Secure Grouping and Aggregation with MapReduce
|
|
- Maude Griffin
- 5 years ago
- Views:
Transcription
1 1/27 Secure Grouping and Aggregation with MapReduce Radu Ciucanu Matthieu Giraud Pascal Lafourcade Lihua Ye 28 July 2018 SECRYPT, Porto
2 2/27 Example of Grouping and Aggregation Name Department Salary Alice Computer Science 1900 Bob Mathematics 1750 Mallory Computer Science 1800 Oscar Physics 2000 Carol Mathematics 1600
3 2/27 Example of Grouping and Aggregation Name Department Salary Alice Computer Science 1900 Bob Mathematics 1750 Mallory Computer Science 1800 Oscar Physics 2000 Carol Mathematics 1600 Department COUNT SUM AVG MAX MIN Computer Science Mathematics Physics
4 MapReduce I Partitioning input data I Scheduling program execution on machines I Performing the shuffle I Handling machine failures Input 1 Input 2 Input 3 Map 1 Map 2 Map 3 Shuffle Programmer gives: Reduce 1 Reduce 2 Output 1 Output 2 I Input files I Map and Reduce 3/27
5 Grouping and Sum with MapReduce User Data owner D M R P γdept,sum(salary) (D) Map: M R: (πdept (t), πsalary (t)) Reduce: Input: (key P, values) sum = πdept (t) values πsalary (t) R P : (πdept (t), sum). t D Name Alice Bob Mallory Oscar Carol Department Computer Science Mathematics Computer Science Physics Mathematics Salary Department Salary Computer Science Mathematics Computer Science Physics Mathematics Department SUM Computer Science Mathematics Physics /27
6 Security Model Cloud is honest-but-curious f( Cloud Data Owner f ) User Security properties I Secrecy of and f( ) I User queries f( ) but cannot learn 5/27
7 Contributions Secure MapReduce Algorithms: I COUNT I SUM I AVG I MAX I MIN Secure Private Approach I Cloud nodes do not learn I Cloud nodes do not learn f( ) I User does not learn 6/27
8 7/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion
9 Pseudo-Random Permutation Idea: f : {0, 1} n {0, 1} n 0 {0, 1} n 1 Deterministic Result indistinguishable from a random Not inversible Notation: Data owner picks a key k and uses f k (m) 8/27
10 9/27 Fully Homomorphic Encryption (Gentry 2009) Idea: Perform ANY computations on encrypted data f, x i, f (E k (x 1 ),..., E k (x n )) = E k (f (x 1,..., x n )) Not yet efficient enough
11 Partial Homomorphic Encryption Paillier s Cryptosystem (1999) Public Key encryption Probabilistic encryption E pk (x + y) = E pk (x) E pk (y) E pk (x y) = (E pk (x)) y 10/27
12 11/27 Oder Preserving Encryption Agrawal et al. Cryptosystem (2004) Let c 1 = E k (m 1 ) and c 2 = E k (m 2 ) Symmetric encryption if m 1 < m 2 then c 1 < c 2
13 12/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion
14 13/27 COUNT, SUM and AVG Preprocessing on data All data are encrypted with Paillier with pk U All data d have f k (d) Name Dept Salary A CS 1900 B Math 1750 M CS 1800 O Phy 2000 C Math 1600 Name Dept Salary f k (A),E pku (A) f k (CS), E pku (CS) f k (1900), E pku (1900) f k (B),E pku (B) f k (Math), E pku (Math) f k (1750), E pku (1750) f k (M),E pku (M) f k (CS), E pku (CS) f k (1800), E pku (1800) f k (O),E pku (O) f k (Phy), E pku (Phy) f k (2000), E pku (2000) f k (C),E pku (C) f k (Math), E pku (Math) f k (1600), E pku (1600)
15 Secure Private COUNT Name Dept Salary fk(a),epk U (A) fk(cs), Epk U (CS) fk(1900), Epk U (1900) fk(b),epk U (B) fk(math), Epk U (Math) fk(1750), Epk U (1750) fk(m),epk U (M) fk(cs), Epk U (CS) fk(1800), Epk U (1800) fk(o),epk U (O) fk(phy), Epk U (Phy) fk(2000), Epk U (2000) fk(c),epk U (C) fk(math), Epk U (Math) fk(1600), Epk U (1600) (f k (CS), (E pku (CS), E pku (1))) (f k (CS), (E pku (CS) E pku (1))) (f k (Math), (E pku (Math), E pku (1))) (f k (Math), (E pku (Math), E pku (1))) (f k (Phy), (E pku (Phy), E pku (1))) (Epk U (CS), Epk U (2)) (Epk U (Math), Epk U (2)) (Epk U (Phy), Epk U (1)) γ A,COUNT( ) (D) Map: M R: { (π A f k (t), (π A E pku (t), E pku (1))) } t D Reduce: count = E pku ( π A f k (t) values 1) = π A f k (t) values E pk U (1) R P : (π A E pku (t), count). 14/27
16 Secure Private SUM Name Dept Salary fk(a),epk U (A) fk(cs), Epk U (CS) fk(1900), Epk U (1900) fk(b),epk U (B) fk(math), Epk U (Math) fk(1750), Epk U (1750) fk(m),epk U (M) fk(cs), Epk U (CS) fk(1800), Epk U (1800) fk(o),epk U (O) fk(phy), Epk U (Phy) fk(2000), Epk U (2000) fk(c),epk U (C) fk(math), Epk U (Math) fk(1600), Epk U (1600) (f k(cs), (E pku (CS), E pku (1900))) (f k(cs), (E pku (CS) E pku (1800))) (f k(math), (E pku (Math), E pku (1750))) (f k(math), (E pku (Math), E pku (1600))) (f k(phy), (E pku (Phy), E pku (2000))) (Epk U (CS), Epk U (3700)) (Epk U (Math), Epk U (3350)) (Epk U (Phy), Epk U (2000)) γ A,SUM(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B E pku (t))) } t D Reduce: sum = E pku ( π A f k (t) values π B(t)) = π A f k (t) values π BE pku (t) R P : (π A E pku (t), sum). 15/27
17 16/27 Secure Private AVG γ A,AVG(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B E pku (t), E pku (1))) } t D Reduce: count = E pku ( π A f k (t) values 1) = π A f k (t) values E pk U (1) sum = E pku ( π A f k (t) values π B(t)) = π A f k (t) values π BE pku (t) R P : (π A E pku (t), (sum, count)).
18 17/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion
19 18/27 MIN & MAX Preprocessing on data All data are encrypted with OPE with a shared key K DU And encrypted with the public key of the node pk C All data d have f k (d)
20 Secure Private MIN Name Dept Salary fk(a),ek DU (A) fk(cs), Ek DU (CS) fk(1900), Ek DU (1900) fk(b),ek DU (B) fk(math), Ek DU (Math) fk(1750), Ek DU (1750) fk(m),ek DU (M) fk(cs), Ek DU (CS) fk(1800), Ek DU (1800) fk(o),ek DU (O) fk(phy), Ek DU (Phy) fk(2000), Ek DU (2000) fk(c),ek DU (C) fk(math), Ek DU (Math) fk(1600), Ek DU (1600) (f k(cs), (E kdu (CS), E kdu (1900))) (f k(cs), (E kdu (CS) E kdu (1800))) (f k(math), (E kdu (Math), E kdu (1750))) (f k(math), (E kdu (Math), E kdu (1600))) (f k(phy), (E kdu (Phy), E kdu (2000))) (Ek DU (CS), Ek DU (1800)) (Ek DU (Math), EK DU (1600)) (Ek DU (Phy), Ek DU (2000)) γ A,MIN(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B (t))) } t D Reduce: M = min πa f k (t) valuesd skd π B (t) R P : (π A E pku (t), M). 19/27
21 20/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion
22 21/27 Security Theorem The SP-SUM, SP-COUNT, SP-AVG, SP-MIN, and SP-MAX protocols securely compute the grouping and aggregation in the ROM in the presence of honest-but-curious adversary even if cloud nodes collude.
