Biblio

Found 19604 results

2002
Hourdakis, John, Michalopoulos, Panos.  2002.  Evaluation of ramp control effectiveness in two twin cities freeways. Transportation Research Record: Journal of the Transportation Research Board. :21–29.
Michalopoulos, Panos G, Hourdakis, John.  2002.  Requirements and procedures for employing simulation in ITS applications. Applications of Advanced Technologies in Transportation (2002). :795–802.
Imai, H., Hanaoka, G., Shikata, J., Otsuka, A., Nascimento, A. C..  2002.  Cryptography with information theoretic security. Proceedings of the IEEE Information Theory Workshop. :73–.
Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called, unconditionally secure (or information-theoretically secure) cryptographic schemes in search for a system that can provide long-term security and that does not impose limits on the adversary's computational power.
2003
Gonzalez, Cleotilde, Lerch, Javier F, Lebiere, Christian.  2003.  Instance-based learning in dynamic decision making. Cognitive Science. 27:591–635.

This paper presents a learning theory pertinent to dynamic decision making (DDM) called instance-based learning theory (IBLT). IBLT proposes five learning mechanisms in the context of a decision-making process: instance-based knowledge, recognition-based retrieval, adaptive strategies, necessity-based choice, and feedback updates. IBLT suggests in DDM people learn with the accumulation and refinement of instances, containing the decision-making situation, action, and utility of decisions. As decision makers interact with a dynamic task, they recognize a situation according to its similarity to past instances, adapt their judgment strategies from heuristic-based to instance-based, and refine the accumulated knowledge according to feedback on the result of their actions. The IBLT’s learning mechanisms have been implemented in an ACT-R cognitive model. Through a series of experiments, this paper shows how the IBLT’s learning mechanisms closely approximate the relative trend magnitude and performance of human data. Although the cognitive model is bounded within the context of a dynamic task, the IBLT is a general theory of decision making applicable to other dynamic environments.

Hourdakis, John, Michalopoulos, Panos, Kottommannil, Jiji.  2003.  Practical procedure for calibrating microscopic traffic simulation models. Transportation Research Record: Journal of the Transportation Research Board. :130–139.
Dinur, Irit, Nissim, Kobbi.  2003.  Revealing Information While Preserving Privacy. Proceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. :202–210.

We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1,..,dn, with a query being a subset q ⊆ [n] to be answered by Σiεqdi. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed) subset sums. Applying this reconstruction algorithm to statistical databases we show that in order to achieve privacy one has to add perturbation of magnitude (Ω√n). That is, smaller perturbation always results in a strong violation of privacy. We show that this result is tight by exemplifying access algorithms for statistical databases that preserve privacy while adding perturbation of magnitude Õ(√n).For time-T bounded adversaries we demonstrate a privacypreserving access algorithm whose perturbation magnitude is ≈ √T.

2004
Hourdakis, John, Michalopoulos, Panos, Morris, Ted.  2004.  Deployment of wireless mobile detection and surveillance for data-intensive applications. Transportation Research Record: Journal of the Transportation Research Board. :140–148.
Hourdakis, J, Michalopoulos, P, Morris, T.  2004.  DEVELOPMENT AND IMPLEMENTATION OF ADVANCED DETECTION AND SURVEILANCE STATIONS FOR TRAFFIC SAFETY. At the Crossroads: Integrating Mobility Safety and Security. ITS America 2004, 14th Annual Meeting and ExpositionITS America.
Ambadipudi, SR, Haifeng, X, Michalopoulos, P, Hourdakis, J.  2004.  METHODOLOGY FOR SELECTING MICROSCOPIC SIMULATORS. At the Crossroads: Integrating Mobility Safety and Security. ITS America 2004, 14th Annual Meeting and Exposition.
Xin, Wuping, Michalopoulos, Panos, Hourdakis, John, Lau, Doug.  2004.  Minnesota's new ramp control strategy: Design overview and preliminary assessment. Transportation Research Record: Journal of the Transportation Research Board. :69–79.
Venkatesh Saligrama, Yonggang Shi, William Clement Karl.  2004.  Performance guarantees in sensor networks. 2004 {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2004, Montreal, Quebec, Canada, May 17-21, 2004. :269–272.
Du, Xiaojiang.  2004.  Using k-nearest neighbor method to identify poison message failure. IEEE Global Telecommunications Conference, 2004. GLOBECOM '04. 4:2113–2117Vol.4.

Poison message failure is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks. The poison message failure can propagate in the network and cause an unstable network. We apply a machine learning, data mining technique in the network fault management area. We use the k-nearest neighbor method to identity the poison message failure. We also propose a "probabilistic" k-nearest neighbor method which outputs a probability distribution about the poison message. Through extensive simulations, we show that the k-nearest neighbor method is very effective in identifying the responsible message type.

Prabhakaran, Manoj, Sahai, Amit.  2004.  New Notions of Security: Achieving Universal Composability Without Trusted Setup. Proceedings of the Thirty-sixth Annual ACM Symposium on Theory of Computing. :242–251.

We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion involves comparing the real protocol execution with an ideal execution involving ideal functionalities (just as in UC-security), but allowing the environment and adversary access to some super-polynomial computational power. We argue the meaningfulness of the new notion, which in particular subsumes many of the traditional notions of security. We generalize the Universal Composition theorem of [3] to the new setting. Then under new computational assumptions, we realize secure multi-party computation (for static adversaries) without a common reference string or any other set-up assumptions, in the new framework. This is known to be impossible under the UC framework.

G. Klien, D. D. Woods, J. M. Bradshaw, R. R. Hoffman, P. J. Feltovich.  2004.  Ten challenges for making automation a "team player" in joint human-agent activity. IEEE Intelligent Systems. 19:91-95.

We propose 10 challenges for making automation components into effective "team players" when they interact with people in significant ways. Our analysis is based on some of the principles of human-centered computing that we have developed individually and jointly over the years, and is adapted from a more comprehensive examination of common ground and coordination.

2005