Non-Interactive Secure Computation Based on Cut-and-Choose
|
|
- Derrick Cobb
- 5 years ago
- Views:
Transcription
1 Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, and Ben Riva May 14, 2014 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
2 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
3 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Non-interactive computation A single message is sent and a single message received. First Message Second Message Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
4 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Non-interactive computation A single message is sent and a single message received. Practical 6.4 seconds for AES circuit evaluation on a common laptop. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
5 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
6 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
7 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
8 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
9 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
10 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
11 2PC Approaches Outline 1 Overview 2 2PC Approaches Security Definition Semi-honest Malicious 3 Protocol Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
12 2PC Approaches Security Definition Security of 2PC Malicious adversary: might deviate from the protocol Computationally bounded adversary. Security is proved by simulation in Real/Ideal-world paradigm. If an attack can be launched in Real-world, then, Ideal-world will be compromised. Real World Ideal World Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
13 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
14 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
15 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
16 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Inputs as OT Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
17 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Second Message Sends his garbled inputs. Sends the garbled circuit. Sends OT answers corresponding to the Receiver s input. Inputs as OT OT Answers, Garbled Inputs, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
18 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Second Message Sends his garbled inputs. Sends the garbled circuit. Sends OT answers corresponding to the Receiver s input. Receiver Evaluates the circuit. Inputs as OT OT Answers, Garbled Inputs, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
19 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! Interactive Non-interactive Not Practical Asymptotically Efficient Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
20 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
21 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
22 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Cut-and-Choose [Lin13] Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
23 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Can we make Cut-and-Choose 2PC non-interactive? Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Cut-and-Choose [Lin13] Our Approach! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
24 Outline 1 Overview 2 2PC Approaches 3 Protocol Contributions Implementation Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
25 Contributions Contributions Practical NISC with small overhead based on Cut-and-Choose 2PC As efficient as the state of the art [Lin13]. First implementation of NISC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
26 Making Cut-and-Choose Practical Cut-and-Choose Components Checking circuits via Cut-and-Choose. Input consistency. Cheating Recovery. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
27 Cut-and-Choose Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
28 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. instead of Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
29 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
30 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. C&C Choices Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
31 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. Sender opens the selected circuits. C&C Choices Opening For half Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
32 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. Sender opens the selected circuits. Receiver evaluates the other half and returns the majority result. Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
33 Cut-and-Choose Overhead Cost? Adds an extra round (2 messages). At least, an overhead of 3t in computation and communication. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
34 Cut-and-Choose Overhead Cost? Adds an extra round (2 messages). At least, an overhead of 3t in computation and communication. Problem: Sender s Input Consistency Malicious Sender may send different inputs to different circuits. inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
35 Non-interactive Cut-and-Choose Receiver s Message: Same as before C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
36 Non-interactive Cut-and-Choose Receiver s Message: Same as before Sender s Response: Garbled circuits. Circuit openings and garbled inputs as OT response. C&C Choices as OT inputs OT Circuits Opennings Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
37 Non-interactive Cut-and-Choose Receiver s Message: Same as before Sender s Response: Garbled circuits. Circuit openings and garbled inputs as OT response. Receiver s Computation: For each circuit Receives either the opening or the keys for evaluation C&C Choices as OT inputs OT Circuits Opennings Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
38 Input Consistency Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
39 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
40 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
41 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Sender s input consistency: Attack: Sender sends different inputs to different circuits. inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
42 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Sender s input consistency: Attack: Sender sends different inputs to different circuits. Interactive Defense: Different solutions with different costs! State of the art: [MR13] and [ss13] inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
43 NISC Input Consistency Sender Commits to original values. EG 0 i,eg1 i Circ Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
44 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. EG 0 i,eg1 i Circ EG 0 i,j,eg1 i,j j EG 0 i,j,eg1 i,j j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
45 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. EG 0 i,eg1 i Circ EG 0 i,j,eg1 i,j j seed j EG 0 i,j,eg1 i,j j seed j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
46 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. Generates equality proofs. EG 0 i,eg1 i equality proof 1 i,j equality proof 0 i,j Circ EG 0 i,j,eg1 i,j EG 0 i,j,eg1 i,j j seed j equality proof 0 i,j j equality proof 1 i,j seed j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
47 NISC Input Consistency enc( k 1, )=msg 1 j j Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. Generates equality proofs. enc( k 0, )=msg 0 j j EG 0 i,eg1 i equality proof 1 i,j equality proof 0 i,j Circ EG 0 i,j,eg1 i,j EG 0 i,j,eg1 i,j j seed j Hides equality proofs. equality proof 0 i,j j equality proof 1 i,j enc( k0, )=msg 0 j j seed j enc( k1, )=msg 1 j j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
48 NISC Input Consistency First Message: The same as Cut-and-Choose. C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
49 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
50 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. C&C Choices as OT inputs, msg,, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
51 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
52 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. Computation: Opened circuits: Checks commitments. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
53 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. Computation: Opened circuits: Checks commitments. Evaluated circuits: Checks equality. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
54 Cheating Recovery Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
55 Cheating Recovery Goal Reducing the 3t circuit overhead to t for security of 2 t. No majority checking. At least one correct circuit. 3t t 2 t 2 t Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
56 Cheating Recovery The idea: Recover Sender s input two different output wire values. Recoverable?? Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
57 Cheating Recovery With t circuits, input cannot be recovered if all evaluating are the same and correct. Won t punish honest Sender. Not Recoverable Desirable! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
58 Cheating Recovery With t circuits, input cannot be recovered if all evaluating are the same and incorrect. 2 t failure probability. Not Recoverable Not Desirable! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
59 Cheating Recovery (cont.) How? Use extra malicious 2PC [Lin13], on a small circuit. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
60 Cheating Recovery (cont.) How? Use extra malicious 2PC [Lin13], on a small circuit. cost? Extra rounds for the extra 2PC. Small computation and communication overhead for the extra 2PC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
61 NISC cheating recovery First message: Nothing! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
62 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. A, B EG 0, EG 1 i E, F Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
63 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. A, B EG 0, EG 1 i E, F w trapdoor Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
64 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. A, B EG 0, EG 1 i E, F w trapdoor split w j,0 w j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
65 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
66 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. Computation: No cheating learn one w j,b. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
67 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. