Zum Hauptinhalt springen

Showing 1–43 of 43 results for author: Beck, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04303  [pdf, other

    cs.CV cs.AI cs.LG

    Vision-LSTM: xLSTM as Generic Vision Backbone

    Authors: Benedikt Alkin, Maximilian Beck, Korbinian Pöppel, Sepp Hochreiter, Johannes Brandstetter

    Abstract: Transformers are widely used as generic backbones in computer vision, despite initially introduced for natural language processing. Recently, the Long Short-Term Memory (LSTM) has been extended to a scalable and performant architecture - the xLSTM - which overcomes long-standing LSTM limitations via exponential gating and parallelizable matrix memory structure. In this report, we introduce Vision-… ▽ More

    Submitted 2 July, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  2. arXiv:2405.04517  [pdf, other

    cs.LG cs.AI stat.ML

    xLSTM: Extended Long Short-Term Memory

    Authors: Maximilian Beck, Korbinian Pöppel, Markus Spanring, Andreas Auer, Oleksandra Prudnikova, Michael Kopp, Günter Klambauer, Johannes Brandstetter, Sepp Hochreiter

    Abstract: In the 1990s, the constant error carousel and gating were introduced as the central ideas of the Long Short-Term Memory (LSTM). Since then, LSTMs have stood the test of time and contributed to numerous deep learning success stories, in particular they constituted the first Large Language Models (LLMs). However, the advent of the Transformer technology with parallelizable self-attention at its core… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  3. arXiv:2405.02564  [pdf

    cs.CV cs.AI q-bio.NC

    Leveraging the Human Ventral Visual Stream to Improve Neural Network Robustness

    Authors: Zhenan Shao, Linjian Ma, Bo Li, Diane M. Beck

    Abstract: Human object recognition exhibits remarkable resilience in cluttered and dynamic visual environments. In contrast, despite their unparalleled performance across numerous visual tasks, Deep Neural Networks (DNNs) remain far less robust than humans, showing, for example, a surprising susceptibility to adversarial attacks involving image perturbations that are (almost) imperceptible to humans. Human… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  4. arXiv:2310.08470  [pdf, other

    cs.LG cs.NE

    Strategies and impact of learning curve estimation for CNN-based image classification

    Authors: Laura Didyk, Brayden Yarish, Michael A. Beck, Christopher P. Bidinosti, Christopher J. Henry

    Abstract: Learning curves are a measure for how the performance of machine learning models improves given a certain volume of training data. Over a wide variety of applications and models it was observed that learning curves follow -- to a large extent -- a power law behavior. This makes the performance of different models for a given task somewhat predictable and opens the opportunity to reduce the trainin… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  5. A comprehensive review of 3D convolutional neural network-based classification techniques of diseased and defective crops using non-UAV-based hyperspectral images

    Authors: Nooshin Noshiri, Michael A. Beck, Christopher P. Bidinosti, Christopher J. Henry

    Abstract: Hyperspectral imaging (HSI) is a non-destructive and contactless technology that provides valuable information about the structure and composition of an object. It can capture detailed information about the chemical and physical properties of agricultural crops. Due to its wide spectral range, compared with multispectral- or RGB-based imaging methods, HSI can be a more effective tool for monitorin… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Journal ref: Smart Agricultural Technology 5 (2023) 100316

  6. arXiv:2306.01101  [pdf

    cs.NI cs.CY cs.SI

    How We Ruined The Internet

    Authors: Micah Beck, Terry Moore

    Abstract: At the end of the 19th century the logician C.S. Peirce coined the term "fallibilism" for the "... the doctrine that our knowledge is never absolute but always swims, as it were, in a continuum of uncertainty and of indeterminacy". In terms of scientific practice, this means we are obliged to reexamine the assumptions, the evidence, and the arguments for conclusions that subsequent experience has… ▽ More

    Submitted 5 September, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

  7. arXiv:2305.01281  [pdf, other

    stat.ML cs.LG math.NA

    Addressing Parameter Choice Issues in Unsupervised Domain Adaptation by Aggregation

    Authors: Marius-Constantin Dinu, Markus Holzleitner, Maximilian Beck, Hoan Duc Nguyen, Andrea Huber, Hamid Eghbal-zadeh, Bernhard A. Moser, Sergei Pereverzyev, Sepp Hochreiter, Werner Zellinger

    Abstract: We study the problem of choosing algorithm hyper-parameters in unsupervised domain adaptation, i.e., with labeled data in a source domain and unlabeled data in a target domain, drawn from a different input distribution. We follow the strategy to compute several models using different hyper-parameters, and, to subsequently compute a linear aggregation of the models. While several heuristics exist t… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: Oral talk (notable-top-5%) at International Conference On Learning Representations (ICLR), 2023

    Journal ref: International Conference On Learning Representations (ICLR), https://openreview.net/forum?id=M95oDwJXayG, 2023

  8. Inside Out: Transforming Images of Lab-Grown Plants for Machine Learning Applications in Agriculture

    Authors: A. E. Krosney, P. Sotoodeh, C. J. Henry, M. A. Beck, C. P. Bidinosti

    Abstract: Machine learning tasks often require a significant amount of training data for the resultant network to perform suitably for a given problem in any domain. In agriculture, dataset sizes are further limited by phenotypical differences between two plants of the same genotype, often as a result of differing growing conditions. Synthetically-augmented datasets have shown promise in improving existing… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

    Comments: 35 pages, 23 figures

  9. arXiv:2209.03488  [pdf, other

    cs.DC cs.NI

    Exposed Buffer Architecture

    Authors: Micah Beck

    Abstract: The Internet stack is not a complete description of the resources and services needed to implement distributed applications, as it only accounts for communication services and the protocols that are defined to deliver them. This paper presents an account of the current distributed application architecture using a formal model of strictly layered systems, meaning that services in any layer can only… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  10. arXiv:2206.03483  [pdf, other

    cs.LG

    Few-Shot Learning by Dimensionality Reduction in Gradient Space

    Authors: Martin Gauch, Maximilian Beck, Thomas Adler, Dmytro Kotsur, Stefan Fiel, Hamid Eghbal-zadeh, Johannes Brandstetter, Johannes Kofler, Markus Holzleitner, Werner Zellinger, Daniel Klotz, Sepp Hochreiter, Sebastian Lehner

    Abstract: We introduce SubGD, a novel few-shot learning method which is based on the recent finding that stochastic gradient descent updates tend to live in a low-dimensional parameter subspace. In experimental and theoretical analyses, we show that models confined to a suitable predefined subspace generalize well for few-shot learning. A suitable subspace fulfills three criteria across the given tasks: it… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: Accepted at Conference on Lifelong Learning Agents (CoLLAs) 2022. Code: https://github.com/ml-jku/subgd Blog post: https://ml-jku.github.io/subgd

    Journal ref: Proceedings of The 1st Conference on Lifelong Learning Agents, PMLR 199:1043-1064 (2022)

  11. arXiv:2205.10955  [pdf, other

    cs.LG

    Investigating classification learning curves for automatically generated and labelled plant images

    Authors: Michael A. Beck, Christopher P. Bidinosti, Christopher J. Henry, Manisha Ajmani

    Abstract: In the context of supervised machine learning a learning curve describes how a model's performance on unseen data relates to the amount of samples used to train the model. In this paper we present a dataset of plant images with representatives of crops and weeds common to the Manitoba prairies at different growth stages. We determine the learning curve for a classification task on this data with t… ▽ More

    Submitted 30 June, 2022; v1 submitted 22 May, 2022; originally announced May 2022.

  12. arXiv:2204.11300  [pdf

    cs.NI

    Is Universal Broadband Service Impossible?

    Authors: Micah Beck, Terry Moore

    Abstract: Broadband Internet service is widely expected to be the fundamental universal service for the 21st century. But more than a decade of national and international struggles to close the digital divide between broadband haves and have nots suggest that reaching global universality will be a very difficult task. This paper argues that the strong guarantees made by the current broadband paradigm - low… ▽ More

    Submitted 1 June, 2024; v1 submitted 24 April, 2022; originally announced April 2022.

    Comments: Appeared in IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems 2022

  13. arXiv:2203.13691  [pdf, other

    cs.CV cs.AI cs.DB cs.RO

    The TerraByte Client: providing access to terabytes of plant data

    Authors: Michael A. Beck, Christopher P. Bidinosti, Christopher J. Henry, Manisha Ajmani

    Abstract: In this paper we demonstrate the TerraByte Client, a software to download user-defined plant datasets from a data portal hosted at Compute Canada. To that end the client offers two key functionalities: (1) It allows the user to get an overview on what data is available and a quick way to visually check samples of that data. For this the client receives the results of queries to a database and disp… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

  14. arXiv:2108.05789  [pdf, other

    cs.CV cs.AI cs.RO

    Presenting an extensive lab- and field-image dataset of crops and weeds for computer vision tasks in agriculture

    Authors: Michael A. Beck, Chen-Yi Liu, Christopher P. Bidinosti, Christopher J. Henry, Cara M. Godee, Manisha Ajmani

    Abstract: We present two large datasets of labelled plant-images that are suited towards the training of machine learning and computer vision models. The first dataset encompasses as the day of writing over 1.2 million images of indoor-grown crops and weeds common to the Canadian Prairies and many US states. The second dataset consists of over 540,000 images of plants imaged in farmland. All indoor plant im… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

  15. arXiv:2107.12269  [pdf, other

    cs.NI

    Universal Digital Services Through Basic Broadband

    Authors: Micah Beck, Terry Moore

    Abstract: In addressing the universal deployment of digital services it is necessary to decide on the breadth of "universality" and the type of functionality of "digital services". These two decisions are linked: certain desirable functionality does not lend itself to being implemented in some environments or with certain constraints. In this paper we define universality as achieving a level of universality… ▽ More

    Submitted 26 July, 2021; originally announced July 2021.

  16. Using Localized Twitter Activity for Red Tide Impact Assessment

    Authors: A. Skripnikov, N. Wagner, J. Shafer, M. Beck, E. Sherwood, M. Burke

    Abstract: Red tide blooms of the dinoflagellate Karenia brevis (K. brevis) produce toxic coastal conditions that can impact marine organisms and human health, while also affecting local economies. During the extreme Florida red tide event of 2017-2019, residents and visitors turned to social media platforms to both receive disaster-related information and communicate their own sentiments and experiences. Th… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

    Comments: 40 pages,11 figures (27 image files though), 5 tables, submitted to "Harmful Algae"

  17. arXiv:2105.10680  [pdf, other

    cs.NI cs.DC

    Cybercosm: New Foundations for a Converged Science Data Ecosystem

    Authors: Mark Asch, François Bodin, Micah Beck, Terry Moore, Michela Taufer, Martin Swany, Jean-Pierre Vilotte

    Abstract: Scientific communities naturally tend to organize around data ecosystems created by the combination of their observational devices, their data repositories, and the workflows essential to carry their research from observation to discovery. However, these legacy data ecosystems are now breaking down under the pressure of the exponential growth in the volume and velocity of these workflows, which ar… ▽ More

    Submitted 29 June, 2021; v1 submitted 22 May, 2021; originally announced May 2021.

    Comments: Updated author list

    MSC Class: ---

  18. arXiv:2008.00989  [pdf, other

    cs.NI

    Exposed Buffer Architecture for Continuum Convergence

    Authors: Micah Beck, Terry Moore

    Abstract: Exposed Buffer Architecture addresses the problem of creating a programmable service platform for the digital continuum by reexamining the particular form of virtualization that is inherent to the Internet architecture. In the Internet stack below the Network Layer, the Link layer models services that are local to network nodes, or that connect them in local area networks. Aggregating these low le… ▽ More

    Submitted 30 December, 2020; v1 submitted 3 August, 2020; originally announced August 2020.

  19. An embedded system for the automated generation of labeled plant images to enable machine learning applications in agriculture

    Authors: Michael A. Beck, Chen-Yi Liu, Christopher P. Bidinosti, Christopher J. Henry, Cara M. Godee, Manisha Ajmani

    Abstract: A lack of sufficient training data, both in terms of variety and quantity, is often the bottleneck in the development of machine learning (ML) applications in any domain. For agricultural applications, ML-based models designed to perform tasks such as autonomous plant classification will typically be coupled to just one or perhaps a few plant species. As a consequence, each crop-specific task is v… ▽ More

    Submitted 1 April, 2021; v1 submitted 1 June, 2020; originally announced June 2020.

    Comments: 35 pages, 8 figures, Preprint submitted to PLoS One

  20. arXiv:2004.07723  [pdf, other

    cs.CR

    Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services

    Authors: Christiane Kuhn, Martin Beck, Thorsten Strufe

    Abstract: The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile apps for contact tracing. The corresponding apps track individuals and their interactions, to facilitate alerting users of potential infections well before they become infectious themselves. Naive implementation obviously jeopardizes the privacy of health conditions, location, activities, and social interaction of its u… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

  21. arXiv:1910.13772  [pdf, other

    cs.CR

    Breaking and (Partially) Fixing Provably Secure Onion Routing

    Authors: Christiane Kuhn, Martin Beck, Thorsten Strufe

    Abstract: After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties that protocols have to meet to achieve provable security. A whole family of systems based their security proofs on this work. However, analyzing HORNET and Sphinx, two instances from this famil… ▽ More

    Submitted 30 October, 2019; originally announced October 2019.

  22. DuMu$^\text{x}$ 3 -- an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling

    Authors: Timo Koch, Dennis Gläser, Kilian Weishaupt, Sina Ackermann, Martin Beck, Beatrix Becker, Samuel Burbulla, Holger Class, Edward Coltman, Simon Emmert, Thomas Fetzer, Christoph Grüninger, Katharina Heck, Johannes Hommel, Theresa Kurz, Melanie Lipp, Farid Mohammadi, Samuel Scherrer, Martin Schneider, Gabriele Seitz, Leopold Stadler, Martin Utz, Felix Weinhardt, Bernd Flemisch

    Abstract: We present version 3 of the open-source simulator for flow and transport processes in porous media DuMu$^\text{x}$. DuMu$^\text{x}$ is based on the modular C++ framework Dune (Distributed and Unified Numerics Environment) and is developed as a research code with a focus on modularity and reusability. We describe recent efforts in improving the transparency and efficiency of the development process… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    MSC Class: 97N80

  23. arXiv:1902.10171  [pdf, other

    quant-ph cs.ET

    Ground-state energy estimation of the water molecule on a trapped ion quantum computer

    Authors: Yunseong Nam, Jwo-Sy Chen, Neal C. Pisenti, Kenneth Wright, Conor Delaney, Dmitri Maslov, Kenneth R. Brown, Stewart Allen, Jason M. Amini, Joel Apisdorf, Kristin M. Beck, Aleksey Blinov, Vandiver Chaplin, Mika Chmielewski, Coleman Collins, Shantanu Debnath, Andrew M. Ducore, Kai M. Hudek, Matthew Keesan, Sarah M. Kreikemeier, Jonathan Mizrahi, Phil Solomon, Mike Williams, Jaime David Wong-Campos, Christopher Monroe , et al. (1 additional authors not shown)

    Abstract: Quantum computing leverages the quantum resources of superposition and entanglement to efficiently solve computational problems considered intractable for classical computers. Examples include calculating molecular and nuclear structure, simulating strongly-interacting electron systems, and modeling aspects of material function. While substantial theoretical advances have been made in mapping thes… ▽ More

    Submitted 7 March, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 14 pages, 7 figures

  24. arXiv:1901.09858  [pdf, ps, other

    cs.DS cs.CR

    Utility Preserving Secure Private Data Release

    Authors: Jasjeet Dhaliwal, Geoffrey So, Aleatha Parker-Wood, Melanie Beck

    Abstract: Differential privacy mechanisms that also make reconstruction of the data impossible come at a cost - a decrease in utility. In this paper, we tackle this problem by designing a private data release mechanism that makes reconstruction of the original data impossible and also preserves utility for a wide range of machine learning algorithms. We do so by combining the Johnson-Lindenstrauss (JL) tran… ▽ More

    Submitted 14 March, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

  25. arXiv:1812.10422  [pdf

    cs.CY cs.LG stat.ML

    Machine Learning in Official Statistics

    Authors: Martin Beck, Florian Dumpert, Joerg Feuerhake

    Abstract: In the first half of 2018, the Federal Statistical Office of Germany (Destatis) carried out a "Proof of Concept Machine Learning" as part of its Digital Agenda. A major component of this was surveys on the use of machine learning methods in official statistics, which were conducted at selected national and international statistical institutions and among the divisions of Destatis. It was of partic… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  26. arXiv:1812.05638  [pdf, other

    cs.CR

    On Privacy Notions in Anonymous Communication

    Authors: Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard Jorswieck, Thorsten Strufe

    Abstract: Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that capture… ▽ More

    Submitted 16 January, 2019; v1 submitted 13 December, 2018; originally announced December 2018.

  27. arXiv:1810.04971  [pdf, ps, other

    cs.CR

    An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version)

    Authors: Kilian Becher, Martin Beck, Thorsten Strufe

    Abstract: Benchmarking is an important measure for companies to investigate their performance and to increase efficiency. As companies usually are reluctant to provide their key performance indicators (KPIs) for public benchmarks, privacy-preserving benchmarking systems are required. In this paper, we present an enhanced privacy-preserving benchmarking protocol that is based on homomorphic encryption. It en… ▽ More

    Submitted 26 March, 2019; v1 submitted 11 October, 2018; originally announced October 2018.

    Comments: Long version with appendix containing correctness and security proofs as well as details regarding the computational and communication complexity

  28. arXiv:1804.07496  [pdf, ps, other

    cs.DM cs.CC cs.DS

    Planar Steiner Orientation is NP-complete

    Authors: Moritz Beck, Johannes Blum, Myroslav Kryven, Andre Löffler, Johannes Zink

    Abstract: Many applications in graph theory are motivated by routing or flow problems. Among these problems is Steiner Orientation: given a mixed graph G (having directed and undirected edges) and a set T of k terminal pairs in G, is there an orientation of the undirected edges in G such that there is a directed path for every terminal pair in T ? This problem was shown to be NP -complete by Arkin and Hassi… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

  29. arXiv:1707.07739  [pdf, ps, other

    cs.NI

    Technical Report The Stochastic Network Calculator

    Authors: Michael Beck, Sebastian Henningsen

    Abstract: In this technical report, we provide an in-depth description of the Stochastic Network Calculator tool. This tool is designed to compute and automatically optimize performance bounds in queueing networks using the methodology of stochastic network calculus.

    Submitted 24 July, 2017; originally announced July 2017.

  30. arXiv:1706.07519  [pdf, other

    cs.DC

    Interoperable Convergence of Storage, Networking, and Computation

    Authors: Micah Beck, Terry Moore, Piotr Luszczek, Anthony Danalis

    Abstract: In every form of digital store-and-forward communication, intermediate forwarding nodes are computers, with attendant memory and processing resources. This has inevitably stimulated efforts to create a wide-area infrastructure that goes beyond simple store-and-forward to create a platform that makes more general and varied use of the potential of this collection of increasingly powerful nodes. His… ▽ More

    Submitted 17 November, 2018; v1 submitted 22 June, 2017; originally announced June 2017.

    Comments: 15 pages, 5 figures

  31. arXiv:1706.04759  [pdf, other

    cs.CR

    PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols

    Authors: Alexander Senier, Martin Beck, Thorsten Strufe

    Abstract: One single error can result in a total compromise of all security in today's large, monolithic software. Partitioning of software can help simplify code-review and verification, whereas isolated execution of software-components limits the impact of incorrect implementations. However, existing application partitioning techniques are too expensive, too imprecise, or involve unsafe manual steps. An a… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: 9 pages

  32. Qualitative Assessment of Recurrent Human Motion

    Authors: Andre Ebert, Michael Till Beck, Andy Mattausch, Lenz Belzner, Claudia Linnhoff Popien

    Abstract: Smartphone applications designed to track human motion in combination with wearable sensors, e.g., during physical exercising, raised huge attention recently. Commonly, they provide quantitative services, such as personalized training instructions or the counting of distances. But qualitative monitoring and assessment is still missing, e.g., to detect malpositions, to prevent injuries, or to optim… ▽ More

    Submitted 22 November, 2017; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: Published within the proceedings of the 25th European Signal Processing Conference (EUSIPCO) 2017, Kos Island, Greece, IEEE 6 Pages, 5 Figures

  33. arXiv:1701.05403  [pdf, ps, other

    cs.DC cs.CR

    Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing

    Authors: Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe

    Abstract: How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation, and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy guarantees for users, a privacy bound tighter than the stat… ▽ More

    Submitted 5 June, 2017; v1 submitted 19 January, 2017; originally announced January 2017.

  34. arXiv:1611.04426  [pdf, other

    cs.CR

    Quantifying the Information Leak in Cache Attacks through Symbolic Execution

    Authors: Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller

    Abstract: Cache timing attacks allow attackers to infer the properties of a secret execution by observing cache hits and misses. But how much information can actually leak through such attacks? For a given program, a cache model, and an input, our CHALICE framework leverages symbolic execution to compute the amount of information that can possibly leak through cache attacks. At the core of CHALICE is a nove… ▽ More

    Submitted 14 November, 2016; originally announced November 2016.

  35. R package imputeTestbench to compare imputations methods for univariate time series

    Authors: Neeraj Bokde, Kishore Kulat, Marcus W Beck, Gualberto Asencio-Cortés

    Abstract: This paper describes the R package imputeTestbench that provides a testbench for comparing imputation methods for missing data in univariate time series. The imputeTestbench package can be used to simulate the amount and type of missing data in a complete dataset and compare filled data using different imputation methods. The user has the option to simulate missing data by removing observations co… ▽ More

    Submitted 4 November, 2016; v1 submitted 1 August, 2016; originally announced August 2016.

  36. arXiv:1607.07183  [pdf

    cs.NI cs.LO

    On the Hourglass Model

    Authors: Micah Beck

    Abstract: The hourglass model is a widely used as a means of describing the design of the Internet, and can be found in the introduction of many modern textbooks. It arguably also applies to the design of other successful spanning layers, notably the Unix operating system kernel interface, meaning the primitive system calls and the interactions between user processes and the kernel. The impressive success o… ▽ More

    Submitted 31 July, 2016; v1 submitted 25 July, 2016; originally announced July 2016.

    Journal ref: Commun ACM 62 7 (2019) 48-57

  37. arXiv:1601.06119  [pdf, other

    cs.CR

    VOUTE-Virtual Overlays Using Tree Embeddings

    Authors: Stefanie Roos, Martin Beck, Thorsten Strufe

    Abstract: Friend-to-friend (F2F) overlays, which restrict direct communication to mutually trusted parties, are a promising substrate for privacy-preserving communication due to their inherent membership-concealment and Sybil-resistance. Yet, existing F2F overlays suffer from a low performance, are vulnerable to denial-of-service attacks, or fail to provide anonymity. In particular, greedy embeddings allow… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: Extended version to Stefanie Roos, Martin Beck, Thorsten Strufe: 'Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays', Infocom 2016

