HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm

HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm - Heule et al. 2013 Continuing on the theme of approximations from yesterday, today's paper looks at what must be one of the best known approximate data structures after the Bloom Filter, HyperLogLog. It's HyperLogLog with a twist though - a … Continue reading HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm

MacroBase: Analytic Monitoring for the Internet of Things

MacroBase: Analytic Monitoring for the Internet of Things - Bailis et al. 2016 It looks like Peter Alvaro is not the only one to be doing some industrial collaboration recently! MacroBase is the result of Peter Bailis' collaboration with Cambridge Mobile Telematics (CMT), an IoT company. The topic at hand is analytic monitoring - detecting … Continue reading MacroBase: Analytic Monitoring for the Internet of Things

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks - Heartfield and Loukas 2015 This paper is concerned with semantic social engineering: the manipulation of the user-computer interface to deceive a user and ultimately breach a computer system's information security. Semantic attack exploits include phishing, file masquerading (disguising file … Continue reading A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google - Bonneau et al. 2015 What was your mother's maiden name? What was your city of birth? What was the name of your first school? I don't know about you, but I always groan inwardly when a website asks such … Continue reading Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google

Strategic Dialogue Management via Deep Reinforcement Learning

Strategic Dialogue Management via Deep Reinforcement Learning - Cuayahuitl et al. 2015 If computers learning to play Atari arcade games by themselves isn't really your thing, perhaps you're more into board games? How about a Deep Reinforcement Learning system that learns how to trade effectively in Settlers of Catan! Again, we're not talking about a … Continue reading Strategic Dialogue Management via Deep Reinforcement Learning

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy - Downlin et al. 2016 Fixed misspellings of homomorphic ! With the rise of machine learning, it's easy to imagine all sorts of cloud services that can process your data and make predictions of some kind (Machine Learning as a Service - MLAS). … Continue reading CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy