We present methods to answer two basic questions that arise when benchmarking optimization algorithms. The first one is: which algorithm is the `best' one? and the second one:...
We describe Glosser, a system that supports students in writing essays by 1) scaffolding their reflection with trigger questions, and 2) using text mining techniques to provide co...
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
— Tuning a system to an operating environment calls for experimentation, and a question that arises naturally is: how many experiments are needed to come up with a system meeting...
Abstract. Loosely speaking, an interactive proof is said to be zeroknowledge if the view of every “efficient” verifier can be “efficiently” simulated. An outstanding open ...