  38. arXiv:1411.5340  [pdf

    q-bio.NC cs.CV cs.HC

    Affordances Provide a Fundamental Categorization Principle for Visual Scenes

    Authors: Michelle R. Greene, Christopher Baldassano, Andre Esteva, Diane M. Beck, Li Fei-Fei

    Abstract: How do we know that a kitchen is a kitchen by looking? Relatively little is known about how we conceptualize and categorize different visual environments. Traditional models of visual perception posit that scene categorization is achieved through the recognition of a scene's objects, yet these models cannot account for the mounting evidence that human observers are relatively insensitive to the lo… ▽ More

    Submitted 19 November, 2014; originally announced November 2014.

  39. arXiv:1411.5331  [pdf

    cs.CV cs.HC

    Visual Noise from Natural Scene Statistics Reveals Human Scene Category Representations

    Authors: Michelle R. Greene, Abraham P. Botros, Diane M. Beck, Li Fei-Fei

    Abstract: Our perceptions are guided both by the bottom-up information entering our eyes, as well as our top-down expectations of what we will see. Although bottom-up visual processing has been extensively studied, comparatively little is known about top-down signals. Here, we describe REVEAL (Representations Envisioned Via Evolutionary ALgorithm), a method for visualizing an observer's internal representat… ▽ More

    Submitted 19 November, 2014; originally announced November 2014.

  40. arXiv:1410.6295  [pdf, other

    cs.CR

    Enhanced TKIP Michael Attacks

    Authors: Martin Beck

    Abstract: This paper presents new attacks against TKIP within IEEE 802.11 based networks. Using the known Beck-Tews attack, we define schemas to con- tinuously generate new keystreams, which allow more and longer arbitrary packets to be injected into the network. We further describe an attack against the Michael message integrity code, that allows an attacker to concatenate a known with an unknown valid TKI… ▽ More

    Submitted 23 October, 2014; originally announced October 2014.

    Comments: 10 pages, 7 figures. Report was written in 2010, referenced several times in relevant literature

  41. arXiv:1405.0205  [pdf, other

    cs.CR

    Inference Control for Privacy-Preserving Genome Matching

    Authors: Florian Kerschbaum, Martin Beck, Dagmar Schönfeld

    Abstract: Privacy is of the utmost importance in genomic matching. Therefore a number of privacy-preserving protocols have been presented using secure computation. Nevertheless, none of these protocols prevents inferences from the result. Goodrich has shown that this resulting information is sufficient for an effective attack on genome databases. In this paper we present an approach that can detect and miti… ▽ More

    Submitted 1 May, 2014; originally announced May 2014.

    Comments: 20 pages, 4 figures

  42. arXiv:1209.5208  [pdf, other

    cs.CR

    Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity

    Authors: Martin Beck, Florian Kerschbaum

    Abstract: Consider two parties who want to compare their strings, e.g., genomes, but do not want to reveal them to each other. We present a system for privacy-preserving matching of strings, which differs from existing systems by providing a deterministic approximation instead of an exact distance. It is efficient (linear complexity), non-interactive and does not involve a third party which makes it particu… ▽ More

    Submitted 12 February, 2013; v1 submitted 24 September, 2012; originally announced September 2012.

    Comments: 6 pages, 4 figures

  43. arXiv:0710.4763  [pdf

    cs.AR

    Logic Design for On-Chip Test Clock Generation - Implementation Details and Impact on Delay Test Quality

    Authors: Matthias Beck, Olivier Barondeau, Martin Kaibel, Frank Poehl, Xijiang Lin, Ron Press

    Abstract: This paper addresses delay test for SOC devices with high frequency clock domains. A logic design for on-chip high-speed clock generation, implemented to avoid expensive test equipment, is described in detail. Techniques for on-chip clock generation, meant to reduce test vector count and to increase test quality, are discussed. ATPG results for the proposed techniques are given.

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)