing.comp_sci_fundamentals_and_history/2017-09-06T01:58:10.8597780762017-09-06T01:58:10.859778076<EFBFBD>I<EFBFBD>0
o<02>#GGDynamo: amazon's highly available key-value store<07>Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significant financial consequences and impacts customer trust. The Amazon.com platform, which provides services for many web sites worldwide, is implemented on top of an infrastructure of tens of thousands of servers and network components located in many datacenters around the world. At this scale, small and large components fail continuously and the way persistent state is managed in the face of these failures drives the reliability and scalability of the software systems.
This paper presents the design and implementation of Dynamo, a highly available key-value storage system that some of Amazon's core services use to provide an "always-on" experience. To achieve this level of availability, Dynamo sacrifices consistency under certain failure scenarios. It makes extensive use of object versioning and application-assisted conflict resolution in a manner that provides a novel interface for developers to use.SOSPdatastores/2017-09-06T01:58:09.8214660642017-09-06T01:58:09.821466064<EFBFBD>?<3F>/
M<02> 1GGThe Story of the Therac in LOTOS<07>We consider the use of formal speciication and veriication techniques for proving the safety, or otherwise, of an abstraction of a safety-critical medical application: the Therac-25 radiation machine. This machine was responsible for several patient deaths in the late 1980s. The speciication is given in LOTOS and we consider trace analysis, property testing, and temporal logic for reasoning about the safe and unsafe behaviour of the speciied machine. The testing tool LOLA is used for rigorous veriicationn with LOLA, two signiicant design errors are uncovered. The work reported herein is part of a case study on the practical use of formal methods in safety-critical softwaree the speciication is based only on an informal description of part of the ma-chine's behaviour, and does not constitute a speciication of the entire machine.operating_systems/2017-09-06T01:58:08.9445749512017-09-06T01:58:08.944574951<EFBFBD><11>. <00><02><03>#GGFreenet: A Distributed Anonymous Information Storage and Retrieval System<07>We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data les and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a le passing through the network, and diicult for a node operator to determine or be held responsible for the actual physical contents of her own node.Workshop on Design Issues in Anonymity and Unobservabilitydatastores/2017-09-06T01:58:08.1821730962017-09-06T01:58:08.182173096
-e<0F>dT1<0E><0E><07>~<07>= <0A><06> <0A> <0A> n
q <0C> <0C> y a ( <0B><06>1 <0B> <0B> j 
<EFBFBD>
<EFBFBD>
<EFBFBD>
e:
. <09> <09> <09> U &<08><08>e4kProgramming with algebraic effects and handlers<01>>Part I: Transcendence of Values of Some Special Functions<01>,[On the Electrodynamics of Moving Bodies<01>*WParticle gibbs with ancestor sampling}d<04>IPastry: Scalable, distributed object location and routing for large-scale peer-to-peer systemsz)UOn Proof and Progress in MathematicsnW<04>/Oblivious Routing of Highly Variable Traffic in Service Overlays and IP Backbones_!EOn the Calculus of Relations\6oPrediction in Joint Action: What, When, and WhereS._Optimal Purely Functional Priority Queues::yProgramming languages - application and interpretationBJ<04>Programming and reasoning with algebraic effects and dependent types<00>._Programming Languages: History and Future<00>;yProgrammatic and direct manipulation, together at last<00>%MProcedural modeling of buildings<00>B<04>Probabilistic Counting Algorithms for Data Base Applications3iPrincipal Type-Schemes for Functional Programs<00>6oPregel: a system for large-scale graph processing<00>?<04>Practical byzantine fault tolerance and proactive recovery()UPractical Optional Types for Clojure<00>+[Polynomial-time theory of matrix groupsd#IPoisson surface reconstructionJ<04>Piranha: A scalable architecture based on single-chip multiprocessing0cPaxos made live: an engineering perspective<00>/Paxos Made Simple#"GPaxos Made Moderately Complex R<04>'Parallel generational-copying garbage collection with a block-structured heap8sPanorama weaving: fast and flexible seam processing<00>1Out of the Tar Pit!L<04>Orleans: Distributed Virtual Actors for Programmability and Scalabilitys'SOrganizing Programs Without Classes9Optimistic replication<00>c<04>GOnline Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Events<00>;One VM to rule them allt2gOn the scalability of the Erlang term storage<00>4kOn the resemblance and containment of documentsJ<04>On computable numbers with an application to the Entscheidungsproblem+@<04>On Understanding Types, Data Abstraction, and Polymorphism<00>D<04> Omega: flexible, scalable schedulers for large compute clusters'SObject Space Silhouette Algorithims/E<04> No Silver Bullet: Essence and Accidents of Software Engineering<00>"INew directions in cryptography-!NTRU Prime<00>:yMulticore profiling for Erlang programs using percept2.`<04>AMoviPill: improving medication compliance for elders using a mobile persuasive social game<00> <04> $<05><04>
<00>G OGGRewriting nation-state: borderland literatures of India and the question of state sovereignty<07>paradigms/functional_programming/2017-09-06T01:58:16.8496110842017-09-06T01:58:16.849611084<EFBFBD>Q<EFBFBD>6 /<02>Y<EFBFBD> 5GGSpherical hashing<07>Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, and compact data representations suitable for handling large scale image databases in many computer vision problems. Existing hashing techniques encode high-dimensional data points by using hyperplane-based hashing functions. In this paper we propose a novel hypersphere-based hashing function, spherical hashing, to map more spatially coherent data points into a binary code compared to hyperplane-based hashing functions. Furthermore, we propose a new binary code distance function, spherical Hamming distance, that is tailored to our hypersphere-based binary coding scheme, and design an efficient iterative optimization process to achieve balanced partitioning of data points for each hash function and independence between hashing functions. Our extensive experiments show that our spherical hashing technique significantly outperforms six state-of-the-art hashing techniques based on hyperplanes across various image benchmarks of sizes ranging from one to 75 million of GIST descriptors. The performance gains are consistent and large, up to 100% improvements. The excellent results confirm the unique merits of the proposed idea in using hyperspheres to encode proximity regions in high-dimensional spaces. Finally, our method is intuitive and easy to implement.2012 IEEE Conference on Computer Vision and Pattern Recognitiondistributed_systems/2017-09-06T01:58:16.0625419922017-09-06T01:58:16.062541992
D-
[ @
, b- HM<00>e ]<5D>+5<>#GGN07f82eecbe3d530e3f967342245a4d5c8e41c05bunderstanding-the-limitations-of-causally-and-totally-ordered-communication.pdfdistributed_systems/understanding the limitations of causally and totally ordered communication2017-09-06T01:52:30.8179528812017-09-06T01:52:30.817952881<EFBFBD>xg
]<5D>5GGLfc11031895c302dc52404d34de58af1a72f3b817zab-high-performance-broadcast-for-primary-backup-systems.pdfdistributed_systems/zab high performance broadcast for primary backup systems2017-09-06T01:52:30.8492280272017-09-06T01:52:30.849228027<EFBFBD>yf ]<5D> 5<>EE,66401c00817c71713e86438385d91956246aeaabviewing-control-structures-as-patterns-of-passing-messages.pdfdistributed_systems/viewing control structures as patterns of passing messages2017-09-06T01:52:30.821239992017-09-06T01:52:30.82123999 :]<5D>+5<>#GG07f82eecb<63>` ]<5D>5<> GGj993f5b0bb126caae848937b2323efabdf8bc21e9the-chubby-lock-service-for-loosely-coupled-distributed-systems.pdfdistributed_systems/the chubby lock service for loosely coupled distributed systems2017-09-06T01:52:30.7983659672017-09-06T01:52:30.798365967<EFBFBD>Ud ]g5_EE'530b50510808903545d298de7e19d6e5463a72cdtowards-a-cloud-computing-research-agenda.pdfdistributed_systems/towards a cloud computing research agenda2017-09-06T01:52:30.814007082017-09-06T01:52:30.814007082<00>Ga ]W5OGG<01>bac41b59697da3ca5c80ca08f2bbbc97a3576248the-dining-cryptographers-problem.pdfdistributed_systems/the dining cryptographers problem2017-09-06T01:52:30.8017939452017-09-06T01:52:30.801793945<EFBFBD>%b ]<5D>35<33>+GGu87a6e1ec4dd1df928541467296e4cf2a0f2df0c3tiered-replication-a-cost-effective-alternative-to-full-cluster-geo-replication.pdfdistributed_systems/tiered replication a cost effective alternative to full cluster geo replication2017-09-06T01:52:30.8061560062017-09-06T01:52:30.806156006<00>]W5OGGbac41b59697da3ca5c80ca08f2bbbc97a3576248the-dining-cryptographers-problem.pdfdistributed_systems/the dining cryptographers problem2017-09-06T01:52:30.8017939452017-09-06T01:52:30.8017939452]<5D>5<> GG993f5b0bb126caae848937b2323efabdf8bc<62>Qc ]a5YGGff3485e24d796c33f11048f74e447853ef4a6dc53tor-the-second-generation-onion-router.pdfdistributed_systems/tor the second generation onion router2017-09-06T01:52:30.8107661132017-09-06T01:52:30.810766113 <03> <0B><06><03><00>P<EFBFBD>;
M<02> aGGDeprecating the Observer Pattern<07>Programming interactive systems by means of the observer pattern is hard and error-prone yet is still the implementation standard in many production environments. We present an approach to gradually deprecate observers in favor of re-active programming abstractions. Several library layers help programmers to smoothly migrate existing code from call-backs to a more declarative programming model. Our central high-level API layer embeds an extensible higher-order data-flow DSL into our host language. This embedding is enabled by a continuation passing style transformation.paradigms/functional_reactive_programming/2017-09-06T01:58:20.6339169922017-09-06T01:58:20.633916992<EFBFBD><00>:
_<02>I1OGGOptimal Purely Functional Priority Queues<07>Brodal recently introduced the rst implementation of imperative priority queues to support ndMin, insert, and meld in O(1) worst-case time, and deleteMin in O(log n) worst-case time. These bounds are asymptotically optimal among all comparison-based priority queues. In this paper, we adapt Brodal's data structure to a purely functional setting. In doing so, we both simplify the data structure and clarify its relationship to the binomial queues of Vuillemin, which support all four operations in O(log n) time. Speciically, we derive our implementation from binomial queues in three steps: rst, we reduce the running time of insert to O(1) by eliminating the possibility of cascading links; second, we reduce the running time of ndMin to O(1) by adding a global root to hold the minimum element; and nally, we reduce the running time of meld to O(1) by allowing priority queues to contain other priority queues. Each of these steps is expressed using ML-style functors. The last transformation, known as data-structural bootstrapping, is an interesting application of higher-order functors and recursive structures.J. Funct. Program.paradigms/functional_programming/2017-09-06T01:58:19.7929660642017-09-06T01:58:19.792966064<EFBFBD>q<EFBFBD>9
Q<02>s1GGLive Migration of Virtual Machines<07>Migrating operating system instances across distinct physical hosts is a useful tool for administrators of data centers and clusters: It allows a clean separation between hard-ware and software, and facilitates fault management, load balancing, and low-level system maintenance.
By carrying out the majority of migration while OSes continue to run, we achieve impressive performance with minimal service downtimes; we demonstrate the migration of entire OS instances on a commodity cluster, recording service downtimes as low as 60<i>ms</i>. We show that that our performance is sufficient to make live migration a practical tool even for servers running interactive loads.
In this paper we consider the design options for migrating OSes running services with liveness constraints, focusing on data center and cluster environments. We introduce and analyze the concept of writable working set, and present the design, implementation and evaluation of high-performance OS migration built on top of the Xen VMM.NSDIoperating_systems/2017-09-06T01:58:18.8835410162017-09-06T01:58:18.883541016 &
bbq <0A>> <0C> <07> <09>V<00>X<EFBFBD>& ]yqGG|7de4f6fddb11254d1fd5f8adfd67b6e0c9439eaathe-derivative-of-a-regular-type-one-hole-contexts.pdfplt/the derivative of a regular type one hole contexts2017-09-06T01:52:31.4571459962017-09-06T01:52:31.457145996<EFBFBD>?<3F>) ]Y!QGG 614d66c63f8a04cf24cf19ce885f6a34be56a67ccommunicating-sequential-processes.pdfprocesses/communicating sequential processes2017-09-06T01:52:31.4744890142017-09-06T01:52:31.474489014<EFBFBD>,<2C>. ]IAEEY67ea9f0fe38b6848de19578589eab498473562c3ids-evasion-ptacek-newsham.pdfsecurity/ids evasion ptacek newsham2017-09-06T01:52:31.495479982017-09-06T01:52:31.49547998<EFBFBD>!<21>, ]71/CCI23c425f022baa054c68683eaf81f5d482915ce13grovers_algorithm.pdfquantum_computing/grovers algorithm2017-09-06T01:52:31.48959792017-09-06T01:52:31.4895979<EFBFBD>L<EFBFBD>/ ]g_GGEdd0854bf535d79d51104ae3d5c19c6ac7e562180macaroons-cookies-with-contextual-caveats.pdfsecurity/macaroons cookies with contextual caveats2017-09-06T01:52:31.5000009772017-09-06T01:52:31.500000977
y<00> ]IAEE67ea9f0fe38b6848de19578589eab498473562c3ids-evasion-ptacek-newsham.pdfsecurity/ids evasion ptacek newsham2017-09-06T01:52:31.495479982017-09-06T01:52:31.49547998<EFBFBD>!<21>- ]31+GG4703d0b290a4ece50c17854ed72ecc808ce3e6f43shors_algorithm.pdfquantum_computing/shors algorithm2017-09-06T01:52:31.4922749022017-09-06T01:52:31.492274902 <0B><00> ]71/CC23c425f022baa054c68683eaf81f5d482915ce13grovers_algorithm.pdfquantum_computing/grovers algorithm2017-09-06T01:52:31.48959792017-09-06T01:52:31.4895979<EFBFBD>?<3F>+ ][1S==239ff60210c28900f866c588f40e974d897a9f62advance_in_quantum_machine_learning.pdfquantum_computing/advance in quantum machine learning2017-09-06T01:52:31.48452017-09-06T01:52:31.4845%<00> ]<5D>7<>GG9b8aec8ef5c67da463f5ec7c174570eb7d1643a8epitaxis-a-system-for-syntactic-and-semantic-software-queries.pdfprogram_verification/epitaxis a system for syntactic and semantic sof<6F><02>* ]<5D>7<>GG<01>9b8aec8ef5c67da463f5ec7c174570eb7d1643a8epitaxis-a-system-for-syntactic-and-semantic-software-queries.pdfprogram_verification/epitaxis a system for syntactic and semantic software queries2017-09-06T01:52:31.4805009772017-09-06T01:52:31.480500977<EFBFBD>K<EFBFBD>( ]e!]GG d0d8b7501d7f75613d5493d706d6d81852a73d6ecommunicating-sequential-processes-paper.pdfprocesses/communicating sequential processes paper2017-09-06T01:52:31.4684499512017-09-06T01:52:31.468449951<EFBFBD>0<EFBFBD>' ]QIGG5e437aad09eb0508f015c4615e3a9c738bdee9fdftheory-in-programming-practice.pdfplt/theory in programming practice2017-09-06T01:52:31.4609099122017-09-06T01:52:31.460909912<00> ]yqGG7de4f6fddb11254d1fd5f8adfd67b6e0c9439eaathe-derivative-of-a-regular-type-one-hole-contexts.pdfplt/the derivative of a regular type one hole contexts2017-09-06T01:52:31.4571459962017-09-06T01:52:31.457145996 <00><01><0F><0F><0F><0F><0F><0F><0F><0F>zdVJ0 <0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>xj\S>$ <0A> <0A> <0A> <0A> <0A> <0A> y m c M @ -   <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> k V D 6 ,   <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> v V H 4 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
s
i
`
I
@
6
"

<09> <09> <09> <09> <09> <09> <09> <09> c X O F =  <08><08><08><08><08><08><08><08>}iTD'
<07><07><07><07><07><07><07><07>{^I:1<06><06><06><06><06><06><06><06><06><06>n\F/<05><05><05><05><05><05><05><05>u^ULC:0%<04><04><04><04><04><04><04>ypaK<&<03><03><03><03><03><03><03>teN5&<02><02><02><02><02><02><02><02><02><02>scWB& <01><01><01><01><01><06>zvul<07>yaslr<06>xwar <0C>wdisruptor <0A>v!ciphertext<18>u7malicious participant<19>t9senders and recipients<12>s+virtual machine <09>ritself <0A>q!translator <09>pparity <09>ostripe<06>ntla<07>mundp <0B>lun women <0B>kviolence
<EFBFBD>jconduct<08>iunfpa<06>hcut<12>g+message logging<07>ffifo<11>e)chandy-lamport<15>d1consensus protocol <0C>cpractical<16>b3consensus algorithm<14>a/understandability <0C>`conductor <09>_magnet <0A>^!relativity<1A>];communication subsystem<12>\+process crashes<14>[/reliable delivery<11>Z)legacy systems <0A>Y!provenance<18>X7mobile ad-hoc network <0B>Wforensic<13>V-traffic analysis <0C>Uherbivore<13>T-complex problems <0C>Slsm-trees<06>Rvfs<14>Q/different systems<1E>PCperformance and consistency<12>O+data management<08>Ndbmss<06>Mlca<10>L'constant time <0B>Kancestor<06>Jrmq<10>I'documentation <0B>Hsubclass<08>Gpmcmc<07>Fmcmc<06>Esmc<06>Dpga<06>Cssm<06>Bmpi<14>A/cluster computing <0B>@multiple<16>?3resource allocation<06>>vdf<0F>=%object store<06><dos<10>;'impossibility<14>:/different results<06>9ues
<EFBFBD>8popular<15>71computing hardware<14>6/single individual<14>5/general principle<13>4-design principle<0F>3%node failure<12>2+storage systems <0C>1data loss <0B>0ramcloud<06>/fds
<EFBFBD>.dilemma<07>-cpus<06>,hdf<13>+-atomic multicast<08>*essay <0B>)educator<16>(3area of mathematics
<EFBFBD>'poincar<10>&'mathematician<06>%tmi <0C>$datastore<12>#+general pattern<1A>";large-scale application<19>!9global serializability <09> border<06>dns
<EFBFBD>beehive <09>dc-net
<EFBFBD>dissent <09>clique<12>+traffic changes<14>/intermediate node<11>)optimal scheme<06>vlb<1A>;combinatorial algorithm <0A>!modularity<12>+lazy evaluation<11>)order function<16>3functional language<18>7higher-order function<08>eeect<07>glue <09>tarzan<0E> #low-latency<08> onion<06> tor
<EFBFBD>
censors
<EFBFBD> secrecy <0C>initiator<1A>;anonymous communication<06>lru<06>lce<06>lcd<08>chunk<1A>;interactive application<15>1time-varying value<17>5reactive programming<16>3multidirectionality<06>~dak<06>}dsl<0E>|#crazy stone<0E>{#tree search<08>zsucce<06>yuct <0C>xgame tree<11>w)cryptocurrency<07>vcoin<06>upow<14>t/in-depth analysis<06>sgpe<07>rprob<16>q3fundamental concept <0C>ppredicate<0F>o%global state <0A>n!checkpoint<0E>m#local state<13>l-analysis threads <09>kvictim
<EFBFBD>jevasion<0E>i#cardinality<0F>h%near-optimal<11>g)rough estimate<11>f)number of tags <0B>ecounting<1D>dAtree augmented naive bayes<11>c)tan classifier<06>bmdl
<EFBFBD>atribute<06>`bnc<08>_cover<14>^/locality property<14>]/different cluster<16>\3considerable amount<15>[1global information<06>Zjse <0A>Y!own action<07>Xdyad <0B>Wco-actor<0F>V%joint action<12>U+storage service<15>T1strong consistency<14>S/chain replication<12>R+high throughput<0E>Q#spectrogram <09>Pshazam<0E>O#fingerprint<11>N)fingerprinting<08>Mradio<07>Lpnut<12>K+google bigtable<0F>J%google, inc.<10>I'system design
<EFBFBD>Hclassic<13>G-computer systems<07>Fhint <09>Equorum<12>D+sequence number<14>C/cleanup operation<10>B'pop operation <0A>A!starvation<08>@stack"<22>?Ksynchronous distributed systems<1F>>Econsensus in an asynchronous<07>=rati<17><5theoretical research<12>;+database theory<06>:ory <0B>9blessing <0B>8vanadium <0B>7tutorial<06>6iot <0A>5!delegation <0B>4splicing<06>3asd<07>2asap
<EFBFBD>1genomic
<EFBFBD>0isoform <09>/sparse <09>.custom
<EFBFBD>-testbed<06>,dsg <0C>+developed<06>*cop <0A>)!data model<17>(5high-level operators <09>'tiling <0B>&locality<13>%-expression graph<0E>$#input array
<EFBFBD>#spartan<06>"pig<1E>!Cimplementation of mapreduce<08> ssion<06>gfs<08>mapre<0E>#side-effect <0B>reactive <05> ;<05><00>J<EFBFBD>=
}<02>KQ#GGSpartan: A Distributed Array Framework with Smart Tiling<07>Application programmers in domains like machine learning, scientific computing, and computational biology are accustomed to using powerful, high productivity array languages such as MatLab, R and NumPy. Distributed array frameworks aim to scale array programs across machines. However, maximizing the locality of access to distributed arrays is an unsolved problem; such locality is critical for high performance. This paper presents Spartan, a distributed array framework that automatically determines how to best partition (aka " tile ") n-dimensional arrays and to co-locate data with computation to maximize locality. Spartan combines a lazy-evaluation based, optimizing frontend with a distributed tiled array backend. Central to Spartan's design is a small number of carefully chosen parallel high-level operators, which form the expression graph captured by Spartan's frontend during runtime. These operators simplify the programming of distributed applications. More importantly , their well-defined semantics allow Spartan's runtime to calculate the costs of different tiling strategies and pick the best one for evaluating the entire expression graph. Using Spartan, we have implemented 12 applications from a variety of domains including machine learning and scientific computing. Our evaluations show that Spartan's automatic tiling mechanism leads to good and scalable performance while eliminating the need for manual tiling.USENIX Annual Technical Conferencedatastores/2017-09-06T01:58:22.5747380372017-09-06T01:58:22.574738037<EFBFBD>A<EFBFBD><
{<02>e5GGMapReduce: Simplified Data Processing on Large Clusters<07>MapReduce is a programming model and an associated implementation for processing and generating large datasets that is amenable to a broad variety of real-world tasks. Users specify the computation in terms of a <i>map</i> and a <i>reduce</i> function, and the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks. Programmers find the system easy to use: more than ten thousand distinct MapReduce programs have been implemented internally at Google over the past four years, and an average of one hundred thousand MapReduce jobs are executed on Google's clusters every day, processing a total of more than twenty petabytes of data per day.OSDIdistributed_systems/2017-09-06T01:58:21.7221240232017-09-06T01:58:21.722124023 <01> <09>M<01><00>0<EFBFBD>@
<02>C5EEStronger Semantics for Low-Latency Geo-Replicated Storage<07>We present the first scalable, geo-replicated storage system that guarantees low latency, offers a rich data model, and provides " stronger " semantics. Namely, all client requests are satisfied in the local datacenter in which they arise; the system efficiently supports useful data model abstractions such as column families and counter columns; and clients can access data in a causally-consistent fashion with read-only and write-only transac-tional support, even for keys spread across many servers. The primary contributions of this work are enabling scalable causal consistency for the complex column-family data model, as well as novel, non-blocking algorithms for both read-only and write-only transactions. Our evaluation shows that our system, Eiger, achieves low latency (single-ms), has throughput competitive with eventually-consistent and non-transactional Cassandra (less than 7% overhead for one of Facebook's real-world workloads), and scales out to large clusters almost linearly (averaging 96% increases up to 128 server clusters).NSDIdistributed_systems/2017-09-06T01:58:27.337752932017-09-06T01:58:27.33775293<EFBFBD>?<3F>?
}<02>Q#5GGSelf-stabilizing Systems in Spite of Distributed Control<07>The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation &#8220;the system is in a legitimate state&#8221; invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily&#8212;and quite systematically&#8212;implemented if the different processes can be granted mutually exclusive access to a common store in which &#8220;the current system state&#8221; is recorded.Commun. ACMdistributed_systems/2017-09-06T01:58:25.7144470212017-09-06T01:58:25.714447021<EFBFBD>l<EFBFBD>>
c<02>A-/GGThe extensible neuroimaging archive toolkit<07>The Extensible Neuroimaging Archive Toolkit (XNAT) is a software platform designed to facilitate common management and productivity tasks for neuroimaging and associated data. In particular, XNAT enables qualitycontrol procedures and provides secure access to and storage of data. XNAT follows a threetiered architecture that includes a data archive, user interface, and middleware engine. Data can be entered into the archive as XML or through data entry forms. Newly added data are stored in a virtual quarantine until an authorized user has validated it. XNAT subsequently maintains a history profile to track all changes made to the managed data. User access to the archive is provided by a secure web application. The web application provides a number of quality control and productivity features, including data entry forms, data-type-specific searches, searches that combine across data types, detailed reports, and listings of experimental data, upload/download tools, access to standard laboratory workflows, and administration and security tools. XNAT also includes an online image viewer that supports a number of common neuroimaging formats, including DICOM and Analyze. The viewer can be extended to support additional formats and to generate custom displays. By managing data with XNAT, laboratories are prepared to better maintain the long-term integrity of their data, to explore emergent relations across data types, and to share their data with the broader neuroimaging community.Neuroinformaticspattern_matching/2017-09-06T01:58:23.4791159672017-09-06T01:58:23.479115967 dnd<00><06>B
_<02>_aGGA sparse Johnson: Lindenstrauss transform<07>Dimension reduction is a key algorithmic tool with many applications including nearest-neighbor search, compressed sensing and linear algebra in the streaming model. In this work we obtain a <i>sparse</i> version of the fundamental tool in dimension reduction -- the Johnson-Lindenstrauss transform. Using hashing and local densification, we construct a sparse projection matrix with just ~O(1/&#949;) non-zero entries per column. We also show a matching lower bound on the sparsity for a large class of projection matrices. Our bounds are somewhat surprising, given the known lower bounds of &#937;(1/&#949;<sup>2</sup>) both on the number of rows of any projection matrix and on the sparsity of projection matrices generated by natural constructions. Using this, we achieve an ~O(1/&#949;) update time per non-zero element for a (1 &#949;)-approximate projection, thereby substantially outperforming the ~O(1/&#949;<sup>2</sup>) update time required by prior approaches. A variant of our method offers the same guarantees for sparse vectors, yet its ~O(d) worst case running time matches the best approach of Ailon and Liberty.STOCmachine_learning/dimensionality_reduction/2017-09-06T01:58:29.4133120122017-09-06T01:58:29.413312012<EFBFBD><0E>A <00><02>i 3GGTechniques for Automated Generation of Testbed Infrastructures for SOA<07>Service-oriented architecture (SOA), as a paradigm for flexible distributed computing based on modular services, has become a major topic in computer science and in software industry. As a result, numerous SOA-based concepts have been published by the research community and many software solutions are nowadays provided by the industry. However, both, the research community and the industry, have neglected the need for sophisticated support for testing of SOA's. While most of the effort has been put into supporting the testing of single Web services, only very few works actually aim at testing of complex SOA-based systems. In particular, there is a lack of solutions for testing of systems that will be deployed in service-based environments and that need proper testbeds at development time. In this thesis we focus on solving this issue and present our results on automated generation of testbed infrastructures for SOA. The purpose of our work is to provide means for developers to generate customized testbeds that emulate missing SOA environments in order to have an infrastructure for testing the developed system at runtime. We have developed techniques for modeling SOA environments in an extensible manner, a scripting language for specifying the models, mechanisms for generating running testbeds from these models, and techniques for automating the whole process to a certain degree. We have implemented a prototype framework, called GENESIS, and applied it for testing and evaluation of SOA-based systems. We present the developed concepts and techniques in detail, explain how they have evolved, how they can be extended for implementing custom testbed features, and, eventually, how the framework is applied in practice. In addition, we provide all developed software prototypes as open-source for proving the correctness of the developed techniques, plus, as a contribution to the research community. iii Acknowledgements First of all, I would like to thank my advisor Prof. Schahram Dustdar for the opportunity to carry out my PhD studies at the Distributed Systems Group (DSG). I am very grateful for the liberty to choose a research field and to develop my own ideas within such a great environment as the DSG. Especially, I am much obliged for the invaluable support Prof. Dustdar gave me during the hard days of my studies and for the mentoring during all phases of my research. Additionally, I would also like to thank Prof. Frank Leymann for being my second advisor and examiner, and for his valuable comments …computer_education/2017-09-06T01:58:28.3543059082017-09-06T01:58:28.354305908 
3
3<00>I<EFBFBD>C
o<02>y9%AAASAP: the Alternative Splicing Annotation Project<07>Recently, genomics analyses have demonstrated that alternative splicing is widespread in mammalian genomes (30-60% of genes reported to have multiple isoforms), and may be one of their most important mechanisms of functional regulation. However, by comparison with other genomics data such as genome annotation, SNPs, or gene expression, there exists relatively little database infrastructure for the study of alternative splicing. We have constructed an online database ASAP (the Alternative Splicing Annotation Project) for biologists to access and mine the enormous wealth of alternative splicing information coming from genomics and proteomics. ASAP is based on genome-wide analyses of alternative splicing in human (30 793 alternative splice relationships found) from detailed alignment of expressed sequences onto the genomic sequence. ASAP provides precise gene exon-intron structure, alternative splicing, tissue specificity of alternative splice forms, and protein isoform sequences resulting from alternative splicing. Moreover, it can help biologists design probe sequences for distinguishing specific mRNA isoforms. ASAP is intended to be a community resource for collaborative annotation of alternative splice forms, their regulation, and biological functions. The URL for ASAP is http://www.bioinformatics.ucla.edu/ASAP.Nucleic Acids Researchtime_series/2017-09-06T01:58:30.1311252017-09-06T01:58:30.131125 g4g<00>I<EFBFBD>E
W<02>-GGDistributed Authorization in Vanadium<07>In this tutorial, we present an authorization model for distributed systems that operate with limited internet connectivity. Reliable internet access remains a luxury for a majority of the world's population. Even for those who can afford it, a dependence on internet connectivity may lead to sub-optimal user experiences. With a focus on decentralized deployment, we present an authorization model that is suitable for scenarios where devices right next to each other (such as a sensor or a friend's phone) should be able to communicate securely in a peer-to-peer manner. The model has been deployed as part of an open-source distributed application framework called Vanadium. As part of this tuto-rial, we survey some of the key ideas and techniques used in distributed authorization, and explain how they are combined in the design of our model.FOSADsecurity/2017-09-06T01:58:33.1456110842017-09-06T01:58:33.145611084<EFBFBD>H<EFBFBD>D
e<02>;c5GGHarvest, Yield and Scalable Tolerant Systems<07>The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today's Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in terms of harvest and yield, and map it directly onto engineering mechanisms that enhance availability by improving fault isolation, and in some cases also simplify programming. By collecting examples of related techniques in the literature and illustrating the surprising range of applications that can benefit from these approaches, we hope to motivate a broader research program in this area. Increasingly, infrastructure services comprise not only routing, but also application-level resources such as search engines [15], adaptation proxies [8], and Web caches [20]. These applications must confront the same ¢ ¡ ¤ £ ¦ ¥ operational expectations and exponentially-growing user loads as the routing infrastructure, and consequently are absorbing comparable amounts of hardware and software. The current trend of harnessing commodity-PC clusters for scalability and availability [9] is reflected in the largest web server installations. These sites use tens to hundreds of PC's to deliver 100M or more read-mostly page views per day, primarily using simple replication or relatively small data sets to increase throughput. The scale of these applications is bringing the well-known tradeoff between consistency and availability [4] into very sharp relief. In this paper we propose two general directions for future work in building large-scale robust systems. Our approaches tolerate partial failures by emphasizing simple composition mechanisms that promote fault containment, and by translating possible partial failure modes into engineering mechanisms that provide smoothly-degrading functionality rather than lack of availability of the service as a whole. The approaches were developed in the context of cluster computing, where it is well accepted [22] that one of the major challenges is the nontrivial software engineering required to automate partial-failure handling in order to keep system management tractable. In this discussion, strong consistency means single-copy ACID [13] consistency; by assumption a strongly-consistent system provides the ability to perform updates, otherwise discussing consistency is irrelevant. High availability is assumed to be provided through redundancy, e.g. data replication; data is considered highly available if a given consumer of the data can always reach some replica. Partition-resilience means that the system as whole can survive a partition between data replicas. The CAP …Workshop on Hot Topics in Operating Systemsdistributed_systems/2017-09-06T01:58:32.4230400392017-09-06T01:58:32.423040039 Q <04>Q<00>m<EFBFBD>I
E<02>=O1GGThe Solovay-Kitaev algorithm<07>This pedagogical review presents the proof of the Solovay-Kitaev theorem in the form of an efficient classical algorithm for compiling an arbitrary single-qubit gate into a sequence of gates from a fixed and finite set. The algorithm can be used, for example, to compile Shor's algorithm, which uses rotations of π/2 k , into an efficient fault-tolerant form using only Hadamard, controlled-not, and π/8 gates. The algorithm runs in O(log 2.71 (1/ǫ)) time, and produces as output a sequence of O(log 3.97 (1/ǫ)) quantum gates which is guaranteed to approximate the desired quantum gate to an accuracy within ǫ > 0. We also explain how the algorithm can be generalized to apply to multi-qubit gates and to gates from SU (d).Quantum Information & Computationquantum_computing/2017-09-06T01:58:39.3384130862017-09-06T01:58:39.338413086<EFBFBD>A<EFBFBD>H <00> <02>U5EEImpossibility of Distributed Consensus with One Faulty Process<07>The consensus problem involves an asynchronous system of processes, some of which may be unreliable. The problem is for the reliable processes to agree on a binary value. In this paper, it is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process. By way of contrast, solutions are known for the synchronous case, the &#8220;Byzantine Generals&#8221; problem.J. ACMdistributed_systems/2017-09-06T01:58:36.008517092017-09-06T01:58:36.00851709<EFBFBD>~<7E>G
c<02>{##GGDatabase metatheory: asking the big queries<07>Is " database theory " an oxymoron? Or is ata platitude? What is the fitness measure that decides the surviva! of ideas (and areas) in mathematics, in applted science, and in computer science? Which ideas from database theory during the past twenty-five years have influenced research in other fields of computer science? How many were encapsulated in actual products? Was the rela-tional model the on[y true paradigm sh@ m computer science ? Is applicability the only and ultimate justification of theoretical research in an applied science? Are applicability pressures rea!ly exogenous and unwelcome? Are negattve results appropriate goals of theoretical research in an appiied science —or are they the on[y pos-sibie such research goals? If scientific theories must be refutab!e, what are the " hard facts " that provide the possibility of refutation in the case of database theory?SIGACT Newsdatastores/2017-09-06T01:58:34.9587380372017-09-06T01:58:34.958738037<EFBFBD>s<EFBFBD>F
s<02>U 9GGDavis's Poetic Dialogue with Leiris's Autobiography<07>In his article "Davis's Poetic Dialogue with Leiris's Autobiography" Jonathan Evans analyzes Lydia Davis's translation of the first two parts of Michel Leiris's autobiography, which shows an encounter between two writers. Davis has also written stories which reference Leiris and thus position him as a precursor. Evans proposes that Leiris is not only a source of influence for Davis, but that their texts can be read as a dialogue. Using a methodology that draws on Lacanian psychoanalysis, Evans shows how Leiris focuses on sound and graphological patterns in order to understand his own conscious and unconscious relationship with words. Davis, in her stories, forces the reader to question their own relationship to language and the symbolic order. Thus, Davis's translation of Leiris's autobiography becomes a graft on her work as it offers her a chance to explore writing in a way which would be uncharacteristic in her own work. Jonathan Evans, "Davis's Poetic Dialogue with Leiris's Autobiography" page 2 of 10 CLCWeb: Comparative Literature and Culture 14.1 (2012): <http://docs.lib.purdue.edu/clcweb/vol14/iss1/8>logic_and_programming/2017-09-06T01:58:34.0905830082017-09-06T01:58:34.090583008 i<00><0F><0F><0F>f=
<0E><0E><0E>zU* <0A> <0A> <0A> <0A> e G ' <0C> <0C> <0C> <0C> i F  <0B> <0B> <0B> <0B> t J & 
<EFBFBD>
<EFBFBD>
<EFBFBD>
}
N
!
 <09> <09> <09> } U #<08><08><08>zN,<07><07><07><07>mO3<06><06><06><06>uQ1 <05><05><05>U(<04><04><04>sQ <03><03><03>V4<02><02><02>rP*<01><01><01>uL%<00>#<23>J+ Marco ScandurraMarcoScandurra$<24>I-Thomas B. SchönThomasB.Schön&<26>H/Michael I. JordanMichaelI.Jordan%<25>G- Fredrik LindstenFredrikLindsten<19>F! Ali GhodsiAliGhodsi%<25>E- Benjamin HindmanBenjaminHindman"<22>D+Andrew W. LeungAndrewW.Leung!<21>C) Peter DruschelPeterDruschel#<23>B+ Antony RowstronAntonyRowstron<1F>A' Mahadev KonarMahadevKonar<1D>@% Patrick HuntPatrickHunt,<2C>?5Daniel H. H. IngallsDanielH. H.Ingalls%<25>>- Mendel RosenblumMendelRosenblum(<28>=1!John K. OusterhoutJohnK.Ousterhout<1D><% Sachin KattiSachinKatti<1F>;' Ryan StutsmanRyanStutsman&<26>:/Stephen M. RumbleStephenM.Rumble<19>9! Asaf CidonAsafCidon<1D>8% Yutaka SuzueYutakaSuzue"<22>7+Owen S. HofmannOwenS.Hofmann<1D>6% Jinliang FanJinliangFan<1D>5% Jeremy ElsonJeremyElson.<2E>47#Edmund B. NightingaleEdmundB.Nightingale<1F>3' Torben ThraneTorbenThrane'<27>2/ Benoît GarbinatoBenoîtGarbinato#<23>1+ Fernando PedoneFernandoPedone.<2E>07Parisa Jalili MarandiParisaJaliliMarandi<1B>/# Samuel BenzSamuelBenz<13>. Ian DeyIanDey*<2A>-3William P. ThurstonWilliamP.Thurston'<27>,/ !Úlfar ErlingssonÚlfarErlingsson#<23>++ Arnar BirgissonArnarBirgisson#<23>*+ Vadim YushprakhVadimYushprakh#<23>)+ Alexander LloydAlexanderLloyd<15>( Yawei LiYaweiLi%<25>'-# Jean-Michel LeonJean-MichelLeon<1D>&% James LarsonJamesLarson!<21>%) Andrey KhorlinAndreyKhorlin<1C>$%J. J. FurmanJ.J.Furman$<24>#-James C. CorbettJamesC.Corbett<19>"! Chris BondChrisBond<1B>!# Jason BakerJasonBaker;<3B> C# +Venugopalan RamasubramanianVenugopalanRamasubramanian<19>! Milo PolteMiloPolte<1B># Mark RobsonMarkRobson<1B># Sharad GoelSharadGoel$<24>-Paul F. SyversonPaulF.Syverson!<21>) Nick MathewsonNickMathewson%<25>- !Roger DingledineRogerDingledine+<2B>3 #Ioannis StavrakakisIoannisStavrakakis<1F>' Sofia SyntilaSofiaSyntila)<29>1 Nikolaos LaoutarisNikolaosLaoutaris(<28>1Wolfgang De MeuterWolfgangDeMeuter#<23>+ Stijn MostinckxStijnMostinckx <20>)Tom Van CutsemTomVanCutsem2<6D>;Andoni Lombide CarretonAndoniLombideCarreton/<2F>7 %Engineer BainomugishaEngineerBainomugisha%<25>- Chandan ShanbhagChandanShanbhag<1B># Saul JaspanSaulJaspan<1F>' Donald BeaverDonaldBeaver<1D>% Manoj PlakalManojPlakal!<21> ) !Pat StephensonPatStephenson<1D> % Mike BurrowsMikeBurrows*<2A> 3Luiz André BarrosoLuizAndréBarroso,<2C>
5Benjamin H. SigelmanBenjaminH.Sigelman<1D> % Rémi CoulomRémiCoulom <20>)James B. OrlinJamesB.Orlin <20>)T. V. LakshmanT.V.Lakshman(<28>1Murali S. KodialamMuraliS.Kodialam<15> Part OnePartOne!<21>) Jeroen BeltmanJeroenBeltman'<27>/ %Marc SchuilenburgMarcSchuilenburg<1C>%Alex De JongAlexDeJong<1B># Ryan FarellRyanFarell<1F>' Alfred TarskiAlfredTarski!<21>) Keith MarzulloKeithMarzullo%<25>~- Özalp BabaoğluÖzalpBabaoğlu$<24>}-Peter G. NeumannPeterG.Neumann <20>|)Karl N. LevittKarlN.Levitt<1B>{# Vern PaxsonVernPaxson<19>z! Haifeng YuHaifengYu<1B>y# Ziling ZhouZilingZhou<1B>x# Binbin ChenBinbinChen)<29>w1 !Moisés GoldszmidtMoisésGoldszmidt<19>v! Dan GeigerDanGeiger<1D>u% Nir FriedmanNirFriedman<1B>t# David PelegDavidPeleg#<23>s+ Baruch AwerbuchBaruchAwerbuch<15>r Dirk FoxDirkFox<19>q! Avery WangAveryWang$<24>p-Robert E. GruberRobertE.Gruber<1D>o% Andrew FikesAndrewFikes!<21>n) Tushar ChandraTusharChandra(<28>m1Deborah A. WallachDeborahA.Wallach"<22>l+Wilson C. HsiehWilsonC.Hsieh<17>k Fay ChangFayChang(<28>j1Butler W. LarnpsonButlerW.Larnpson!<21>i) Marco SerafiniMarcoSerafini$<24>h-Benjamin C. ReedBenjaminC.Reed0<64>g9Flavio Paiva JunqueiraFlavioPaivaJunqueira&<26>f/Smruti R. SarangiSmrutiR.Sarangi!<21>e) Pooja AggarwalPoojaAggarwal<17>d Seep GoelSeepGoel(<28>c1Michael A. NielsenMichaelA.Nielsen.<2E>b7#Christopher M. DawsonChristopherM.Dawson t <0B><07>t<00>U<EFBFBD>L <00><02>e<EFBFBD>35GGZab: High-performance broadcast for primary-backup systems<07>Zab is a crash-recovery atomic broadcast algorithm we designed for the ZooKeeper coordination service. ZooKeeper implements a primary-backup scheme in which a primary process executes clients operations and uses Zab to propagate the corresponding incremental state changes to backup processes<sup>1</sup>. Due the dependence of an incremental state change on the sequence of changes previously generated, Zab must guarantee that if it delivers a given state change, then all other changes it depends upon must be delivered first. Since primaries may crash, Zab must satisfy this requirement despite crashes of primaries.2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)distributed_systems/2017-09-06T01:58:43.8541298832017-09-06T01:58:43.854129883<EFBFBD>?<3F>K
/<02>!=GGA Wait-Free Stack<07>In this paper, we describe a novel algorithm to create a concurrent wait-free stack. To the best of our knowledge, this is the first wait-free algorithm for a general purpose stack. In the past, researchers have proposed restricted wait-free implementations of stacks, lock-free implementations, and efficient universal constructions that can support wait-free stacks. The crux of our wait-free implementation is a fast pop operation that does not modify the stack top; instead, it walks down the stack till it finds a node that is unmarked. It marks it but does not delete it. Subsequently, it is lazily deleted by a cleanup operation. This operation keeps the size of the stack in check by not allowing the size of the stack to increase beyond a factor of W as compared to the actual size. All our operations are wait-free and linearizable.ICDCITnon_blocking_algorithms/2017-09-06T01:58:42.1691831052017-09-06T01:58:42.169183105<EFBFBD>l<EFBFBD>J
-<02> -GGIdeal Hash Trees<07>Hash Trees with nearly ideal characteristics are described. These Hash Trees require no initial root hash table yet are faster and use significantly less space than chained or double hash trees. Insert, search and delete times are small and constant, independent of key set size, operations are O(1). Small worst-case times for insert, search and removal operations can be guaranteed and misses cost less than successful searches. Array Mapped Tries(AMT), first described in Fast and Space Efficient Trie Searches, Bagwell [2000], form the underlying data structure. The concept is then applied to external disk or distributed storage to obtain an algorithm that achieves single access searches, close to single access inserts and greater than 80 percent disk block load factors. In addition two further applications of AMTs are briefly described, namely, Class/Selector dispatch tables and IP Routing tables. Each of the algorithms has a performance and space usage that is comparable to contemporary implementations but simpler.data_structures/2017-09-06T01:58:40.3156621092017-09-06T01:58:40.315662109 q<05>q<00>u<EFBFBD>N <00>#<02>+ 5GGUnderstanding the Limitations of Causally and Totally Ordered Communication<07>Causally and totally ordered communication support (CATOCS) has been proposed as important to provide as part of the basic building blocks for constructing reliable distributed systems. In this paper, we identify four major limitations to CATOCS, investigate the applicability of CATOCS to several classes of distributed applications in light of these limitations, and the potential impact of these facilities on communication scalability and robustness. From this investigation, we find limited merit and several potential problems in using CATOCS. The fundamental difficulty with the CATOCS is that it attempts to solve state problems at the communication level in violation of the well-known " end-to-end " argument.distributed_systems/2017-09-06T01:58:46.3475190432017-09-06T01:58:46.347519043<EFBFBD><12>M
M<02>% QEEHints for Computer System Design<07>A b s t r a c t Experience with the design and implementation of a number of computer systems, and study of many other systems , has led to some general hints for system design which are described here. They are illustrated by a number of examples, ranging from hardware such as the Alto and the Dorado to applications programs such as Bravo and Star. Designing a computer system is very different from designing an algorithm: The external interface (i.e., the requirement) is more complex, less precisely defined, and more subject to change. The system has much more internal structure, and hence many internal interfaces. The measure of success is much less clear. The designer usually finds himself floundering in a sea of possibilities, unclear about how one choice will limit his freedom to make other choices, or affect the size and performance of the entire system. There probably isn't a best way to build the system, or even any major part of it; much more important is to avoid choosing a terrible way, and to have clear division of responsibilities among the parts. I have designed and built a number of computer systems, some that worked and some that didn't. I have also used Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. and studied many other systems, both successful and unsuccessful. From this experience come some general hints for designing successful systems. I claim no originality for them; most are part of the folk wisdom of experienced designers. Nonetheless, even the expert often forgets, and after the second system [6] comes the fourth one. Disclaimer'. These are not novel (with a few exceptions), foolproof recipes, laws of system design or operation, precisely formulated, consistent, always appropriate, approved by all the leading experts, or guaranteed to work; they are just hints. Some are quite general and vague; others are specific techniques which are more widely applicable than many people know. Both the hints and the illustrative examples are necessarily oversimplified. Many are controversial. I have tried to avoid exhortations to …comp_sci_fundamentals_and_history/2017-09-06T01:58:45.192372072017-09-06T01:58:45.19237207 <04> {x<04><00>J<EFBFBD>R <00><02>a5GGChain Replication for Supporting High Throughput and Availability<07>Chain replication is a new approach to coordinating clusters of fail-stop storage servers. The approach is intended for supporting large-scale storage services that exhibit high throughput and availability without sacrificing strong consisten
<00>] /GGFaculty of Associated Medical Sciences 1. Anterior Translation of Humeral Head in Glenohumeral Joint: Comparison between Limb Dominance and Gender Using Ultrasonography<07>sports_analytics/2017-09-06T01:58:51.0727141112017-09-06T01:58:51.072714111<EFBFBD><1A>P
g<02>3+GGAn Industrial Strength Audio Search Algorithm<07>We have developed and commercially deployed a flexible audio search engine. The algorithm is noise and distortion resistant, computationally efficient, and massively scalable, capable of quickly identifying a short segment of music captured through a cellphone microphone in the presence of foreground voices and other dominant noise, and through voice codec compression, out of a database of over a million tracks. The algorithm uses a combinatorially hashed time-frequency constellation analysis of the audio, yielding unusual properties such as transparency, in which multiple tracks mixed together may each be identified. Furthermore, for applications such as radio monitoring, search times on the order of a few milliseconds per query are attained, even on a massive music database.ISMIRaudio_comp_sci/2017-09-06T01:58:49.0282490232017-09-06T01:58:49.028249023<EFBFBD>c<EFBFBD>O <00><02> =#GGBigtable: A Distributed Storage System for Structured Data<07>Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance. These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to real-time data serving). Despite these varied demands, Bigtable has successfully provided a flexible, high-performance solution for all of these Google products. In this article, we describe the simple data model provided by Bigtable, which gives clients dynamic control over data layout and format, and we describe the design and implementation of Bigtable.ACM Trans. Comput. Syst.datastores/2017-09-06T01:58:47.2713081052017-09-06T01:58:47.271308105 t
<EFBFBD>{?t<00>G<EFBFBD>V
E<02>-=GGBayesian Network Classifiers<07>Recent work in supervised learning has shown that a surprisingly simple Bayesian classifier with strong assumptions of independence among features, called naive Bayes, is competitive with state-of-the-art classifiers such as C4.5. This fact raises the question of whether a classifier with less restrictive assumptions can perform even better. In this paper we evaluate approaches for inducing classifiers from data, based on the theory of learning Bayesian networks. These networks are factored representations of probability distributions that generalize the naive Bayesian classifier and explicitly represent statements about independence. Among these approaches we single out a method we call Tree Augmented Naive Bayes (TAN), which outperforms naive Bayes, yet at the same time maintains the computational simplicity (no search involved) and robustness that characterize naive Bayes. We experimentally tested these approaches, using problems from the University of California at Irvine repository, and compared them to C4.5, naive Bayes, and wrapper methods for feature selection.Machine Learningartificial_intelligence/2017-09-06T01:58:57.7041398932017-09-06T01:58:57.704139893<EFBFBD>8<EFBFBD>U
/<02>' 5GGSparse Partitions<07>This abstract presents a collection of clustering and decomposition techniques enabling the construction of sparse and locality preserving representations for arbitrary networks. These new clustering techniques have already found several powerful applications in the area of distributed network algorithms. Two of these applications are described in this abstract, namely, routing with polynomial communication-space tradeoo and online tracking of mobile users.distributed_systems/2017-09-06T01:58:56.4103701172017-09-06T01:58:56.410370117<EFBFBD>j<EFBFBD>T
<02>[W/GGBitcoin<07>kamoto veröffentlichten digitalen Zahlungssystems Bitcoin [2] ist eigentlich irreführend „digitale Münzen“ gibt es in Bitcoin nämlich nicht. Zumindest technisch gesehen ist Bitcoin kein digitales Geld wie beispielsweise DigiCash [1]. Technisch ähnelt Bitcoin eher einem großen, öffentlichen Haushaltsbuch: In einer immer länger werdenden Liste (Blockchain) werden Transaktionen (Blocks) aneinandergereiht, deren Höhe in „Bitcoin“-Einheiten bemessen wird. Damit stellen die Teilnehmer sich gegenseitig gewissermaßen „Schuldscheine“ aus, in denen sie sich zur Zahlung virtueller ӊ <0B>S
o<02>uAGGPrediction in Joint Action: What, When, and Where<07>Drawing on recent findings in the cognitive and neurosciences, this article discusses how people manage to predict each other's actions, which is fundamental for joint action. We explore how a common coding of perceived and performed actions may allow actors to predict the what, when, and where of others' actions. The "what" aspect refers to predictions about the kind of action the other will perform and to the intention that drives the action. The "when" aspect is critical for all joint actions requiring close temporal coordination. The "where" aspect is important for the online coordination of actions because actors need to effectively distribute a common space. We argue that although common coding of perceived and performed actions alone is not sufficient to enable one to engage in joint action, it provides a representational platform for integrating the actions of self and other. The final part of the paper considers links between lower-level processes like action simulation and higher-level processes like verbal communication and mental state attribution that have previously been at the focus of joint action research.topiCSorganizational_simulation/2017-09-06T01:58:53.2569479982017-09-06T01:58:53.256947998„Bitcoin“ an andere Teilnehmer verpflichten. Neue Transaktionen werden von dem transferierenden Teilnehmer mit einem Zeitstempel versehen, digital unterschrieben und publiziert. Durch unabhängige Teilnehmer der Bitcoin Community (den Minern) wird jeder neue Block geprüft und im Erfolgsfall über einen kryptographischen Hashwert fest mit dem bis dato letzten Eintrag der Liste verknüpft. Die Transaktionsliste ist per Peer-to-Peer-Netzwerk redundant über das Internet verteilt und jedem Teilnehmer zugänglich eine zentrale Verwaltungsinstanz (wie z. B. eine Bank) ist überflüssig. Die Teilnehmer melden sich unter einem (oder mehreren) Pseudonym(en) an; ihre geheimen kryptografischen Schlüssel, mit denen sie die Gültigkeit einer Transaktion zu ihren Gunsten nachweisen und über ihr Guthaben weiter verfügen können, sind in einem lokalen oder von einem Dienstleister verwalteten Wallet gespeichert (das man nicht verlieren oder löschen sollte). Double Spending (das mehrfache Ausgeben einer digitalen Münze), ein zentrales Problem bei elektronischen Währungen, gibt es bei Bitcoin im eigentlichen Sinne nicht. Denn in diesem „Überweisungs-Logbuch“ sind keine Konto-Überziehungen erlaubt: Transferieren darf man nur Bitcoins, die man besitzt. Um Betrug zu verhindern, überprüfen die Bitcoin-Miner jede Transaktion, indem sie aus der Transaktionskette die „Kontostände“ der Beteiligten berechnen und Zahlungsfähigkeit und Signatur überprüfen. Damit ermöglicht Bitcoin aber auch die Erstellung von Profilen über das Zahlungsverhalten einzelner Teilnehmer, mit denen in Einzelfällen z. B. eine Korrelation mit Kaufvorgängen und sogar die Identifikation eines Teilnehmers möglich sein kann anonym ist Bitcoin daher, anders als vielerorts behauptet, nicht (DigiCash und Bargeld hingegen sehr wohl). Das Bitcoin-Protokoll „bereinigt“ die Transaktionsliste um nicht bestätigte Transaktionen oder (wegen möglicher kurzzeitiger Abweichungen der dezentral geführten Listen voneinander) entstandene Verzweigungen (Forks). Daher ist auch erst nach einer Weile (wenige Minuten bis ggf. Stunden) sicher, dass eine Transaktion auch tatsächlich in die maßgebliche Version der Blockchain aufgenommen wurde. Ein Transaktionsempfänger sollte also bis zur Konsolidierung der Blockchain warten, bevor er sich auf den Zahlungseingang verlässt. Für schnelle Transaktionen ist Bitcoin daher eher ungeeignet. Welcher Zweig tatsächlich weitergeführt wird, entscheidet letztlich die Mehrheit der an der Überprüfung beteiligten Systeme. Stirbt ein längerer Fork ab, müssen dort angehängte, verwaiste Transaktionen wieder an die eigentliche Blockchain angehängt werden. Wie aber wird aus einer solchen Transaktionsliste ein Zahlungssystem? Dafür müssen neue B
W<02>[YGGDefending against network IDS evasion<07>ICSI as a Senior Scientist. Most of his work is in the areas of scalable multimedia conferencing systems, reliable multicast protocols, multicast routing and address allocation, and network simulation and visualisation. He is co-chair of the IETF Multiparty Multimedia Session Control working group and the IRTF Reliable Multicast Research Group. When attempting to build sound network intrusion detection systems, a major problem is hardening the monitor against "evasion": attempts by attackers to mislead the monitor as to the actual state of the end-to-end dialog between the attacker and its victim [Ptacek and Newsham 98, Paxson 98]. Evasion techniques include sending traffic that is ambiguous from the monitor's observational vantage point (such as whether a given packet has sufficient TTL to reach the victim) and attempting to overwhelm the monitor by clogging it with more connection state records than it can sustain ("state holding" attacks). One technique for preventing certain forms of evasion attacks is "bifurcating analysis", in which the monitor deals with ambiguous traffic streams by instantiating separate analysis threads for each possible interpretation of the ambiguous traffic. We discuss the applicability of this approach to different forms of evasion, with the key distinction being tractable analysis for cases where the number of analysis threads can be bounded, versus problematic analysis for cases where the attacker can cause the number of threads to grow arbitrarily large.Recent Advances in Intrusion Detectionsecurity/2017-09-06T01:59:00.4037729492017-09-06T01:59:00.403772949<EFBFBD> <0C>X
W<02>_S7GGUnderstanding RFID Counting Protocols<07>Counting the number of radio frequency identification (RFID) tags, namely <i>RFID counting</i>, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i.e., to reduce the time needed to do the counting). This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. As our central thesis, we find out that the overlooked key design aspect for RFID counting protocols to achieve near-optimal performance is a conceptual separation of a protocol into two phases. The first phase uses small overhead to obtain a rough estimate, and the second phase uses the rough estimate to further achieve an accuracy target. Our thesis also indicates that other performance-enhancing techniques or ideas proposed in the literature are only of secondary importance. Guided by our central thesis, we manage to design near-optimal protocols that are more efficient than existing ones and simultaneously simpler than most of them.IEEE/ACM Transactions on Networkingsublinear_algorithms/2017-09-06T01:58:59.6341289062017-09-06T01:58:59.634128906<EFBFBD>H<EFBFBD>W
G<02>1/GGWarnings for pattern matching<07>We examine the ML pattern-matching anomalies of useless clauses and non-exhaustive matches. We state the definition of these anomalies, building upon pattern matching semantics, and propose a simple algorithm to detect them. We have integrated the algorithm in the Objective Caml compiler, but we show that the same algorithm is also usable in a non-strict language such as Haskell. Or-patterns are considered for both strict and nonstrict languages.J. Funct. Program.pattern_matching/2017-09-06T01:58:58.9120349122017-09-06T01:58:58.912034912 H<08>H<00>~<7E>[ <00>5<02>+ 5GGConsistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms<07>Reports are available via anonymous FTP from the area ftp.cs.unibo.it:/pub/TR/UBLCS in compressed PostScript format. Abstracts are available from the same host in the directory /pub/TR/ABSTRACTS in plain text format. All local authors can be reached via e-mail at the address last-name@cs.unibo.it. Abstract Many important problems in distributed computing admit solutions that contain a phase where some global property needs to be detected. This subproblem can be seen as an instance of the Global Predicate Evaluation (GPE) problem where the objective is to establish the truth of a Boolean expression whose variables may refer to the global system state. Given the uncertainties in asynchronous distributed systems that arise from communication delays and relative speeds of computations, the formulation and solution of GPE reveal most of the subtleties in global reasoning with imperfect information. In this paper, we use GPE as a canonical problem in order to survey concepts and mechanisms that are useful in understanding global states of distributed computations. We illustrate the utility of the developed techniques by examining distributed deadlock detection and distributed debugging as two instances of GPE. (DoD) under NASA Ames grant number NAG 2593, and by grants from IBM and Siemens. The views, opinions, and findings contained in this report are those of the authors and should not be construed as an official Department of Defense position, policy, or decision.distributed_systems/2017-09-06T01:59:03.4313300782017-09-06T01:59:03.431330078<EFBFBD>2<EFBFBD>Z
K<02>w5GGRecent SRI work in verification<07>end has already been implemented as part of an experimental Ada/Ada-M compiler [7] ; work on a syntax-directed editor is i n progress .) However, the methodology of verification-oriented programming is still a research topic. This section provides an update to our last year ' s VERkshop summary [21], summarizing recent work in verification at SRI. I t considers progress as well as current and future plans. As noted in last year's report, the Fortran verification system [1] handles a subset of both ANS I Fortran 66 and 77. The subset excludes the I/O statements, as well as EQUIVALENCE, DATA, and BLOCK DATA statements. Whil e some restrictions are placed on the remaining statements, the subset permits certain uses of COMMON, adjustable array dimensions , functions, and subroutines with side-effects. Unusual features of the system include a syntax checker that enforces all of th e syntactic restrictions, the thorough analysis of aliasing, and the generation of VCs to ensure against run time errors (e .g ., arithmeti c overflow). If a program is proved correct by the system, then any invocation of the program on an ANSI Fortran processor in a stat e satisfying the input assertion terminates without run time errors and produces a state satisfying the output assertion. The main thrust of this year's work with the Fortran system has been to apply it to several small but difficult programs. Some of tha t work is described below. A VCG reduces th e question of whether a program is consistent with its specifications to that of whether certain logical formulas are theorems in a n underlying theory. VCGs must embody the semantics of the programming language ; for the most part, they have been seen asSOENdistributed_systems/2017-09-06T01:59:01.1209489752017-09-06T01:59:01.120948975 h <0B>h<00><1F>]
a<02>I /GGAn Analysis of the Cryptocurrency Industry<07>INTRODUCTION The cryptocurrency market has evolved erratically and at unprecedented speed over the course of its short lifespan. Since the release of the pioneer anarchic cryptocurrency, Bitcoin, to the public in January 2009, more than 550 cryptocurrencies have been developed, the majority with only a modicum of success [1]. Research on the industry is still scarce. The majority of it is singularly focused on Bitcoin rather than a more diverse spread of cryptocurrencies and is steadily being outpaced by fluid industry developments, including new coins, technological progression, and increasing government regulation of the markets. Though the fluidity of the industry does, admittedly, present a challenge to research, a thorough evaluation of the cryptocurrency industry writ large is necessary. This paper seeks to provide a concise yet comprehensive analysis of the cryptocurrency industry with particular analysis of Bitcoin, the first decentralized cryptocurrency. Particular attention will be given to examining theoretical economic differences between existing coins. Section 1 of this paper provides an overview of the industry. Section 1.1 provides a brief history of digital currencies, which segues into a discussion of Bitcoin in section 1.2. Section 2 of this paper provides an in-depth analysis of coin economics, partitioning the major currencies by their network security protocol mechanisms, and discussing the long-term theoretical implications that these classes entail. Section 2.1 will discuss network security protocol. The mechanisms will be discussed in the order that follows. Section 2.2 will discuss the proof-of-work (PoW) mechanism used in the Bitcoin protocol and various altcoins. Section 2.3 will discuss the proof-of-stake (PoS) protocol scheme first introduced by Peercoin in 2011, which relies on a less energy intensive security mechanism than PoW. Section 2.4 will discuss a hybrid PoW/PoS mechanism. Section 2.5 will discuss the Byzantine Consensus mechanism. Section 2.6 presents the results of a systematic review of 21 cryptocurrencies. Section 3 provides an overview of factors affecting industry growth, focusing heavily on the regulatory environment in section 3.1. Section 3.2 discusses public perception and acceptance of cryptocurrency as a payment system in the current retail environment. Section 4 concludes the analysis. A note on sources: Because the cryptocurrency industry is still young and factors that impact it are changing on a daily basis, few comprehensive or fully updated academic sources exist on the topic. While academic work was of course consulted for this project, the majority of the information that informs this paper was derived from …digital_currency/2017-09-06T01:59:05.0530180662017-09-06T01:59:05.053018066<EFBFBD>q<EFBFBD>\
E<02>i'5GGOn the Calculus of Relations<07>Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. Association for Symbolic Logic is collaborating with JSTOR to digitize, preserve and extend access to The Journal of Symbolic Logic.J. Symb. Log.distributed_systems/2017-09-06T01:59:04.3430009772017-09-06T01:59:04.343000977 )vn)<00>A<EFBFBD>` <00> <02>] 5GGHow the Hidden Hand Shapes the Market for Software Reliability<07>— Since the 18th century, economists have recognized that absent government intervention, market forces determine the pricing and ultimate fate of technologies. Our contention is that the " hidden hand " explains a series of market failures impacting products in the field of software reliability. If reliability solutions are to reach mainstream developers, greater attention must be paid to market economics and drivers.distributed_systems/2017-09-06T01:59:07.7520239262017-09-06T01:59:07.752023926<EFBFBD><04>_ <00>/<02>wS5GGOblivious Routing of Highly Variable Traffic in Service Overlays and IP Backbones<07>The emergence of new applications on the Internet like voice-over-IP, peer-to-peer, and video-on-demand has created highly dynamic and changing traffic patterns. In order to route such traffic with quality-of-service (QoS) guarantees without requiring detection of traffic changes in real-time or reconfiguring the network in response to it, a routing and bandwidth allocation scheme has been recently proposed that allows preconfiguration of the network such that all traffic patterns permissible within the network's natural ingress-egress capacity constraints can be handled in a capacity efficient manner. The scheme routes traffic in two phases. In the first phase, incoming traffic is sent from the source to a set of intermediate nodes and then, in the second phase, from the intermediate nodes to the final destination. The traffic in the first phase is distributed to the intermediate nodes in predetermined proportions that depend on the intermediate nodes. In this paper, we develop linear programming formulations and a fast combinatorial algorithm for routing under the scheme so as to maximize throughput (or, minimize maximum link utilization). We compare the throughput performance of the scheme with that of the optimal scheme among the class of all schemes that are allowed to even make the routing dependent on the traffic matrix. For our evaluations, we use actual Internet Service Provider topologies collected for the Rocketfuel project. We also bri
<EFBFBD><05><00>z<EFBFBD>d
M<02>?/aGGA survey on reactive programming<07>Reactive programming has recently gained popularity as a paradigm that is well-suited for developing event-driven and interactive applications. It facilitates the development of such applications by providing abstractions to express time-varying values and automatically managing dependencies between such values. A number of approaches have been recently proposed embedded in various languages such as Haskell, Scheme, JavaScript, Java, .NET, etc. This survey describes and provides a taxonomy of existing reactive programming approaches along six axes: representation of time-varying values, evaluation model, lifting operations, multidirectionality, glitch avoidance, and support for distribution. From this taxonomy, we observe that there are still open challenges in the field of reactive programming. For instance, multidirectionality is supported only by a small number of languages, which do not automatically track dependencies between time-varying values. Similarly, glitch avoidance, which is subtle in reactive programs, cannot be ensured in distributed reactive programs using the current techniques.ACM Comput. Surv.paradigms/functional_reactive_programming/2017-09-06T01:59:11.3976660162017-09-06T01:59:11.397666016<EFBFBD>#<23>c
G<02>1aGGFunctional Reactive Animation<07><i>Fran</i> (Functional Reactive Animation) is a collection of data types and functions for composing richly interactive, multimedia animations. The key ideas in Fran are its notions of <i>behaviors</i> and <i>events</i>. Behaviors are time-varying, reactive values, while events are sets of arbitrarily complex conditions, carrying possibly rich information. Most traditional values can be treated as behaviors, and when images are thus treated, they become animations. Although these notions are captured as data types rather than a programming language, we provide them with a denotational semantics, including a proper treatment of real time, to guide reasoning and implementation. A method to effectively and efficiently perform <i>event detection</i> using <i>interval analysis</i> is also described, which relies on the partial information structure on the domain of event times. Fran has been implemented in Hugs, yielding surprisingly good performance for an interpreter-based system. Several examples are given, including the ability to describe physical phenomena involving gravity, springs, velocity, acceleration, etc. using ordinary differential equations.ICFPparadigms/functional_reactive_programming/2017-09-06T01:59:10.6360471192017-09-06T01:59:10.636047119 <08><08><00>\<5C>e
c<02>IGGMeta algorithms for hierarchical Web caches<07>— Large scale hierarchical caches for web content have been deployed widely in an attempt to reduce delivery delays and bandwidth consumption and also to improve the scalability of content dissemination through the world wide web. Irrespectively of the specific replacement algorithm employed in each cache, a de facto characteristic of contemporary hierarchical caches is that a hit for a document at an ¢-level cache leads to the caching of the document in all intermediate caches (levels ¢ ¤ £ ¦ ¥ ¨ § © © © § ¥) on the path towards the leaf cache that received the initial request. This paper presents various algorithms that revise this standard behavior and attempt to be more selective in choosing the caches that get to store a local copy of the requested document. As these algorithms operate independently of the actual replacement algorithm running in each individual cache, they are referred to as meta algorithms. Three new meta algorithms are proposed and compared against the de facto one and a recently proposed one1] by means of synthetic and trace-driven simulations. The best of the new meta algorithms appears to be able to lead to improved performance under most simulated scenarios, especially under a low availability of storage. The latter observation makes the presented meta algorithms particularly favorable for the handling of large data objects such as stored music files or short video clips. Additionally, a simple load balancing algorithm that is based on the concept of meta algorithms is proposed and evaluated. The algorithm is shown to be able to provide for an effective balancing of load thus possibly addressing the recently discovered " filtering-effect " in hierarchical web caches (C. Williamson [2]).IPCCCcaching/2017-09-06T01:59:12.1781440432017-09-06T01:59:12.178144043 11<00>c<EFBFBD>g
Q<02>-!OGGWhy Functional Programming Matters<07>As software becomes more and more complex, it is more and more important to structure it well. Well-structured software is easy to write, easy to debug, and provides a collection of modules that can be re-used to reduce future programming costs. Conventional languages place conceptual limits on the way problems can be modularised. Functional languages push those limits back. In this paper we show that two features of functional languages in particular, higher-order functions and lazy evaluation, can contribute greatly to modularity. As examples, we manipulate lists and trees, program several numerical algorithms, and implement the alpha-beta heuristic an algorithm from Artiicial Intelligence used in game-playing programs. Since modularity is the key to successful programming, functional languages are vitally important to the real world.Comput. J.paradigms/functional_programming/2017-09-06T01:59:14.1577939452017-09-06T01:59:14.157793945<EFBFBD>d<EFBFBD>f
[<02>!?5GGTor: The Second-Generation Onion Router<07>We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design. Tor adds perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable trade-off between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than a dozen hosts. We close with a list of open problems in anonymous communication. Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell, and instant messaging. Clients choose a path through the network and build a circuit, in which each node (or " onion router " or " OR ") in the path knows its predecessor and successor, but no other nodes in the circuit. Traffic flows down the circuit in fixed-size cells, which are unwrapped by a symmetric key at each node (like the layers of an onion) and relayed downstream. The Onion Routing project published several design and analysis papers [27, 41, 48, 49]. While a wide area Onion Routing network was deployed briefly, the only long-running public implementation was a fragile proof-of-concept that ran on a single machine. Even this simple deployment processed connections from over sixty thousand distinct IP addresses from all over the world at a rate of about fifty thousand per day. But many critical design and deployment issues were never resolved, and the design has not been updated in several years. Here we describe Tor, a protocol for asynchronous, loosely federated onion routers that provides the following improvements over the old Onion Routing design: Perfect forward secrecy: Onion Routing was originally vulnerable to a single hostile node recording traffic and later compromising successive nodes in the circuit and forcing them to decrypt it. Rather than using a single multiply en-crypted data structure (an onion) to lay each circuit, Tor now uses an incremental or telescoping path-building design , where the initiator negotiates session keys with each successive hop in the circuit. Once these keys are deleted, subsequently compromised nodes cannot decrypt old traffic. As a side benefit, onion replay detection is no longer necessary, and the process of building circuits is more reliable , since the initiator knows when a hop fails …USENIX Security Symposiumdistributed_systems/2017-09-06T01:59:13.1564040532017-09-06T01:59:13.156404053
!<07><0F>= <0E>w-J <0A> <0A> x V . <0C> <0C> F <0B> <0B> S 
<EFBFBD>
<EFBFBD>
d<07><07>
6 <09> <09> Q <08><08>oL<04>Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center|V<04>-Megastore: Providing Scalable, Highly Available Storage for Interactive ServiceslA<04>Life beyond Distributed Transactions: an Apostate's OpinionkC<04>Molecular computation of solutions to combinatorial problems.<00>)UModularity and Scalability in Calvin<00>B<04>MillWheel: Fault-Tolerant Stream Processing at Internet ScaleA0eMicroreboot - A Technique for Cheap RecoveryhE<04> Metaobject protocols: Why we want them and what else they can do0cMeta algorithms for hierarchical Web cachesem<04>]Message analysis-guided allocation and low-pause incremental garbage collection in a concurrent languageO-_Message Analysis for Concurrent Languages7qMediapolis Mediapolis popular Culture and the City^0eMathematical Aspects of Consciousness TheorynH<04>Mastering the game of Go with deep neural networks and tree search<00><{MapReduce: Simplified Data Processing on Large Clusters<N<04>Map-reduce-merge: simplified relational data processing on large clustersV<04>-Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System<00>L<04>Making reliable distributed systems in the presence of software errors<00>Y<04>5Making lockless synchronization fast: performance implications of memory reclamation)C<04>Making Programs Forget: Enforcing Lifetime for Sensitive Data<00>I<04>MEXICA: A computer model of a cognitive account of creative writing<00>'SMDCC: Multi-Data Center ConsistencyU!GLooking Inside the (Drop) Box 'QLive Migration of Virtual Machines9E<04> Linearizability: A Correctness Condition for Concurrent Objects<00>*WLinear work suffix array construction<00>8uLightweight Locking for Main Memory Database Systems',]Light Propagation Volumes in Cryengine 3C7qLarge-scale cluster management at Google with BorgY<04>3Large-scale Incremental Processing Using Distributed Transactions and Notifications33iLarge-Scale Newscast Computing on the Internet<00>Z<04>7KinectFusion: real-time 3D reconstruction and interaction using a moving depth cameraIg<04>OKelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead8 DD
U<02> 5GGOn Proof and Progress in Mathematics<07>This essay on the nature of proof and progress in mathematics was stimulated by the article of Jaffe and Quinn, "Theoretical Mathematics: Toward a cultural synthesis of mathematics and theoretical physics". Their article raises interesting issues that mathematicians should pay more attention to, but it also perpetuates some widely held beliefs and attitudes that need to be questioned and examined. The article had one paragraph portraying some of my work in a way that diverges from my experience, and it also diverges from the observations of people in the field whom I've discussed it with as a reality check. After some reflection, it seemed to me that what Jaffe and Quinn wrote was an example of the phenomenon that people see what they are tuned to see. Their portrayal of my work resulted from projecting the sociology of mathematics onto a one-dimensional scale (speculation versus rigor) that ignores many basic phenomena. Responses to the Jaffe-Quinn article have been invited from a number of mathematicians, and I expect it to receive plenty of specific analysis and criticism from others. Therefore, I will concentrate in this essay on the positive rather than on the contranegative. I will describe my view of the process of mathematics, referring only occasionally to Jaffe and Quinn by way of comparison. In attempting to peel back layers of assumptions, it is important to try to begin with the right questions: 1. What is it that mathematicians accomplish? There are many issues buried in this question, which I have tried to phrase in a way that does not presuppose the nature of the answer. It would not be good to start, for example, with the question How do mathematicians prove theorems? This question introduces an interesting topic, but to start with it would be to project two hidden assumptions: (1) that there is uniform, objective and firmly established theory and practice of mathematical proof, and (2) that progress made by mathematicians consists of proving theorems. It is worthwhile to examine these hypotheses, rather than to accept them as obvious and proceed from there.distributed_systems/2017-09-06T01:59:25.0680280762017-09-06T01:59:25.068028076<EFBFBD>p<EFBFBD>m <00>/<02>1GGAn implementation and semantics for transactional memory introspection in Haskell<07>Transactional Memory Introspection (TMI) is a novel reference monitor architecture that provides complete mediation, freedom from <i>time of check to time of use</i> bugs and improved failure handling for authorization. TMI builds on and integrates with implementations of the Software Transactional Memory (STM) architecture [Harris and Fraser 2003]. In this paper we present a formal definition of TMI and a concrete implementation over the Haskell STM. We find that this specification and reference implementation establishes clear semantics for the TMI architecture. In particular, they help identify and resolve ambiguities that apply to implementations such in our prior work [Birgisson et al. 2008].PLASlanguages/haskell/2017-09-06T01:59:21.8790690922017-09-06T01:59:21.879069092<EFBFBD>x<EFBFBD>l <00>-<02>1#GGMegastore: Providing Scalable, Highly Available Storage for Interactive Services<07>Megastore is a storage system developed to meet the requirements of today's interactive online services. Megas-tore blends the scalability of a NoSQL datastore with the convenience of a traditional RDBMS in a novel way, and provides both strong consistency guarantees and high availability. We provide fully serializable ACID semantics within fine-grained partitions of data. This partitioning allows us to synchronously replicate each write across a wide area network with reasonable latency and support seamless failover between datacenters. This paper describes Megastore's semantics and replication algorithm. It also describes our experience supporting a wide range of Google production services built with Megastore.CIDRdatastores/2017-09-06T01:59:19.2760681152017-09-06T01:59:19.276068115  <0F> C <09>
7<02>c GGBuridans Principle<07>The problem of Buridan's Ass, named after the fourteenth century French philosopher Jean Buridan, states that an ass placed equidistant between two bales of hay must starve to death because it has no reason to choose one bale over the other. With the benefit of modern mathematics, the argument can be expressed as follows. Assume that, at time 0, the ass is placed at position x along the line joining the bales of hay, where one bale is at position 0 and the other at position 1, so 0 < x < 1. The position of the ass at time t > 0 is a function of two arguments: the time t and the starting position x. Let A t (x) denote that position. For simplicity, assume that when the ass reaches a bale of hay it stays there forever, so for all t ≥ 0: A t (0) = 0, A t (1) = 1, and 0 ≤ A t (x) ≤ 1 for any x with 0 < x < 1. The ass is a physical mechanism subject to the laws of physics. Any such mechanism is continuous, so A t (x) is a continuous function of x. Since A t (0) = 0 and A t (1) = 1, by continuity there must be a finite range of values of x for which 0 < A t (x) < 1. These values represent initial positions of the ass for which it does not reach either bale of hay within t seconds. Such a range of values of x exists for any time t, including times large enough to insure that the ass has starved to death by then. Thus, there exists a finite range of starting positions for which the ass starves to death. The key assumption in this argument is continuity: the ass's position at a later time is a continuous function of its initial position. Continuity has been a guiding principle in the development of modern physics. Phenomena that appear discontinuous, such as discrete atomic spectral lines, are explained in terms of continuous physical laws, such as Schroedinger's equation. The assumption of continuity is discussed at length in Section 6. For now, let us accept it and investigate its consequences. The general principle underlying the starvation of Buridan's ass can be stated as follows: Buridan's Principle. A discrete decision based upon an input having a …physics/2017-09-06T01:59:33.2084079592017-09-06T01:59:33.208407959<EFBFBD> <20>q
e <0A>) QGGSymbolic Representation and Natural LanguageThe n o t ion of s y m bolizability is taken as the second requisite of comp u t a tion (the first being 'a l g o r i t h m i z a b i l i t y '), and it is shown that symbols, qua symbols, are not symbolizable. This has farreaching consequences for the computational study of language and for Al-research in language understanding. The representation hypothesis is formulated, and its various assumptions and goals are examined. A research strategy for the computational study of natural language u n d erstanding is outlined.comp_sci_fundamentals_and_history/2017-09-06T01:59:31.4698640142017-09-06T01:59:31.469864014<EFBFBD>K<EFBFBD>p <00><02>w!#GGBuilding global and scalable systems with atomic multicast<07>The rise of worldwide Internet-scale services demands large distributed systems. Indeed, when handling several millions of users, it is common to operate thousands of servers spread across the globe. Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency. In this work, we claim that atomic multicast, with strong and well-defined properties, is the appropriate abstraction to efficiently design and implement globally scalable distributed systems. We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent key-value store and a distributed log.Middlewaredatastores/2017-09-06T01:59:30.6267080082017-09-06T01:59:30.626708008k<EFBFBD>o ? 'GGQualitative data analysis<07>data_science/2017-09-06T01:59:27.9707819822017-09-06T01:59:27.970781982  <0B><00>z<EFBFBD>t <00> <02> Q5GGCopysets: Reducing the Frequency of Data Loss in Cloud Storage<07>Random replication is widely used in data center storage systems to prevent data loss. However, random replica-tion is almost guaranteed to lose data in the common scenario of simultaneous node failures due to cluster-wide power outages. Due to the high fixed cost of each incident of data loss, many data center operators prefer to minimize the frequency of such events at the expense of losing more data in each event. We present Copyset Replication, a novel general-purpose replication technique that significantly reduces the frequency of data loss events. We implemented and evaluated Copyset Replication on two open source data center storage systems, HDFS and RAMCloud, and show it incurs a low overhead on all operations. Such systems require that each node's data be scattered across several nodes for parallel data recove
;<02>#GGFlat Datacenter Storage<07>Flat Datacenter Storage (FDS) is a high-performance, fault-tolerant, large-scale, locality-oblivious blob store. Using a novel combination of full bisection bandwidth networks, data and metadata striping, and flow control, FDS multiplexes an application's large-scale I/O across the available throughput and latency budget of every disk in a cluster. FDS therefore makes many optimizations around data locality unnecessary. Disks also communicate with each other at their full bandwidth, making recovery from disk failures extremely fast. FDS is designed for datacenter scale, fully distributing metadata operations that might otherwise become a bottleneck. FDS applications achieve single-process read and write performance of more than 2 GB/s. We measure recovery of 92 GB data lost to disk failure in 6.2 s and recovery from a total machine failure with 655 GB of data in 33.7 s. Application performance is also high: we describe our FDS-based sort application which set the 2012 world record for disk-to-disk sorting.OSDIdatastores/2017-09-06T01:59:34.1526699222017-09-06T01:59:34.152669922
}I<0F><0F><0F><0F><0F><0F><0F><0F><0F><08><0F><0F>iS6+<08>` <0E><0E><0E><0E><0E><0E><0E><0E><0E>j`M;)<08>  <0A> <0A> <0A> <0A> <0A> <0A> <0A> } e S I ? 6 {
<0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> n b U D 9 / # <08> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> ~ i T = 2 <08> 
<EFBFBD><08>
<EFBFBD>I
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
i
_
U
J
=
0

 <09> <09> <09> <09> <09> <09> <09> <09><08> p [ I 2  <08>/multiple matching<04>7malicious participantu+message loggingg magnet_7mobile ad-hoc networkXlsm-treesS mcmcFmpiB multiple@%node failure3/number of records<00>
nosql<02>/non-negative data<02>/non-game contexts%non-dominantQ+non-determinism3%non-blocking<01> nnza<03>nfr<02>!networkingM9network virtualizationO9network characteristicU5network architectureKner<02>%near-optimal<03>nde%/natural extensionC natural& napster<03>
nadphg nadpj nadhh7n.a. n.a. pc analysis<02>mvs mutator2?multithreaded applicationN multiset#3multiple partitions<02>-multiple devices<01>3multidirectionality<03>multicast<00>+mozilla firefox<01>
movien/motion trajectoryE+motion planningl+motion dynamics<00>
motif mosaic<01>%morris-prattmop, monsoonJ monitor
monadq!modularitymodF%mobile robot<00>=mobile phone application<01>mmu4 mixnet<01> mixin~
mixes<01>#mix network<01> mission<00> mirage7+minwise hashing minhashmillwheel<00>#millisecond<01>#microreboot9 mhealth mexica<02> metadatan/messaging systems messaging+message passing01message complexity<01>meso mergeI ment<01>%memory model3memory architecture1'memory access5#memoization2 memo!membership<00>megastore<00>7medication compliance0mediation# mechanic6mdl<03> mdcc<00>mcs mbeddr<00>%maximization<00>%matrix group''mathematician& mate<02>1matching algorithm<01> master<00> masking6marketing<02>3market applications<02>mar" mapreduceE
mapre<03>!map-reduceH malwareu malloc<01> malism.'major featureK
macroa;machine learning method<01>-machine language5machine intelligence<00> lstm<01>lso<00>lsh lru lrfu<00>#low-latency #low latency<02> loto,los<00> lookup<03> logical<02> <00> <09><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F><0F>|qf[PE:/$<0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E><0E>xmbWLB7,!  <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> ~ s h ] R G < 1 &    <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> <0C> v k ` U J @ 5 + 
<0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> <0B> | q f [ P E : / $   
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
u
j
_
T
I
>
3
(


 <09> <09> <09> <09> <09><08>6<04><01><08>5<04><01><08>4
<01><08>3<02><01><08>2<04><01><08>1<04><01><08>0<04><01><08>/<04><01><08>.<02><01><08>-<04><01><08>,6<01><08>+<04><01><08>*<04><01><08>)8<01><08>(<04><01><08>'<02><01><08>&<01><08>%<04><01><07>$<01><08>#<01><08>"~<01><08>!}<01><08> <01><01><08>|<01><08>{<01><08>z<01><08>y<01><08>x<01><08><00><01><08>w<01><08>v<01><08>u<01><08><01><01><08>t<01><08>s<01><08>c<01><08>r<01><08>u<01><08>q<01><07>/<01><08>p<01><08> o<01><08> 2<01><08> <00><01><08>
n<01><08> m<01><08>l<01><08>k<01><08>j<01><08>i<01><08>h<01><08>g<01><08>f<01><08>e<01><08><03><01><07>(<01><08>~<02><01><07>}&<01><08>|d<01><08>{c<01><08>zb<01><08>ya<01><08>x`<01><08>w6<01><08>v:<01><08>u_<01><08>t^<01><08>s]<01><08>r\<01><08>q[<01><08>ps<01><08>oZ<01><08>nY<01><08>mX<01><08>lW<01><08>kV<01><08>j<01><01><08>i<01><08>hU<01><08>g<01><08>fP<01><08>e<01><01><08>dT<01><08>cS<01><08>bR<01><08>aQ<01><08>`P<01><08>_O<01><08>^N<01><08>]M<01><08>\L<01><08>[K<01><08>ZJ<01><08>Y <01><08>X<01><07>We<08>VI<07>U'<08>TH<08>SG}<08>RF}<08>QE}<08>PD}<08>OC}<07>N
|<08>MB|<08>LA|<08>K@|<08>J?|<07>I|<07>HE|<08>G>{<08>F={<08>E<02>{<08>D<{<07>Cn{<08>B<01>y<08>Azy<08>@<01>y<08>?;y<08>>:y<08>=Bx<07><(x<08>;tx<08>:9x<08>98x<08>87v<08>76v<08>65v<08>54v<08>4<01>u<08>33u<08>2<01>u<08>12u<08>01u<08>/t<08>.1t<08>-0t<08>,,t<08>+/s<08>*<01>s<08>)<03>s<08>(8s<08>'.s<08>&-s ff<00><16>u <00>-<02>Q5GGTiered Replication: A Cost-effective Alternative to Full Cluster Geo-replication<07>Cloud storage systems typically use three-way random replication to guard against data loss within the cluster, and utilize cluster geo-replication to protect against correlated failures. This paper presents a much lower cost alternative to full cluster geo-replication. We demonstrate that in practical settings, using two replicas is sufficient for protecting against independent node failures, while using three random replicas is inadequate for protecting against correlated node failures. We present Tiered Replication, a replication scheme that splits the cluster into a primary and backup tier. The first two replicas are stored on the primary tier and are used to recover data in the case of independent node failures , while the third replica is stored on the backup tier and is used to protect against correlated failures. The key insight of our paper is that, since the third replicas are rarely read, we can place the backup tier on separate physical infrastructure or a remote location without affecting performance. This separation significantly increases the resilience of the storage system to correlated failures and presents a low cost alternative to geo-replication of an entire cluster. In addition, the Tiered Replication algorithm optimally minimizes the probability of data loss under correlated failures. Tiered Repli-cation can be executed incrementally for each cluster change, which allows it to supports dynamic environments in which nodes join and leave the cluster, and it facilitates additional data placement constraints required by the storage designer, such as network and rack awareness. We have implemented Tiered Replication on H
Q<02>W 5GGDesign Principles Behind Smalltalk<07>The purpose of the Smalltalk project is to provide computer support for the creative spirit in everyone. Our work flows from a vision that includes a creative individual and the best computing hardware available. We have chosen to concentrate on two principle areas of research: a language of description (programming language) that serves as an interface between the models in the human mind and those in computing hardware, and a language of interaction (user interface) that matches the human communication system to that of the computer. Our work has followed a two-to four-year cycle that can be seen to parallel the scientific method: Build an application program within the current system (make an observation) Based on that experience, redesign the language (formulate a theory) Build a new system based on the new design (make a prediction that can be tested) The Smalltalk-80 system marks our fifth time through this cycle. In this article, I present some of the general principles we have observed in the course of our work. While the presentation frequently touches on Smalltalk "motherhood", the principles themselves are more general and should prove useful in evaluating other systems and in guiding future work. Just to get warmed up, I'll start with a principle that is more social than technical and that is largely responsible for the particular bias of the Smalltalk project: Personal Mastery: If a system is to serve the creative spirit, it must be entirely comprehensible to a single individual. The point here is that the human potential manifests itself in individuals. To realize this potential, we must provide a medium that can be mastered by a single individual. Any barrier that exists between the user and some part of the system will eventually be a barrier to creative expression. Any part of the system that cannot be changed or that is not sufficiently general is a likely source of impediment. If one part of the system works differently from all the rest, that part will require additional effort to control. Such an added burden may detract from the final result and will inhibit future endeavors in that area. We can thus infer a general principle of design: Good Design: A system should be built with a minimum set of unchangeable parts; those parts should be as general as possible; and all parts of the system should be held in a uniform framework. Language In …languages/smalltalk/2017-09-06T01:59:37.5277041022017-09-06T01:59:37.527704102 <00>
E<00><00>=<3D>y
}<02>_5EEA Hundred Impossibility Proofs for Distributed Computing<07>1 Introduction This talk is about impossibility results in the area of distributed computing. In this category, I include not just results that, say that a particular task cannot be accomplished, but also lower bound results, which say that a task cannot be accomplished within a certain bound on cost. I started out with a simple plan for preparing this talk: I would spend a couple of weeks reading all the impossibility proofs in our field, and would categs rize them according to the ideas used. Then I would make wise and general observations, and try to predict where the future of this area is headed. That turned out to be a bit too ambitious; there are many more such results than I thought. Although it is often hard to say what constitutes a " different result " , I managed to count over 100 such impossibility proofs! And my search wasn't even very systematic or exhaustive. It's not quite as hopeless to understand this area as it might seem from the number of papers. Although there are 100 different results, there aren't 100 different ideas. I thought I could contribute something by identifying some of the commonality among the different results. So what I will do in this talk will be an incomplete version of what I originally intended. I will give you Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. a tour of the impossibility results that I was able to collect. I apologize for not being comprehensive, and in particular for placing perhaps undue emphasis on results I have been involved in (but those are the ones I know best!). I will describe the techniques used, as well as giving some historical perspective. I'll intersperse this with my opinions and observations, and I'll try to collect what I consider to be the most important of these at the end. Then I'll make some suggestions for future work. 2 The Results I classified the impossibility results I found into the following categories: shared memory resource allocation , distributed consensus, …PODCdistributed_systems/2017-09-06T01:59:41.190382082017-09-06T01:59:41.19038208<EFBFBD>7<EFBFBD>x <00><02> Q5GGZooKeeper: Wait-free Coordination for Internet-scale Systems<07>In this paper, we describe ZooKeeper, a service for coordinating processes of distributed applications. Since ZooKeeper is part of critical infrastructure, ZooKeeper aims to provide a simple and high performance kernel for building more complex coordination primitives at the client. It incorporates elements from group messaging, shared registers, and distributed lock services in a repli-cated, centralized service. The interface exposed by Zoo-Keeper has the wait-free aspects of shared registers with an event-driven mechanism similar to cache invalidations of distributed file systems to provide a simple, yet powerful coordination service. The ZooKeeper interface enables a high-performance service implementation. In addition to the wait-free property, ZooKeeper provides a per client guarantee of FIFO execution of requests and linearizability for all requests that change the ZooKeeper state. These design decisions enable the implementation of a high performance processing pipeline with read requests being satisfied by local servers. We show for the target workloads, 2:1 to 100:1 read to write ratio, that ZooKeeper can handle tens to hundreds of thousands of transactions per second. This performance allows ZooKeeper to be used extensively by client applications.USENIX Annual Technical Conferencedistributed_systems/2017-09-06T01:59:39.0960520022017-09-06T01:59:39.096052002 )
<EFBFBD><06>)<00><13>| <00><02>i5GGMesos: A Platform for Fine-Grained Resource Sharing in the Data Center<07>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Abstract We present Mesos, a platform for sharing commodity clusters between multiple diverse cluster computing frameworks, such as Hadoop and MPI 1. Sharing improves cluster utilization and avoids per-framework data replication. Mesos shares resources in a fine-grained manner, allowing frameworks to achieve data locality by taking turns reading data stored on each machine. To support the sophisticated schedulers of today's frameworks , Mesos introduces a distributed two-level scheduling mechanism called resource offers. Mesos decides how many resources to offer each framework, while frameworks decide which resources to accept and which computations to run on them. Our experimental results show that Mesos can achieve near-optimal locality when sharing the cluster among diverse frameworks, can scale up to 50,000 nodes, and is resilient to node failures.NSDIdistributed_systems/2017-09-06T01:59:45.5848349612017-09-06T01:59:45.584834961<EFBFBD>n<EFBFBD>{ <00>+<02>#GGRADOS: a scalable, reliable storage service for petabyte-scale storage clusters<07>Brick and object-based storage architectures have emerged as a means of improving the scalability of storage clusters. However, existing systems continue to treat storage nodes as passive devices, despite their ability to exhibit significant intelligence and autonomy. We present the design and implementation of RADOS, a reliable object storage service that can scales to many thousands of devices by leveraging the intelligence present in individual storage nodes. RADOS preserves consistent data access and strong safety semantics while allowing nodes to act semi-autonomously to self-manage replication, failure detection, and failure recovery through the use of a small cluster map. Our implementation offers excellent performance, reliability, and scalability while providing clients with the illusion of a single logical object store.PDSWdatastores/2017-09-06T01:59:44.8071699222017-09-06T01:59:44.807169922<EFBFBD>J<EFBFBD>z <00>I<02>/ 5GGPastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems<07>This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing scheme for wide-area peer-to-peer applications. Pastry performs application-level routing and object location in a potentially very large overlay network of nodes connected via the Internet. It can be used to support a wide range of peer-to-peer applications like global data storage, global data sharing, and naming. An insert operation in Pastry stores an object at a user-defined number of diverse nodes within the Pastry network. A lookup operation reliably retrieves a copy of the requested object if one exists. Moreover, a lookup is usually routed to the node nearest the client issuing the lookup (by some measure of proximity), among the nodes storing the requested object. Pastry is completely decentralized, scalable, and self-configuring; it automatically adapts to the arrival, departure and failure of nodes. Experimental results obtained with a prototype implementation on a simulated network of up to 100,000 nodes confirm Pastry's scalability, its ability to self-configure and adapt to node failures, and its good network locality properties.distributed_systems/2017-09-06T01:59:43.9261989752017-09-06T01:59:43.926198975 c <0B>
<01><08>4 <01><08>3<01><08>2<01><08>1<01><08>0<01><08>/<01><08>.<01><08>-<01><08>,<01><08>+<01><08>*<01><08>) <01><08>( <01><08>'<05><01><08>&<05><01><08>%<05><01><08>$<05><01><08>#<05><01><08>"<05><01><08>!<05><01><08> <05><01><08><05><01><08><05><01><08><05><01><08><05><01><08><05><01><08><05><01><08>G<01><08><05><01><08><05><01><08><05><01><08><05><01><08><05><01><06> <01><08><05><01><08><05><01><08><05><01><08><05><01><08><05><01><08> <05><01><08> <05><01><08> <05><01><06>
 <01><08> <05><01><08><05><01><08><05><01><08><05><01><08><05><01><08><05><01><08><01><08><05><01><08><00><01><08><05><01><08><05><01><08>~<05><01><08>}<05><01><08>|<05><01><08>{<05><01><08>z<05><01><08>y<05><01><08>x<05><01><08>w<05><01><08>v<05><01><08>u<05><01><08>tV<01><08>s<05><01><08>r<05><01><08>q<05><01><08>p<05><01><08>o<01><08>n<05><01><08>m<05><01><08>l<05><01><08>k<05><01><08>j<05><01><08>i <01><08>h<05><08>g<05>~<08>f<05>}<08>e<05>}<08>d<05>}<08>c<01>|<08>b<00>|<08>a<01>|<08>`<01>|<08>_<05>|<08>^<01>|<07>]|<08>\<05>|<07>[k{<07>Zi{<08>Y<05>{ <08>
<EFBFBD><08><00><02>~
e<02> GGQuantum vacuum pressure on a conducting slab<07>The casimir pressure on a non ideal conducting slab is calculated. Using a simple model for the conductivity according to which the slab is perfectly conducting at frequencies below plasma frequency ω p and perfectly transparent above such frequency, it is found that the vacuum pressure on each surface of the slab is ¯ hω 4 p 24π 2 c 3 which is finite without removal of any divergence.physics/2017-09-06T01:59:47.5016088872017-09-06T01:59:47.501608887<EFBFBD>u<EFBFBD>}
W<02>9U-GGParticle gibbs with ancestor sampling<07>Particle Markov chain Monte Carlo (PMCMC) is a systematic way of combining the two main tools used for Monte Carlo statistical inference: sequential Monte Carlo (SMC) and Markov chain Monte Carlo (MCMC). We present a new PMCMC algorithm that we refer to as particle Gibbs with ancestor sampling (PGAS). PGAS provides the data analyst with an off-the-shelf class of Markov kernels that can be used to simulate, for instance, the typically high-dimensional and highly autocorrelated state trajectory in a state-space model. The ancestor sampling procedure enables fast mixing of the PGAS kernel even when using seemingly few particles in the underlying SMC sampler. This is important as it can significantly reduce the computational burden that is typically associated with using SMC. PGAS is conceptually similar to the existing PG with backward simulation (PGBS) procedure. Instead of using separate forward and backward sweeps as in PGBS, however, we achieve the same effect in a single forward sweep. This makes PGAS well suited for addressing inference problems not only in state-space models, but also in models with more complex dependencies, such as non-Markovian, Bayesian nonparametric, and general probabilistic graphical models.Journal of Machine Learning Researchdata_structures/2017-09-06T01:59:46.5514519042017-09-06T01:59:46.551451904 names start falling into place, you're on the right track.</li><li><b>Names matter.</b> Strive for intelligibility, consistency, and symmetry. Every API is a little language, and people must learn to read and write it. If you get an API right, code will read like prose.</li><li><b>When in doubt, leave it out.</b> If there is a fundamental theorem of API design, this is it. It applies equally to functionality, classes, methods, and parameters. Every facet of an API should be as small as possible, but no smaller. You can always add things later, but you can't take them away.</li><li><b>Minimizing <i>conceptual weight</i> is more important than class- or method-count.</b></li><li><b>Keep APIs free of implementations details.</b> They confuse users and inhibit the flexibility to evolve. It isn't always obvious what's an implementation detail: Be wary of overspecification.</li><li><b>Minimize mutability.</b> Immutable objects are simple, thread-safe, and freely sharable.</li><li><b>Documentation matters.</b> No matter how good an API, it won't get used without good documentation. Document every exported API element: every class, method, field, and parameter.</li><li><b>Consider the performance consequences of API design decisions,</b> but don't warp an API to achieve performance gains. Luckily, good APIs typically lend themselves to fast implementations.</li><li><b>APIs must coexist peacefully with the platform, so do what is customary.</b> It is almost always wrong to "transliterate" an API from one platform to another.</li><li><b>Minimize accessibility; when in doubt, make it private.</b> This simplifies APIs and reduces coupling.</li><li><b>Subclass only if you can say with a straight face that every instance of the subclass is an instance of the superclass.</b> Exposed classes should never subclass just to reuse implementation code.</li><li><b>Design and document for inheritance or else prohibit it.</b> This documentation takes the form of self-use patterns: how methods in a class use one another. Without it, safe subclassing is impossible.</li><li><b>Don't make the client do anything the library could do.</b> Violating this rule leads to boilerplate code in the client, which is annoying and error-prone.</li><li><b>Obey the principle of least astonishment.</b> Every method should do the least surprising thing it could, given its name. If a method doesn't do what users think it will, bugs will result.</li><li><b>Fail fast.</b> The sooner you report a bug, the less damage it will do. Compile-time is best. If you must fail at run-time, do it as soon as possible.</li><li><b>Provide programmatic access to all data available in string form.</b> Otherwis
c<02>{-#GGHow to design a good API and why it matters<07>In lieu of a traditional , I've tried to distill the essence of the talk into a collection of maxims:<ul><li><b>All programmers are API designers.</b> Good programs are modular, and intermodular boundaries define APIs. Good modules get reused.</li><li><b>APIs can be among your greatest assets or liabilities.</b> Good APIs create long-term customers; bad ones create long-term support nightmares.</li><li><b>Public APIs, like diamonds, are forever.</b> You have one chance to get it right so give it your best.</li><li><b>APIs should be easy to use and hard to misuse.</b> It should be easy to do simple things; possible to do complex things; and impossible, or at least difficult, to do wrong things.</li><li><b>APIs should be self-documenting:</b> It should rarely require documentation to read code written to a good API. In fact, it should rarely require documentation to write it.</li><li><b>When designing an API, first gather requirements - with a healthy degree of skepticism.</b> People often provide solutions; it's your job to ferret out the underlying problems and find the best solutions.</li><li><b>Structure requirements as use-cases:</b> they are the yardstick against which you'll measure your API.</li><li><b>Early drafts of APIs should be short,</b> typically one page with class and method signatures and one-line descriptions. This makes it easy to restructure the API when you don't get it right the first time.</li><li><b>Code the use-cases against your API before you implement it</b>, even before you specify it properly. This will save you from implementing, or even specifying, a fundamentally broken API.</li><li><b>Maintain the code for uses-cases as the API evolves.</b> Not only will this protect you from rude surprises, but the resulting code will become the examples for the API, the basis for tutorials and tests.</li><li><b>Example code should be exemplary.</b> If an API is used widely, its examples will be the archetypes for thousands of programs. Any mistakes will come back to haunt you a thousand fold.</li><li><b>You can't please everyone so aim to displease everyone equally.</b> Most APIs are overconstrained.</li><li><b>Expect API-design mistakes due to failures of imagination.</b> You can't reasonably hope to imagine everything that everyone will do with an API, or how it will interact with every other part of a system.</li><li><b>API design is not a solitary activity.</b> Show your design to as many people as you can, and take their feedback seriously. Possibilities that elude your imagination may be clear to others.</li><li><b>Avoid fixed limits on input sizes.</b> They limit usefulness and hasten obsolescence.</li><li><b>If it's hard to find good names, go back to the drawing board.</b> Don't be afraid to split or merge an API, or embed it in a more general setting. If<00> D<0F><0F><0F>]-<0E><0E><0E>]3 <0A> <0A> <0A> s Q '  <0C> <0C>  Q + <0B> <0B> <0B> } S 1 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
W
5
 <09> <09> <09> <09> { S & <08><08><08>vR.
<07><07><07><07>l=<06><06><06><06>j7!<21>) Matija PretnarMatijaPretnar0<72> 9Alejandro A. SchäfferAlejandroA.Schäffer <20> )Han La PoutréHanLaPoutré"<22> +Ramana M. IduryRamanaM.Idury<1D>
% Amihood AmirAmihoodAmir#<23> + Anthony LiguoriAnthonyLiguori<19>! Uri LublinUriLublin&<26>/Dor Laor QumranetDorLaorQumranet,<2C>5Yaniv Kamay QumranetYanivKamayQumranet<19>! Avi KivityAviKivity<15> S KabbajSKabbaj<19>! S BouchibaSBouchiba <20>)Paula B. CohenPaulaB.Cohen(<28>1Marvin D. TretkoffMarvinD.Tretkoff!<21>) Paula TretkoffPaulaTretkoff!<21>) Heather MillerHeatherMiller!<21>~) Philipp HallerPhilippHaller$<24>}-By C. E. ShannonByC. E.Shannon(<28>|1Dawn Xiaodong SongDawnXiaodongSong<13>{ Tao WeiTaoWei<1F>z' Mathias PayerMathiasPayer#<23>y+ Laszlo SzekeresLaszloSzekeres*<2A>x3Jeroen Van De GraafJeroenVan DeGraaf%<25>w- Christian FranckChristianFranck<15>v Alan KayAlanKay<1F>u' Scott WallaceScottWallace<1D>t% John MaloneyJohnMaloney<1B>s# Ted KaehlerTedKaehler<1B>r# Dan IngallsDanIngalls!<21>q) Frank PiessensFrankPiessens<1F>p' Adriaan MoorsAdriaanMoors)<29>o1% Hans-Juergen BoehmHans-JuergenBoehm+<2B>n3 Alexander ReinefeldAlexanderReinefeld<1F>m' Kathrin PeterKathrinPeter!<21>l) Brannon BatsonBrannonBatson<19>k! James LangJamesLang<1B>j# Tim RoselliTimRoselli<1F>i' Rachel JewkesRachelJewkes'<27>h/ Stephanie MiedemaStephanieMiedema<1B>g# Xian WarnerXianWarner<17>f Emma FuluEmmaFulu0<75>e9Ulises Cortés GarcíaUlisesCortésGarcía <20>d)K. Mani ChandyK.ManiChandy<1D>c% Diego OngaroDiegoOngaro#<23>b+ Albert EinsteinAlbertEinstein+<2B>a3 !Emmanuel Lopez-NeriEmmanuelLopez-Neri:<3A>`C-J. Octavio Gutierrez-GarciaJ.OctavioGutierrez-Garcia)<29>_1 %Deniz AltınbükenDenizAltınbüken<1B>^# Micah SherrMicahSherr<1E>]'Boon Thau LooBoonThauLoo'<27>\/ Andreas HaeberlenAndreasHaeberlen<1F>[' Arjun NarayanArjunNarayan<17>Z Qiong FeiQiongFei<1D>Y% Wenchao ZhouWenchaoZhou,<2C>X5Carlos Delgado KloosCarlosDelgadoKloos0<73>W9Pedro J. Muñoz MerinoPedroJ. MuñozMerino!<21>V) Dragan GasevicDraganGasevic'<27>U/ Vitomir KovanovicVitomirKovanovic'<27>T/ !Srecko JoksimovicSreckoJoksimovic:<3A>SC%José A. Ruipérez ValienteJoséA. RuipérezValiente!<21>R) Dennis RitchieDennisRitchie<1B>Q# Dogan EnginDoganEngin$<24>P-Russell C. SearsRussellC.Sears-<2D>O5 'Martin Farach-ColtonMartinFarach-Colton&<26>N/Michael A. BenderMichaelA.Bender#<23>M+ Richard SteigerRichardSteiger,<2C>L5Peter Boehler BishopPeterBoehlerBishop"<22>K+Joshua J. BlochJoshuaJ.Bloch <03>i<03><00><19>
?<02>W-GGThe LCA Problem Revisited<07>We present a very simple algorithm for the Least Common Ancestor problem. We thus dispel the frequently held notion that an optimal LCA computation is unwieldy and unimplementable. Interestingly, this algorithm is a sequentialization of a previously known PRAM algorithm of Berkman, Breslauer,LATINdata_structures/2017-09-06T01:59:52.1843969732017-09-06T01:59:52.184396973<EFBFBD><13> <00> <02>u5GGA Universal Modular ACTOR Formalism for Artificial Intelligence<07>This paper proposes a modular ACTOR architecture and definitional method for artificial intelligence that is conceptually based on a single kind of object: actors [or, if you will, virtual processors, activation frames, or streams]. The formalism makes no presuppositions about the representation of primitive data structures and control structures. Such structures can be programmed, micro-coded, or hard wired 1n a uniform modular fashion. In fact it is impossible to determine whether a given object is "really" represented as a list, a vector, a hash table, a function, or a process. The architecture will efficiently run the coming generation of PLANNER-like artificial intelligence languages including those requiring a high degree of parallelism. The efficiency is gained without loss of programming generality because it only makes certain actors more efficient; it does not change their behavioral characteristics. The architecture is general with respect to control structure and does not have or need goto, interrupt, or semaphore primitives. The formalism achieves the goals that the disallowed constructs are intended to achieve by other more structured methods. PLANNER Progress "Programs should not only work, but they should appear to work as well." PDP-1X Dogma The PLANNER project is continuing research in natural and effective means for embedding knowledge in procedures. In the course of this work we have succeeded in unifying the formalism around one fundamental concept: the ACTOR. Intuitively, an ACTOR is an active agent which plays a role on cue according to a script" we" use the ACTOR metaphor to emphasize the inseparability of control and data flow in our model. data bases can all be shown to be special cases of actors. All of the above are objects with certain useful modes of behavior. Our formalism shows how all of the modes of behavior can be defined in terms of one kind of behavior: sending messages to actors. An actor is always invoked uniformly in exactly the same way regardless of whether 1t behaves as a recursive function, data structure, or process. "It is vain to multiply Entities beyond need." William of Occam "Monotheism is the Answer." The unification and simplification of the formalisms for the procedural embedding of knowledge has a great many benefits for us: FOUNDATIONS: The concept puts procedural semantics [the theory of how things operate] on a firmer basis. It will now be possible to do cleaner theoretical studies of the relation between procedural semantics and set-theoretic …IJCAIdistributed_systems/2017-09-06T01:59:51.2006730962017-09-06T01:59:51.200673096 X
^"6X<00>Z<EFBFBD>
}<02> 9GGThe Pagerank Citation Ranking: Bringing Order to the Web<07>The importance of a Web page is an inherently subjective matter, which depends on the readers interests, knowledge and attitudes. But there is still much that can be said objectively about the relative importance of Web pages. This paper describes PageRank, a method for rating Web pages objectively and mechanically, eeectively measuring the human interest and attention devoted to them. We compare PageRank to an idealized random Web surfer. We show how to eeciently compute PageRank for large numbers of pages. And, we show how to apply PageRank to search and to user navigation.information_retrieval/2017-09-06T01:59:56.6952980962017-09-06T01:59:56.695298096<EFBFBD>h<EFBFBD>
E<02>_#1GGThe UNIX Time-Sharing System<07>UNIX is a general-purpose, multi-user, interactive operating system for the Digital Equipment Corporation PDP-11/40 and 11/45 computers. It offers a number of features seldom found even in larger operating systems, including: (1) a hierarchical file system incorporating demountable volumes; (2) compatible file, device, and inter-process I/O; (3) the ability to initiate asynchronous processes; (4) system command language selectable on a per-user basis; and (5) over 100 subsystems including a dozen languages. This paper discusses the nature and implementation of the file system and of the user command interface.Commun. ACMoperating_systems/2017-09-06T01:59:55.8316621092017-09-06T01:59:55.831662109<EFBFBD>8<EFBFBD>
y<02>%E5GGEluding carnivores: file sharing with strong anonymity<07>Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficient file sharing system that provides strong anonymity. HerbivoreFS provides computational guarantees that even adversaries able to monitor all network traffic cannot deduce the identity of a sender or receiver beyond an anonymizing clique of <i>k</i> peers. HerbivoreFS achieves scalability by partitioning the global network into smaller anonymizing cliques. Measurements on PlanetLab indicate that the system achieves high anonymous bandwidth when deployed on the Internet.ACM SIGOPS European Workshopdistributed_systems/2017-09-06T01:59:53.7931479492017-09-06T01:59:53.793147949<EFBFBD><1E>
Y<02>S#GGStasis: Flexible Transactional Storage<07>An increasing range of applications requires robust support for atomic, durable and concurrent transactions. Databases provide the default solution, but force applications to interact via SQL and to forfeit control over data layout and access mechanisms. We argue there is a gap between DBMSs and file systems that limits designers of data-oriented applications.
Stasis is a storage framework that incorporates ideas from traditional write-ahead logging algorithms and file systems. It provides applications with flexible control over data structures, data layout, robustness, and performance. Stasis enables the development of unforeseen variants on transactional storage by generalizing write-ahead logging algorithms. Our partial implementation of these ideas already provides specialized (and cleaner) semantics to applications.
We evaluate the performance of a traditional transactional storage system based on Stasis, and show that it performs favorably relative to existing systems. We present examples that make use of custom access methods, modified buffer manager semantics, direct log file manipulation, and LSN-free pages. These examples facilitate sophisticated performance optimizations such as zero-copy I/O. These extensions are composable, easy to implement and significantly improve performance.OSDIdatastores/2017-09-06T01:59:53.0015380862017-09-06T01:59:53.001538086 <02> <09>%<02><00>A<EFBFBD> <00>=<02>y=5GGA Response to Cheriton and Skeen's Criticism of Causal and Totally Ordered Communication<07>In a paper to be presented at the 1993 ACM Symposium on Operating Systems Principles, Cheriton and Skeen offer their understanding of causal and total ordering as a communication property. In this brief rebuttal. I present some responses to their criticism, and also explain why I find their discussion of causal and total communication ordering to be narrow and incomplete.Operating Systems Reviewdistributed_systems/2017-09-06T01:59:59.7348391112017-09-06T01:59:59.734839111<EFBFBD>K<EFBFBD>
?<02>55GGSecure network provenance<07>This paper introduces <i>secure network provenance (SNP)</i>, a novel technique that enables networked systems to explain to their operators <i>why</i> they are in a certain state -- e.g., why a suspicious routing table entry is present on a certain router, or where a given cache entry originated. SNP provides network forensics capabilities by permitting operators to track down faulty or misbehaving nodes, and to assess the damage such nodes may have caused to the rest of the system. SNP is designed for adversarial settings and is robust to manipulation; its tamper-evident properties ensure that operators can detect when compromised nodes lie or falsely implicate correct nodes.
We also present the design of SNooPy, a general-purpose SNP system. To demonstrate that SNooPy is practical, we apply it to three example applications: the Quagga BGP daemon, a declarative implementation of Chord, and Hadoop MapReduce. Our results indicate that SNooPy can efficiently explain state in an adversarial setting, that it can be applied with minimal effort, and that its costs are low enough to be practical.SOSPdistributed_systems/2017-09-06T01:59:58.6939838872017-09-06T01:59:58.693983887<EFBFBD><08> <00>A<02>?'EEA Data-driven Method for the Detection of Close Submitters in Online Learning Environments<07>Online learning has become very popular over the last decade. However , there are still many details that remain unknown about the strategies that students follow while studying online. In this study, we focus on the direction of detecting 'invisible' collaboration ties between students in online learning environments. Specifically, the paper presents a method developed to detect student ties based on temporal proximity of their assignment submissions. The paper reports on findings of a study that made use of the proposed method to investigate the presence of close submitters in two different massive open online courses. The results show that most of the students (i.e., student user accounts) were grouped as couples, though some bigger communities were also detected. The study also compared the population detected by the algorithm with the rest of user accounts and found that close submitters needed a statistically significant lower amount of activity with the platform to achieve a certificate of completion in a MOOC. These results confirm that the detected close submitters were performing some collaboration or even engaged in unethical behaviors, which facilitates their way into a certificate. However, more work is required in the future to specify various strategies adopted by close submitters and possible associations between the user accounts.WWWgamification/2017-09-06T01:59:57.623229982017-09-06T01:59:57.62322998 R
|R<00>&<26>
<00> <02>i<EFBFBD>==GGCognitive Computing: A Brief Survey and Open Research Challenges<07>Cognitive computing is a multidisciplinary field of research aiming at devising computational models and decision making mechanisms based on the neurobiological processes of the brain, cognitive sciences, and psychology. The objective of cognitive computational models is to endow computer systems with the faculties of knowing, thinking, and feeling. The major contributions of this survey include (i) giving insights into cognitive computing by listing and describing its definitions, related fields, and terms, (ii) classifying current research on cognitive computing according to its objectives, (iii) presenting a concise review of cognitive computing approaches, and (iv) identifying the open research issues in the area of cognitive computing.2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligenceparadigms/new_paradigms/2017-09-06T02:00:01.3882219242017-09-06T02:00:01.388221924<EFBFBD><00>
{<02>k 5GGCommodifying Replicated State Machines with OpenReplica<07>This paper describes OpenReplica, an open service that provides replication and synchronization support for large-scale distributed systems. OpenReplica is designed to commodify Paxos replicated state machines by providing infrastructure for their construction, deployment and maintenance. OpenReplica is based on a novel Paxos replicated state machine implementation that employs an object-oriented approach in which the system actively creates and maintains live replicas for user-provided objects. Clients access these replicated objects transparently as if they are local objects. OpenReplica supports complex distributed synchronization constructs through a multi-return mechanism that enables the replicated objects to control the execution flow of their clients, in essence providing blocking and non-blocking method in-vocations that can be used to implement richer synchronization constructs. Further, it supports elasticity requirements of cloud deployments by enabling any number of servers to be replaced dynamically. A rack-aware placement manager places replicas on nodes that are unlikely to fail together. Experiments with the system show that the latencies associated with replication are comparable to ZooKeeper, and that the system scales well.distributed_systems/2017-09-06T02:00:00.4462548832017-09-06T02:00:00.446254883 ii<00>+<2B>
q<02>Q5GGIn Search of an Understandable Consensus Algorithm<07>Raft is a consensus algorithm for managing a replicated log. It produces a result equivalent to (multi-)Paxos, and it is as efficient as Paxos, but its structure is different from Paxos; this makes Raft more understandable than Paxos and also provides a better foundation for building practical systems. In order to enhance understandabil-ity, Raft separates the key elements of consensus, such as leader election, log replication, and safety, and it enforces a stronger degree of coherency to reduce the number of states that must be considered. Results from a user study demonstrate that Raft is easier for students to learn than Paxos. Raft also includes a new mechanism for changing the cluster membership, which uses overlapping majorities to guarantee safety.USENIX Annual Technical Conferencedistributed_systems/2017-09-06T02:00:03.7154790042017-09-06T02:00:03.715479004<EFBFBD>d<EFBFBD>
[<02>k GGOn the Electrodynamics of Moving Bodies<07>It is known that Maxwell's electrodynamics—as usually understood at the present time—when applied to moving bodies, leads to asymmetries which do not appear to be inherent in the phenomena. Take, for example, the reciprocal electrodynamic action of a magnet and a conductor. The observable phenomenon here depends only on the relative motion of the conductor and the magnet, whereas the customary view draws a sharp distinction between the two cases in which either the one or the other of these bodies is in motion. For if the magnet is in motion and the conductor at rest, there arises in the neighbourhood of the magnet an electric field with a certain definite energy, producing a current at the places where parts of the conductor are situated. But if the magnet is stationary and the conductor in motion, no electric field arises in the neighbourhood of the magnet. In the conductor, however, we find an electro-motive force, to which in itself there is no corresponding energy, but which gives rise—assuming equality of relative motion in the two cases discussed—to electric currents of the same path and intensity as those produced by the electric forces in the former case. Examples of this sort, together with the unsuccessful attempts to discover any motion of the earth relatively to the " light medium, " suggest that the phenomena of electrodynamics as well as of mechanics possess no properties corresponding to the idea of absolute rest. They suggest rather that, as has already been shown to the first order of small quantities, the same laws of electrodynamics and optics will be valid for all frames of reference for which the equations of mechanics hold good. 1 We will raise this conjecture (the purport of which will hereafter be called the " Principle of Relativity ") to the status of a postulate, and also introduce another postulate, which is only apparently irreconcilable with the former, namely, that light is always propagated in empty space with a definite velocity c which is independent of the state of motion of the emitting body. These two postulates suffice for the attainment of a simple and consistent theory of the electrodynamics of moving bodies based on Maxwell's theory for stationary bodies. The introduction of a " luminiferous ether " will prove to be superfluous inasmuch as the view here to be developed will not require an " absolutely stationary space " …physics/2017-09-06T02:00:02.2502270512017-09-06T02:00:02.250227051 <00>  ]<00><00>)<29> <00><02> 5GGWhy Do Some Men Use Violence Against Women and How Can We Prevent It?<07>The views expressed in this publication are those of the authors and do not necessarily represent those of the United Nations, including UNDP, UNFPA, UN Women, UNV or UN Member States. UNDP partners with people at all levels of society to help build nations that can withstand crisis and drive and sustain the kind of growth that improves the quality of life for everyone. On the ground in 177 countries and territories, we offer a global perspective and local insight to help empower lives and build resilient nations. The United Nations Population Fund (UNFPA) is an international development agency that works with countries to protect and promote the sexual and reproductive health of women, men and young people. The United Nations Entity for Gender Equality and the Empowerment of Women (UN Women) is a global champion for women and girls; UN Women was established to accelerate progress on meeting their rights worldwide. The United Nations Volunteers (UNV) programme, is the UN organization that contributes to peace and development through volunteerism worldwide. Partners for Prevention is a UNDP, UNFPA, UN Women and UNV regional joint programme for gender-based violence prevention in Asia and the Pacific. foreword Violence against women constrains the enjoyment of women's human rights ev
<00>G 7GGDai-depur: an Integrated Supervisory Multi-level Architecture for Wastewater Treatment Plants<07>program_verification/2017-09-06T02:00:07.1935358892017-09-06T02:00:07.193535889<EFBFBD>c<EFBFBD> <00><02>_=5GGDistributed Snapshots: Determining Global States of Distributed Systems<07>This paper presents an algorithm by which a process in a distributed system determines a global state of the system during a computation. Many problems in distributed systems can be cast in terms of the problem of detecting global states. For instance, the global state detection algorithm helps to solve an important class of problems: stable property detection. A stable property is one that persists: once a stable property becomes true it remains true thereafter. Examples of stable properties are &#8220;computation has terminated,&#8221; &#8220; the system is deadlocked&#8221; and &#8220;all tokens in a token ring have disappeared.&#8221; The stable property detection problem is that of devising algorithms to detect a given stable property. Global state detection can also be used for checkpointing.ACM Trans. Comput. Syst.distributed_systems/2017-09-06T02:00:04.8660429692017-09-06T02:00:04.866042969 <01> Yv<01><00>0<EFBFBD>
e<02>G OGGTowards Equal Rights for Higher-kinded Types<07>Generics are a very popular feature of contemporary OO languages, such as Java, C# or Scala. Their support for genericity is lacking, however. The problem is that they only support abstracting over proper types, and not over generic types. This limitation makes it impossible to, e.g., define a precise interface for Iterable, a core abstraction in Scala's collection API. We implemented " type constructor polymorphism " in Scala 2.5, which solves this problem at the root, thus greatly reducing the duplication of type signatures and code.paradigms/functional_programming/2017-09-06T02:00:14.7946621092017-09-06T02:00:14.794662109<EFBFBD>_<EFBFBD>
[<02>C3GGReducing Garbage Collector Cache Misses<07>Cache misses are currently a major factor in the cost of garbage collection, and we expect them to dominate in the future. Traditional garbage collection algorithms exhibit relatively little temporal locality; each live object in the heap is likely to be touched exactly once during each garbage collection. We measure two techniques for dealing with this issue: prefetch-on-grey, and lazy sweeping. The first of these is new in this context. Lazy sweeping has been in common use for a decade. It was introduced as a mechanism for reducing paging and pause times; we argue that it is also crucial for eliminating cache misses during the sweep phase.
Our measurements are obtained in the context of a non-moving garbage collector. Fully copying garbage collection inherently requires more traffic through the cache, and thus probably also stands to benefit substantially from something like the prefetch-on-grey technique. Generational garbage collection may reduce the benefit of these techniques for some applications, but experiments with a non-moving generational collector suggest that they remain quite useful.ISMMgarbage_collection/2017-09-06T02:00:13.4825610352017-09-06T02:00:13.482561035<EFBFBD>;<3B> <00>'<02>3#GGConsistency and fault tolerance for erasure-coded distributed storage systems<07>One challenge in applying erasure codes (or error-correcting codes) to distributed storage systems is to maintain consistency between data and redundancy blocks in the face of crashing servers. We present two access protocols that provide sequential consistency and maximum distance separable fault tolerance at the same time. The protocols use sequence numbers to recover a consistent version in the presence of failures or partial writes. The first (pessimistic) PSW protocol uses a master per stripe to execute updates in sequence. The second (optimistic) OCW protocol allows concurrent writes to blocks in the same stripe to happen in parallel at the cost of additional buffer space.
We present empirical performance results for PSW and OCW and compare them to other protocols. Our results show that OCW is as fast as simple replication while providing better fault tolerance and/or reduced storage overhead. This demonstrates that erasure coding can be used as a space-efficient alternative to replication in distributed storage systems.DICT@HPDCdatastores/2017-09-06T02:00:11.6835419922017-09-06T02:00:11.683541992<EFBFBD>d<EFBFBD>
m<02>95GGHigh-Level Specifications: Lessons from Industry<07>We explain the rationale behind the design of the TLA + specification language , and we describe our experience using it and the TLC model checker in industrial applications—including the verification of multiprocessor memory designs at Intel. Based on this experience, we challenge some conventional wisdom about high-level specifications.FMCOdistributed_systems/2017-09-06T02:00:09.9288249512017-09-06T02:00:09.928824951 m<07>m<00>$<24>
S<02>[ 5GGDining Cryptographers are Practical<07>The dining cryptographers protocol provides information-theoretically secure sender and recipient untraceability. However, the protocol is considered to be impractical because a malicious participant may disrupt the communication. We propose an implementation which provides information-theoretical security for senders and recipients, and in which a disruptor with limited computational capabilites can easily be detected.distributed_systems/2017-09-06T02:00:16.6028059082017-09-06T02:00:16.602805908<EFBFBD>g<EFBFBD> <00>-<02>m QEEBack to the future: the story of Squeak, a practical Smalltalk written in itself<07>Squeak is an open, highly-portable Smalltalk implementation whose virtual machine is written entirely in Smalltalk, making it easy to debug, analyze, and change. To achieve practical performance, a translator produces an equivalent C program whose performance is comparable to commercial Smalltalks. Other noteworthy aspects of Squeak include: a compact object format that typically requires only a single word of overhead per object; a simple yet efficient incremental garbage collector for 32-bit direct pointers; efficient bulk-mutation of objects; extensions of BitBlt to handle color of any depth and anti-aliased image rotation and scaling; and real-time sound and music synthesis written entirely in Smalltalk. It includes platform-independent support for color, sound, and image processing. Originally developed on the Macintosh, members of its user community have since ported it to numerous platforms including Windows 95 and NT, Windows CE, all common flavors of UNIX, and the Acorn. Squeak stands alone as a practical Smalltalk in which a researcher, professor, or motivated student can examine source code for every part of the system, including graphics primitives and the virtual machine itself, and make changes immediately and without needing to see or deal with any language other than Smalltalk. It also runs bit-identical images across its wide portability base. Three strands weave through this paper:. 1 the design of the Squeak virtual machine, which differs in several interesting ways from the implementation presented in the Smalltalk "Blue Book" [Gold83] and explored in the "Green Book" [Kras83];. 2 an implementation strategy based on writing the Squeak virtual machine in Smalltalk and translating it into C, using an existing Smalltalk for bootstrapping until Squeak was able to debug and generate its own virtual machine; and. 3 the incremental development process through which Squeak was created and evolved over the course of a year.comp_sci_fundamentals_and_history/2017-09-06T02:00:15.647627932017-09-06T02:00:15.64762793 <04> $<08><04><00>q<EFBFBD> <00> <02> aGGRAY: Integrating Rx and Async for Direct-Style Reactive Streams<07>Languages like F#, C#, and recently also Scala, provide “async” extensions which aim to make asynchronous
A<02>cGGSoK: Eternal War in Memory<07>Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the program's behavior or take full control over it by hijacking its control flow. This problem has existed for more than 30 years and a vast number of potential solutions have been proposed, yet memory corruption attacks continue to pose a serious threat. Real world exploits show that all currently deployed protections can be defeated. This paper sheds light on the primary reasons for this by describing attacks that succeed on today's systems. We systematize the current knowledge about various protection techniques by setting up a general model for memory corruption attacks. Using this model we show what policies can stop which attacks. The model identifies weaknesses of currently deployed techniques, as well as other proposed protections enforcing stricter policies. We analyze the reasons why protection mechanisms implementing stricter polices are not deployed. To achieve wide adoption, protection mechanisms must support a multitude of features and must satisfy a host of requirements. Especially important is performance, as experience shows that only solutions whose overhead is in reasonable bounds get deployed. A comparison of different enforceable policies helps designers of new protection mechanisms in finding the balance between effectiveness (security) and efficiency. We identify some open research problems, and provide suggestions on improving the adoption of newer techniques.2013 IEEE Symposium on Security and Privacysecurity/2017-09-06T02:00:18.3851340332017-09-06T02:00:18.385134033 <0F><0F><0F><0F><0F><0F><0F><0F>}sjV?2)
5computational effect<06> eff
<EFBFBD>handler<14>/multiple matching<11>)square pattern<06>tom<07>trie<07>qemu <09>vmware
<EFBFBD>backend<17>5support transactions<0F>%eavesdropper <0A>~!encryption <0B>}time pad<06>|pri
<EFBFBD>{defense
f<08><0F><0F><0F><0F><0F><0F>t^E,<0E><0E><0E><0E><0E>rbSA1& <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> <0A> { k \ K > 1 ! <08> <0C> <0C> <0C> <0C> <0C> <0C> |<08> k L 9 %  <0B> <0B> <0B> <0B> <0B> <0B> <0B> v i Z L = + 
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
<EFBFBD>
}
p
a
P
<
(

<09> <09> <09> <09> <09> <09> r _ N = 1  <08><08>)Han La Poutré )Heather Miller<05>)J. Garcia Cano<04>%J. Fernandes<03>)J. Feichtingerd-J. Eliot B. Mossz J. Cho<04>#J. Carvalho<03>#J. C. Sousa'J. Bou Jaoude8%J. Borovicka<04>#J. A. Sloan~3J. A. M. Vermaseren<00>'Iulian Moraru<02>!Ion Stoica<01>3Ioannis Stavrakakis<05>/Ioannis KoltsidasX1Ioannis Antonoglou<02>!Ingo MaierF)Indranil Gupta<00>)Ilya Sutskever<02>#Ilka Wittig<00>Ilan HornN Ian Rae<02>Ian Pratt<00>%Ian E. Smith<01> Ian Dey<05>!Ian Clarke"#Iain Becker<01>I. Urreta<03>%I. SydorchukXI. Sporea+I. S. Min<04>!I. Pedroto!I. Lupescu<03>%I. Jovanovic<04>I. H. Kim<04> I. Groza<I. Copaci<03> I. Aoki<03>)Hung-Chih Yang@!Huiqing Li{%Hugues Hoppe<02>/Howard E. Sturgis<00>)Hiroshi Motoda"#Himani Apte<02>+Hesham A. Rakha<04>/Hermann Schägger<00>)Henry G. BakerI)Henrik Nilssonx'Henri GouraudhAHenk O Ten Cate Hoedemaker#Helmut SiesZ%Harris Hyman!-Harold Bekkering<01>/Hari Balakrishnan<00>-Hans-Peter Braun<00>1Hans-Juergen Boehm<05>+Hans-J. Briegel'Hans Svensson6!Haizhou Li<01>!Haifeng Yuz H. WangY H. Tong<04>#H. Steffens<03>H. Sasaki<03>!H. Ribeiro<03>!H. Neumann<04> H. Nam<04> H. Löhr<03> H. Kouno<04> H. KoogH. Kogure<04> H. Kim<04> H. Jang<04> H. Iwano<04>!H. Isayama<04>!H. Imagawa<04>#H. I. Serin<03>
H. He3!H. Hachiya<04>%H. Guerreiro<03>H. Friessj!H. Cardoso<03>!H. B. Chae<04>/Günther Knoblich<01>Gunho Lee<01>9Gunavardhan Kakulapati*?Guilherme Renna Rodrigues<00>?Guilherme Horta Travassos<00>'Guanghao Shen<01>/Grzegorz MalewiczJ3Grzegorz CzajkowskiP3Gregory V. Chockler/Gregory H. Cooperc+Gregor RichardsN+Gregor Kiczales&'Greg Friedman-!Gong Zhang<02>/Giuseppe Decandia'-Gioacchino Norism'Gintaras Woss<01> <01>
<EFBFBD><02><01><00>p<EFBFBD>
5<02> 5EEBouvier's Conjecture<07>This paper deals with Bouvier's conjecture which sustains that finite-dimensional non-Noetherian Krull domains need not be Jaf-fard.distributed_systems/2017-09-06T02:00:24.393892092017-09-06T02:00:24.39389209<EFBFBD>J<EFBFBD>
<02> %GGPart I: Transcendence of Values of Some Special Functions<07>This paper is a transcript of the Inaugural Monroe H. Martin Lecture and Seminar given at Johns Hopkins University on February 23rd and 24th, 2009. In Part I, we present classical and recent results on the transcendence of values of certain special functions of one variable at algebraic points. In Part II, we describe some new results, joint with Marvin D. Tretkoff, on the transcendence of values at algebraic points of hypergeometric functions of several variables. Note that the author's maiden name is Paula B. Cohen. In this part of our paper, we present some results on the transcendence of values of certain special functions of one variable at algebraic points. Recall that the algebraic numbers are the complex numbers satisfying a non-trivial polynomial relation with rational coefficients. We denote the field of rational numbers by Q, and the field of algebraic numbers by Q. A transcendental number, α, is a complex number which is not algebraic. Therefore P (α) = 0 for every polynomial P ∈ Q[x] with at least one non-zero coefficient. The first examples of explicit transcendental numbers are due to Liouville in 1844 [Lio1], but their construction is rather artificial. Liouville showed that an irrational algebraic number cannot be too well approximated by rational numbers with denominators of relatively small size. He then constructed numbers that are so well approximated by rational numbers that they must be transcendental. An example is the number ξ = ∞ n=1 10 n!. In 1874, Cantor gave another proof of the existence of transcendental numbers. He showed that the set of all algebraic numbers is countable, while the set of real numbers is uncountable. It follows that the set of transcendental numbers is uncountable. Somewhat paradoxically, it is usually very difficult to show that any given number is transcendental.mathematics/2017-09-06T02:00:23.6546669922017-09-06T02:00:23.654666992<EFBFBD>O<EFBFBD> <00><02>#GGWarp: Lightweight Multi-Key Transactions for Key-Value Stores<07>Traditional NoSQL systems scale by sharding data across multiple servers and by performing each operation on a small number of servers. Because transactions on multiple keys necessarily require coordination across multiple servers, NoSQL systems often explicitly avoid making transactional guarantees in order to avoid such coordination. Past work on transactional systems control this coordination by either increasing the granularity at which transactions are ordered, sacrificing serializability, or by making clock synchronicity assumptions. This paper presents a novel protocol for providing serializable transactions on top of a sharded data store. Called acyclic transactions, this protocol allows multiple transactions to prepare and commit simultaneously, improving concurrency in the system, while ensuring that no cycles form between concurrently-committing transactions. We have fully implemented acyclic transactions in a document store called Warp. Experiments show that Warp achieves 4× higher throughput than Sinfo-nia's mini-transactions on the standard TPC-C benchmark with no aborts. Further, the system achieves 75% of the throughput of the non-transactional key-value store it builds upon.ArXivdatastores/2017-09-06T02:00:22.9062370612017-09-06T02:00:22.906237061  
Y<02>I 1GGkvm: the Linux Virtual Machine Monitor<07>Virtualization is a hot topic in operating systems these days. It is useful in many scenarios: server consolidation , virtual test environments, and for Linux enthusiasts who still can not decide which distribution is best. Recently , hardware vendors of commodity x86 processors have added virtualization extensions to the instruction set that can be utilized to write relatively simple virtual machine monitors. The Kernel-based Virtual Machine, or kvm, is a new Linux subsystem which leverages these virtualization extensions to add a virtual machine monitor (or hyper-visor) capability to Linux. Using kvm, one can create and run multiple virtual machines. These virtual machines appear as normal Linux processes and integrate seamlessly with the rest of the system. Virtualization has been around almost as long as computers. The idea of using a computer system to emulate another, similar, computer system was early recognized as useful for testing and resource utilization purposes. As with many computer technologies, IBM led the way with their VM system. In the last decade, VMware's software-only virtual machine monitor has been quite successful. More recently, the Xen [xen] open-source hypervisor brought virtualization to the open source world, first with a variant termed paravirtualization and as hardware became available, full virtualization. 2 x86 Hardware Virtualization Extensions x86 hardware is notoriously difficult to virtualize. Some instructions that expose privileged state do not trap when executed in user mode, e.g. popf. Some privileged state is difficult to hide, e.g. the current privilege level, or cpl. Recognizing the importance of virtualization, hardware vendors [Intel][AMD] have added extensions to the x86 architecture that make virtualization much easier. While these extensions are incompatible with each other, they are essentially similar, consisting of: • A new guest operating mode the processor can switch into a guest mode, which has all the regular privilege levels of the normal operating modes, except that system software can selectively request that certain instructions, or certain register accesses, be trapped. • Hardware state switch when switching to guest mode and back, the hardware switches the control registers that affect processor operation modes, as well as the segment registers that are difficult to switch, and the instruction pointer so that a control transfer can take effect. • Exit reason reporting when a switch from guest mode back to host mode occurs, the hardware reports the reason for the switch so that software can take the appropriate action. Under …operating_systems/2017-09-06T02:00:26.2535061042017-09-06T02:00:26.253506104 <02>)<02><00><EFBFBD>
k<02>]IGGProgramming with algebraic effects and handlers<07>Eff is a programming language based on the algebraic approach to computational effects, in which effects are viewed as algebraic operations and effect handlers as homomorphisms from free algebras. Eff supports first-class effects and handlers through which we may easily define new computational effects, seamlessly combine existing ones, and handle them in novel ways. We give a de-notational semantics of eff and discuss a prototype implementation based on it. Through examples we demonstrate how the standard effects are treated in eff , and how eff supports programming techniques that use various forms of delimited continuations , such as backtracking, breadth-first search, selection functionals, cooperative multi-threading, and others.J. Log. Algebr. Meth. Program.plt/2017-09-06T02:00:30.9467749022017-09-06T02:00:30.946774902<EFBFBD>S<EFBFBD>
U<02>%%/GGImproved Dynamic Dictionary Matching<07>1 Introduction In the dynamic dictionary matching problem, a dictionary D contains a set of patterns that can change over time by insertion and deletion of individual patterns. The user also presents text strings and asks for all occurrences of any patterns in the text. The two main contributions of this paper are: 1) A faster algorithm for dynamic string dictionary matching with bounded alphabets, and 2) A dynamic dictionary matching algorithm for two dimensional texts and square patterns. The first contribution is based on an algorithm that solves the general problem of maintaining a sequence of well-balanced parentheses under the operations insert, delete, and find nearest enclosing parenthesis pair. The main ideas behind the second contribution are: a linearization of two dimensional square patterns along the main diagonal, and new data structures to allow efficient manipulation of failure links. The classical pattern matching paradigm is that of searching for a given pattern in a given text. For example, the classical string matching problem is defined This is one of the most studied problems in computer science [16] and has many different linear time solutions (e.g., [lo, 191 d an many others). The two dimensional version of this problem in which strings of symbols are replaced with matrices is also well studied [9, 8, 21. Another paradigm is that of multiple matching. The input is a set of patterns D and a text. The object is to find all occurrences of all patterns from D that appear in the text. A motivation for this paradigm was given by Aho and Corasick [l]. They solved a bibliographic search problem for a set of words. Aho and Corasick gave an O((t + d) loga + tocc) time algorithm (AC for short) for the multiple string matching problem, where the text is of length t, the sum of all pattern lengths is d, the total number of pattern occurrences reported is tom, and u is the number of distinct characters that occur in D. It will always be the case that d 1 u, so terms depending on 0 are sometimes omitted. Recently there has been interest in a stronger paradigm, that of (dynamic) dictionary matching. Like multiple matching, we seek all appearances of any of a set of patterns (the dictionary) in an input text. The difference between dictionary matching and multiple matching is that the dictionary matching paradigm assumes a very …Inf. Comput.pattern_matching/2017-09-06T02:00:27.1479008792017-09-06T02:00:27.147900879 ]<0E> <0C> <0B> ,
6 X]<00>xE
]<5D>5GGi9d2c1271f1219522d13f150c2b04123bef300dd9herbivore-a-scalable-and-efficient-protocol-for-anonymous.pdfdistributed_systems/herbivore a scalable and efficient protocol for anonymous2017-09-06T01:52:30.5473469242017-09-06T01:52:30.547346924<EFBFBD>[D ]k5cGGD50158bc1a8a67295ab7bce0550886a9859000dc2harvest-yield-and-scalable-tolerant-systems.pdfdistributed_systems/harvest yield and scalable tolerant systems2017-09-06T01:52:30.5445480962017-09-06T01:52:30.544548096<EFBFBD>sC
]<5D>5{GGZ49ed15db181c74c7067ec01800fb5392411c868cepidemic-algorithms-for-replicated-database-maintenance.pdfdistributed_systems/epidemic algorithms for replicated database maintenance2017-09-06T01:52:30.5367929692017-09-06T01:52:30.536792969<EFBFBD>NB ]_5WGGu368427e6e351d1ac0ef97e824968ed15d0dc3d4dend-to-end-arguments-in-system-design.pdfdistributed_systems/end to end arguments in system design2017-09-06T01:52:30.5334619142017-09-06T01:52:30.533461914<EFBFBD>oA ]5wGG<01>f52e7afce70597024c3be7df105185dd59a2c8e6eluding-carnivores-file-sharing-with-strong-anonymity.pdfdistributed_systems/eluding carnivores file sharing with strong anonymity2017-09-06T01:52:30.5305549322017-09-06T01:52:30.530554932<EFBFBD>@ ]<5D>!5<>GG<01>fd443b2ce70c48202ba26cbc6caa471ae262e270distributed-snapshots-determining-global-states-of-distributed-systems.pdfdistributed_systems/distributed snapshots determining global states of distributed systems2017-09-06T01:52:30.5257509772017-09-06T01:52:30.525750977<EFBFBD>t?
]<5D>5{GGb003d5a65de0ac72daaf105ded903cb3eb88585b3dapper-a-large-scale-distributed-tracing-infrastructure.pdfdistributed_systems/dapper a large scale distributed tracing infrastructure2017-09-06T01:52:30.5193559572017-09-06T01:52:30.519355957<EFBFBD>> ]<5D>5<>GGt11ff11e3aedaa41a67bea3623e5d2a805db6166ecopysets-reducing-the-frequency-of-data-loss-in-cloud-storage.pdfdistributed_systems/copysets reducing the frequency of data loss in cloud storage2017-09-06T01:52:30.5095119632017-09-06T01:52:30.509511963