Berkeley

Results: 29543



#Item
31

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:15
    32Computing / Concurrent computing / Apache Software Foundation / Parallel computing / Input/output / Scheduling / Data management / Apache Hadoop / Data-intensive computing / Benchmark / Apache Spark / MapReduce

    Making Sense of Performance in Data Analytics Frameworks Kay Ousterhout∗ , Ryan Rasti∗† , Sylvia Ratnasamy∗ , Scott Shenker∗† , Byung-Gon Chun‡ ∗ UC Berkeley, † ICSI,  VMware, ‡ Seoul National Unive

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2015-03-04 02:04:39
    33Cryptography / Computing / Computer security / Cybercrime / Password / Security / Challengeresponse authentication / Secure Shell / Passphrase / Telnet / Computer keyboard / Typing

    Timing Analysis of Keystrokes and Timing Attacks on SSH Dawn Xiaodong Song David Wagner University of California, Berkeley Xuqing Tian

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    34Computing / Computer programming / Software engineering / Inter-process communication / Object-oriented programming languages / Programming languages / Actor model / Concurrent computing / Akka / Leader election / Message passing / Schedule

    Minimizing Faulty Executions of Distributed Systems Aurojit Panda? Vjekoslav Brajkovic George Necula? Arvind Krishnamurthy† Scott Shenker?

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2016-02-16 17:31:03
    35Machine learning / Artificial intelligence / Learning / Statistical randomness / Q-learning / Metalearning / Reinforcement learning / Artificial neural network / Meta learning / Multi-armed bandit / Markov decision process / Feature learning

    Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-10-26 20:31:00
    36Domain name system / Internet / Computing / Network architecture / Name server / DNS hijacking / Google Public DNS / Denial-of-service attack / DNS root zone / Root name server / OpenDNS / Hosts

    Global Measurement of DNS Manipulation Paul Pearce Ben Jones† Frank Li Roya Ensafi† Nick Feamster† Nick Weaver‡ Vern Paxson  University

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-06-30 16:05:22
    37Computer vision / Artificial intelligence / Applications of computer vision / Surveillance / Image processing / Conference on Computer Vision and Pattern Recognition / Object detection / Pyramid / Longuet-Higgins Prize

    Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition Tim Althoff, Hyun Oh Song, Trevor Darrell UC Berkeley EECS/ICSI Multimedia Event Detection

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2012-11-20 09:31:09
    38Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

    CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2016-03-10 13:39:26
    39

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-06-30 16:01:04
      40Technology / Metaphysics / Future / Artificial intelligence / Goal / Instrumental convergence / Intention / Risk / Mathematical optimization

      Formalizing Convergent Instrumental Goals Tsvi Benson-Tilsen Nate Soares UC Berkeley

      Add to Reading List

      Source URL: intelligence.org

      Language: English - Date: 2017-01-30 22:06:06
      UPDATE