23 22/27 Combiners and Improvements COUNT SUM AVG Map can perform some aggregations MAX & MIN We can split it into 2 rounds to counter possible frequency attacks against OPE
24 23/27 Performances of COUNT, SUM & AVG Seconds Avg without combiner Avg with combiner Sum without combiner Sum with combiner Count without combiner Count with combiner 50 1,000 1,840 2,680 3,520 4,360 5,200 Number of tuples/k
25 24/27 Performances of MIN Seconds Nosecure 1Round Nosecure 2Round Secure 1Round Secure 2Round ,888 3,265 4,642 Number of tuples/k
26 25/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion
27 Conclusion Secure-Private MapReduce: COUNT, SUM, AVG, & MAX MIN Using Paillier and OPE Honest-but-curious adversay Next step Combinaisons of COUNT, SUM, AVG, MAX & MIN 26/27
28 Questions? 27/27
Big Data Anonymisation Techniques
Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve
More informationProtecting Patient Privacy in Genomic Analysis
Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh
More informationThe Knapsack Problem
Spring 2010 Chris Christensen HNR 304 The Knapsack Problem In 1978, Merkel and Hellman published a public-key encryption system based upon the knapsack problem ("Hiding information and signatures in trapdoor
More informationDealing with Ambiguity in Plan Recognition under Time Constraints
Dealing with Ambiguity in Plan Recognition under Time Constraints Moser S. Fagundes, Felipe Meneguzzi, Rafael H. Bordini, Renata Vieira Pontifical Catholic University of Rio Grande do Sul Plan Recognition
More informationProtecting Patient Privacy in Genomic Analysis
Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh
More informationConstrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University
Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, and David J. Wu Stanford University Pseudorandom Functions (PRFs) [GGM84] k R K Pseudorandom f R Funs[X, Y] Random F: K X Y x
More informationCloud Computing CS
Cloud Computing CS 15-319 Pregel Lecture 10, Feb 15, 2012 Majd F. Sakr, Suhail Rehman and Mohammad Hammoud Today Last session Apache Mahout, Guest Lecture Today s session Pregel Announcement: Project Phases
More informationA parallel algorithm for optimal job shop scheduling of semi-constrained details processing on multiple machines
INSTITUTE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BULGARIAN ACADEMY OF SCIENCE A parallel algorithm for optimal job shop scheduling of semi-constrained details processing on multiple machines Daniela
More informationA Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China
A Vision-based Affective Computing System Jieyu Zhao Ningbo University, China Outline Affective Computing A Dynamic 3D Morphable Model Facial Expression Recognition Probabilistic Graphical Models Some
More informationEnhancing Privacy and Utility with Noisy Minimax Filter
Enhancing Privacy and Utility with Noisy Minimax Filter Jihun Hamm Dept. Computer Science and Engineering The Ohio State University Syntactic anonymity Privacy measures for database release k-anonymity
More informationFever Diagnosis Rule-Based Expert Systems
Fever Diagnosis Rule-Based Expert Systems S. Govinda Rao M. Eswara Rao D. Siva Prasad Dept. of CSE Dept. of CSE Dept. of CSE TP inst. Of Science & Tech., TP inst. Of Science & Tech., Rajah RSRKRR College
More informationAssignment Question Paper I
Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?
More informationDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Design Strategies for ARX with Provable Bounds: SPARX and LAX Daniel Dinu 1, Léo Perrin 1, Aleksei Udovenko 1, Vesselin Velichkov 1, Johann Großschädl 1, Alex Biryukov 1 1 SnT, University of Luxembourg
More informationUsing a signature-based machine learning model to analyse a psychiatric stream of data
Using a signature-based machine learning model to analyse a psychiatric stream of data Imanol Perez (Joint work with T. Lyons, K. Saunders and G. Goodwin) Mathematical Institute University of Oxford Rough
More informationReinforcement Learning
Reinforcement Learning Michèle Sebag ; TP : Herilalaina Rakotoarison TAO, CNRS INRIA Université Paris-Sud Nov. 9h, 28 Credit for slides: Richard Sutton, Freek Stulp, Olivier Pietquin / 44 Introduction
More informationMACHINE learning-as-a-service has seen an explosion
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. X, NO. Y, MONTH 20XX 1 Demystifying Membership Inference Attacks in Machine Learning as a Service Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi
More informationConstraining Pseudorandom Functions Privately
Constraining Pseudorandom Functions Privately David Wu Stanford University Joint work with Dan Boneh and Kevin Lewi Pseudorandom Functions (PRFs) [GGM84] : Pseudorandom Funs, Random, Constrained PRFs [BW13,
More information11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE
11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE The National DAFNE Clinical and Research database was set up as part of the DAFNE QA programme (refer to section 12) to facilitate Audit and was updated
More informationOutline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?
Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?
More informationAssignment Question Paper I. 1. What is the external and internal commands and write 5 commands for each with result?
Subject:- INFORMATION TECHNOLOGY Max Marks -30 kvksa esa gy djuk vfuok;z gsa 1. What is the external and internal commands and write 5 commands for each with result? 2. Writes the features of UNIX Operating
More informationOn the Combination of Collaborative and Item-based Filtering
On the Combination of Collaborative and Item-based Filtering Manolis Vozalis 1 and Konstantinos G. Margaritis 1 University of Macedonia, Dept. of Applied Informatics Parallel Distributed Processing Laboratory
More informationDisease predictive, best drug: big data implementation of drug query with disease prediction, side effects & feedback analysis
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 2579-2587 Research India Publications http://www.ripublication.com Disease predictive, best drug: big data
More informationBlend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine
Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services Alegria Baquero U. of California, Irvine Allan Schiffman CommerceNet Jeff Shrager CommerceNet & Stanford U. AMS@COMMERCE.NET
More informationBenchmark: Talend Open Studio vs Pentaho Data Integrator (aka Kettle) V0.23
Benchmark: Talend Open Studio vs Pentaho Data Integrator (aka Kettle) V0.23 MarcRussel@gmail.com Last modified: 2007-07-31 Table of contents Environment... 2 Test 1: Text Input file > Text Output file...
More informationUsing the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview
Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Millions of people. Strong collaborations. Privacy first. Jeffrey Brown,
More information1 Cohort Identification within FDA's Mini-Sentinel Program
info@mini-sentinel.org 1 Cohort Identification within FDA's Mini-Sentinel Program October 31, 2013 Mini-Sentinel partner organizations Lead HPHC Institute Data and scientific partners Scientific partners
More informationANN predicts locoregional control using molecular marker profiles of. Head and Neck squamous cell carcinoma
ANN predicts locoregional control using molecular marker profiles of Head and Neck squamous cell carcinoma Final Project: 539 Dinesh Kumar Tewatia Introduction Radiotherapy alone or combined with chemotherapy,
More informationA Network Partition Algorithm for Mining Gene Functional Modules of Colon Cancer from DNA Microarray Data
Method A Network Partition Algorithm for Mining Gene Functional Modules of Colon Cancer from DNA Microarray Data Xiao-Gang Ruan, Jin-Lian Wang*, and Jian-Geng Li Institute of Artificial Intelligence and
More informationMeasurement System Analysis Page 1 of 15
Measurement System Analysis Page 1 of 15 Objective: The goal of this task is to demonstrate the recording data interface and graphical features of the Measurement System Analysis Module (MSA). Three common
More informationMathematically Modeling Biochemistry
Mathematically Modeling Biochemistry Nathan Addy Scientific Programmer October 23, 2008 Overview What are the systems we study? What approaches to do we use to study them? Why these approaches? How does
More informationWolfram Alpha: Inside and Out
Wolfram Alpha: Inside and Out Eric Rowland Mathematics Department Tulane University, New Orleans April 10, 2010 Eric Rowland (Tulane University) Wolfram Alpha: Inside and Out April 10, 2010 1 / 16 Outline
More informationMotivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience.
Outline: Motivation. What s the attention mechanism? Soft attention vs. Hard attention. Attention in Machine translation. Attention in Image captioning. State-of-the-art. 1 Motivation: Attention: Focusing
More informationA Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis
A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis Anne Benoit, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Yves Robert, Frédéric Vivien. A Guide to Algorithm
More informationGrade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers?
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Grade 6 Math Circles Winter 2018 - February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Centre for Education
More informationCPSC 121 Some Sample Questions for the Final Exam
CPSC 121 Some Sample Questions for the Final Exam [0] 1. Tautologies and Contradictions: Determine whether the following statements are tautologies (definitely true), contradictions (definitely false),
More informationHarold Rogers Prescription Drug Monitoring Program National Meeting. August 17, 2016
Harold Rogers Prescription Drug Monitoring Program National Meeting August 17, 2016 Assessment of Opioid-Related Deaths in Massachusetts 2 Trends in Opioid-Related Mortality: Massachusetts 350% increase
More informationCourse Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016
Course Syllabus. Introduction - History; Views; Concepts; Structure 2. Process Management - Processes; State + Resources; Threads; Unix implementation of Processes 3. Scheduling Paradigms; Unix; Modeling
More informationPythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis
Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia
More informationSemantic Pattern Transformation
Semantic Pattern Transformation IKNOW 2013 Peter Teufl, Herbert Leitold, Reinhard Posch peter.teufl@iaik.tugraz.at Our Background Topics Mobile device security Cloud security Security consulting for public
More informationCayley Graphs. Ryan Jensen. March 26, University of Tennessee. Cayley Graphs. Ryan Jensen. Groups. Free Groups. Graphs.
Cayley Forming Free Cayley Cayley University of Tennessee March 26, 2014 Group Cayley Forming Free Cayley Definition A group is a nonempty set G with a binary operation which satisfies the following: (i)
More informationand Internet Computing Amin Saberi Stanford University
Epidemics Algorithmic on Social Game Networks Theory and Internet Computing Amin Saberi Stanford University Social Networks as Graphs Nodes: individuals, webpages (blogs), profiles, PC s Edges: friendship,
More informationEdge Detection Techniques Using Fuzzy Logic
Edge Detection Techniques Using Fuzzy Logic Essa Anas Digital Signal & Image Processing University Of Central Lancashire UCLAN Lancashire, UK eanas@uclan.a.uk Abstract This article reviews and discusses
More informationStatistical Hocus Pocus? Assessing the Accuracy of a Diagnostic Screening Test When You Don t Even Know Who Has the Disease
Statistical Hocus Pocus? Assessing the Accuracy of a Diagnostic Screening Test When You Don t Even Know Who Has the Disease Michelle Norris Dept. of Mathematics and Statistics California State University,
More informationMultiple Treatments on the Same Experimental Unit. Lukas Meier (most material based on lecture notes and slides from H.R. Roth)
Multiple Treatments on the Same Experimental Unit Lukas Meier (most material based on lecture notes and slides from H.R. Roth) Introduction We learned that blocking is a very helpful technique to reduce
More informationCryptography and related topics in Privacy, Security and Theoretical Computer Science.
Dakshita Khurana Phone: +1 (720) 272 7189 Email: dakshita@cs.ucla.edu WebURL: http://web.cs.ucla.edu/~dakshita/ Research Interests Cryptography and related topics in Privacy, Security and Theoretical Computer
More informationExploring uncertainty in cost effectiveness analysis. Francis Ruiz NICE International (acknowledgements to: Benjarin Santatiwongchai of HITAP)
Exploring uncertainty in cost effectiveness analysis Francis Ruiz NICE International (acknowledgements to: Benjarin Santatiwongchai of HITAP) NICE International and HITAP copyright 2013 Why uncertainty
More informationA Bayesian Network Model of Knowledge-Based Authentication
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication
More informationarxiv: v2 [cs.lg] 1 Nov 2017
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods arxiv:1705.07263v2 [cs.lg] 1 Nov 2017 ABSTRACT Neural networks are known to be vulnerable to adversarial examples: inputs that
More informationIntelligent Machines That Act Rationally. Hang Li Toutiao AI Lab
Intelligent Machines That Act Rationally Hang Li Toutiao AI Lab Four Definitions of Artificial Intelligence Building intelligent machines (i.e., intelligent computers) Thinking humanly Acting humanly Thinking
More informationCost-sensitive Dynamic Feature Selection
Cost-sensitive Dynamic Feature Selection He He 1, Hal Daumé III 1 and Jason Eisner 2 1 University of Maryland, College Park 2 Johns Hopkins University June 30, 2012 He He, Hal Daumé III and Jason Eisner
More informationCommon Core Standards: The New US Intended Curriculum
Common Core Standards: The New US Intended Curriculum Andy Porter Jennifer McMaken Jun Hwang Rui Yang University of Pennsylvania Presented at the Brown Center on Education Policy at Brookings October 28,
More informationA walk in the park with Probabilites and Stats. it::unimi::sps::webcomm
A walk in the park with Probabilites and Stats it::unimi::sps::webcomm S Data presentation: Spreadsheet S A spreadsheet is a collection of data orginized as row of cells: The cell "A1" S Each cell can
More informationImplementation of Perception Classification based on BDI Model using Bayesian Classifier
Implementation of Perception Classification based on BDI Model using Bayesian Classifier Vishwanath Y 1 Murali T S 2 Dr M.V Vijayakumar 3 1 Research Scholar, Dept. of Computer Science & Engineering, Jain
More informationPrediction of Diabetes Using Probability Approach
Prediction of Diabetes Using Probability Approach T.monika Singh, Rajashekar shastry T. monika Singh M.Tech Dept. of Computer Science and Engineering, Stanley College of Engineering and Technology for
More informationEmpirical function attribute construction in classification learning
Pre-publication draft of a paper which appeared in the Proceedings of the Seventh Australian Joint Conference on Artificial Intelligence (AI'94), pages 29-36. Singapore: World Scientific Empirical function
More informationLoop Dependence and Parallelism
Loop Dependence and Parallelism Announcements Reading assignments for next week due Midterm is Monday March 6th, example midterms posted Assignment 2 is due the week after that. Start now! Today Data dependencies
More informationJournal of Statistical Software
JSS Journal of Statistical Software August 2006, Volume 16, Issue 7. http://www.jstatsoft.org/ A Computational Tool for Testing Dose-related Trend Using an Age-adjusted Bootstrap-based Poly-k Test Hojin
More informationTesting the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version
Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Gergely Acs, Claude Castelluccia, Daniel Le étayer 1 Introduction Anonymization is a critical
More informationInternational Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X
CLOUD FILE SHARING AND DATA SECURITY THREATS EXPLORING THE EMPLOYABILITY OF GRAPH-BASED UNSUPERVISED LEARNING IN DETECTING AND SAFEGUARDING CLOUD FILES Harshit Yadav Student, Bal Bharati Public School,
More informationCOMPUTER PROGRAMMING
For updated version, please click on http://ocw.ump.edu.my COMPUTER PROGRAMMING INPUT, OUTPUT AND ASSIGNMENT INSTRUCTION - EXERCISE by LIM KAR SING FACULTY OF CIVIL ENGINEERING & EARTH RESOURCES UNIVERSITI
More informationModeling State Space Search Technique for a Real World Adversarial Problem Solving
Modeling State Space Search Technique for a Real World Adversarial Problem Solving Kester O. OMOREGIE Computer Science Department, Auchi Polytechnic, Auchi, NIGERIA Stella C. CHIEMEKE Computer Science
More informationAuthentication in dynamic groups using Identity-based Signatures
Nils gentschen Felde, Sophia Grundner-Culemann, Tobias Guggemos Munich Network Management-Team Ludwig-Maximilians-Universität München Authentication in dynamic groups using Identity-based Signatures October
More informationRELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems.
Abstract RELYING ON TRUST TO FIND RELIABLE INFORMATION Alfarez Abdul-Rahman and Stephen Hailes Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom E-mail:
More informationChapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42
Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...
More informationCS 420/527 Project 3 Hopfield Net
I. Introduction CS 420/527 Project 3 Hopfield Net In this project, the associative memory capacity of Hopefield network is investigated and discussion is given based on experiments. Generally, the neural
More informationGoals of this course. What is Big Data? Big Data. The three Vs in Big Data. 8/20/2018 Week 1-A Sangmi Lee Pallickara
8/20/2018 CS435 Introduction to Big Data - FALL 2018 W1.A.0 CS435 Introduction to Big Data 8/20/2018 CS435 Introduction to Big Data - FALL 2018 W1.A.1 Part 0. Introduction Introduction to Big Data PART
More informationThe storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls
The storage and recall of memories in the hippocampo-cortical system Supplementary material Edmund T Rolls Oxford Centre for Computational Neuroscience, Oxford, England and University of Warwick, Department
More informationPredictive Diagnosis. Clustering to Better Predict Heart Attacks x The Analytics Edge
Predictive Diagnosis Clustering to Better Predict Heart Attacks 15.071x The Analytics Edge Heart Attacks Heart attack is a common complication of coronary heart disease resulting from the interruption
More informationReliability. Scale: Empathy
/VARIABLES=Empathy1 Empathy2 Empathy3 Empathy4 /STATISTICS=DESCRIPTIVE SCALE Reliability Notes Output Created Comments Input Missing Value Handling Syntax Resources Scale: Empathy Data Active Dataset Filter
More informationNature Methods: doi: /nmeth.3115
Supplementary Figure 1 Analysis of DNA methylation in a cancer cohort based on Infinium 450K data. RnBeads was used to rediscover a clinically distinct subgroup of glioblastoma patients characterized by
More informationCurriculum structure of B.Tech ECE Programme (III Semester onwards)
1.Range for total credits in III, IV, V and VI semester is 22-28 2. A course on Management (PC), will be run in VII semester for four branches and the rest will have it in VIII semester 3. Course credit
More informationComparison of discrimination methods for the classification of tumors using gene expression data
Comparison of discrimination methods for the classification of tumors using gene expression data Sandrine Dudoit, Jane Fridlyand 2 and Terry Speed 2,. Mathematical Sciences Research Institute, Berkeley
More informationPredicting Heart Attack using Fuzzy C Means Clustering Algorithm
Predicting Heart Attack using Fuzzy C Means Clustering Algorithm Dr. G. Rasitha Banu MCA., M.Phil., Ph.D., Assistant Professor,Dept of HIM&HIT,Jazan University, Jazan, Saudi Arabia. J.H.BOUSAL JAMALA MCA.,M.Phil.,
More informationUsing Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s
Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression
More informationMath HL Chapter 12 Probability
Math HL Chapter 12 Probability Name: Read the notes and fill in any blanks. Work through the ALL of the examples. Self-Check your own progress by rating where you are. # Learning Targets Lesson I have
More informationAssessing Modes of Interaction
Project 2 Assessing Modes of Interaction Analysis of exercise equipment Overview For this assignment, we conducted a preliminary analysis of two similar types of elliptical trainers. We are able to find
More informationSequential Decision Making
Sequential Decision Making Sequential decisions Many (most) real world problems cannot be solved with a single action. Need a longer horizon Ex: Sequential decision problems We start at START and want
More informationUnit 2 Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing. ST 8 th Sem, A Div Prof. Mouna M.
Unit 2 Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing ST 8 th Sem, A Div 2017-18 Prof. Mouna M. Naravani 19-02-2018 Dept. of CSE, BLDEACET, Vijarapur 2 Boundary Value Testing
More informationImplementation of Inference Engine in Adaptive Neuro Fuzzy Inference System to Predict and Control the Sugar Level in Diabetic Patient
, ISSN (Print) : 319-8613 Implementation of Inference Engine in Adaptive Neuro Fuzzy Inference System to Predict and Control the Sugar Level in Diabetic Patient M. Mayilvaganan # 1 R. Deepa * # Associate
More informationQuestion 1 Multiple Choice (8 marks)
Philadelphia University Student Name: Faculty of Engineering Student Number: Dept. of Computer Engineering First Exam, First Semester: 2015/2016 Course Title: Neural Networks and Fuzzy Logic Date: 19/11/2015
More informationPERSONALIZED medicine is a healthcare paradigm that. ConfidentCare: A Clinical Decision Support System for Personalized Breast Cancer Screening
XXXXX XXXXXXX XXXXXX, VOL. XX, NO. X, XXXX 2016 1 ConfidentCare: A Clinical Decision Support System for Personalized Breast Cancer Screening Ahmed M. Alaa, Member, IEEE, Kyeong H. Moon, William Hsu, Member,
More informationDurham Research Online
Durham Research Online Deposited in DRO: 12 July 2013 Version of attached file: Accepted Version Peer-review status of attached file: Peer-reviewed Citation for published item: Chen, Bindi and Tavner,
More informationJSM Survey Research Methods Section
Methods and Issues in Trimming Extreme Weights in Sample Surveys Frank Potter and Yuhong Zheng Mathematica Policy Research, P.O. Box 393, Princeton, NJ 08543 Abstract In survey sampling practice, unequal
More informationACUTE LEUKEMIA CLASSIFICATION USING CONVOLUTION NEURAL NETWORK IN CLINICAL DECISION SUPPORT SYSTEM
ACUTE LEUKEMIA CLASSIFICATION USING CONVOLUTION NEURAL NETWORK IN CLINICAL DECISION SUPPORT SYSTEM Thanh.TTP 1, Giao N. Pham 1, Jin-Hyeok Park 1, Kwang-Seok Moon 2, Suk-Hwan Lee 3, and Ki-Ryong Kwon 1
More informationNeurons and neural networks II. Hopfield network
Neurons and neural networks II. Hopfield network 1 Perceptron recap key ingredient: adaptivity of the system unsupervised vs supervised learning architecture for discrimination: single neuron perceptron
More informationA Programming Approach to the CS Principles Data Task
A Programming Approach to the CS Principles Data Task (from The Beauty and Joy of Computing team) UC Berkeley Sr Lecturer SOE Dan Garcia bjc.berkeley.edu Broadening Participation in HS CS! New Course:
More informationClassification of Thyroid Disease Using Data Mining Techniques
Volume 119 No. 12 2018, 13881-13890 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Classification of Thyroid Disease Using Data Mining Techniques Sumathi A, Nithya G and Meganathan
More informationExcess BTM Production. Issue Paper
Excess BTM Production Issue Paper Date paper published: June 28, 2018 Table of Contents 1. Executive Summary... 3 2. Plan for Stakeholder Engagement... 4 3. Background... 4 4. Scope... 5 5. Clarification
More informationarxiv: v1 [cs.cv] 13 Jul 2018
Multi-Scale Convolutional-Stack Aggregation for Robust White Matter Hyperintensities Segmentation Hongwei Li 1, Jianguo Zhang 3, Mark Muehlau 2, Jan Kirschke 2, and Bjoern Menze 1 arxiv:1807.05153v1 [cs.cv]
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to publication record in Explore Bristol Research PDF-document
Araiza Illan, D., Pipe, A. G., & Eder, K. I. (2016). Intelligent Agent-Based Stimulation for Testing RoboticaSoftware in Human-Robot Interaction. arxiv, [1604.05508]. Peer reviewed version Link to publication
More informationRegression. Page 1. Variables Entered/Removed b Variables. Variables Removed. Enter. Method. Psycho_Dum
Regression Model Variables Entered/Removed b Variables Entered Variables Removed Method Meds_Dum,. Enter Psycho_Dum a. All requested variables entered. b. Dependent Variable: Beck's Depression Score Model
More informationModeling Sentiment with Ridge Regression
Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,
More informationKeywords Missing values, Medoids, Partitioning Around Medoids, Auto Associative Neural Network classifier, Pima Indian Diabetes dataset.
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Medoid Based Approach
More informationOnline Journal for Weightlifters & Coaches
Online Journal for Weightlifters & Coaches WWW.WL-LOG.COM Genadi Hiskia Dublin, October 7, 2016 WL-LOG.com Professional Online Service for Weightlifters & Coaches Professional Online Service for Weightlifters
More informationPrograms for facies modeling with DMPE
Programs for facies modeling with DMPE Yupeng Li and Clayton V. Deutsch The programs needed for direct multivariate probability estimation (DMPE) are introduced in detail. The first program (TPcalc) is
More informationMulti Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 *
Multi Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 * Department of CSE, Kurukshetra University, India 1 upasana_jdkps@yahoo.com Abstract : The aim of this
More informationBehavioral Data Mining. Lecture 4 Measurement
Behavioral Data Mining Lecture 4 Measurement Outline Hypothesis testing Parametric statistical tests Non-parametric tests Precision-Recall plots ROC plots Hardware update Icluster machines are ready for
More informationAutomatic Hemorrhage Classification System Based On Svm Classifier
Automatic Hemorrhage Classification System Based On Svm Classifier Abstract - Brain hemorrhage is a bleeding in or around the brain which are caused by head trauma, high blood pressure and intracranial
More informationReview for Final Exam
John Jay College of Criminal Justice The City University of New York Department of Mathematics and Computer Science MAT 108 - Finite Mathematics Review for Final Exam SHORT ANSWER. The following questions
More informationCOLOR-PERMUTING AUTOMORPHISMS OF CAYLEY GRAPHS
COLOR-PERMUTING AUTOMORPHISMS OF CAYLEY GRAPHS MELANIE ALBERT, JENNA BRATZ, PATRICIA CAHN, TIMOTHY FARGUS, NICHOLAS HABER, ELIZABETH MCMAHON, JAREN SMITH, AND SARAH TEKANSIK Abstract. Given a group G with
More information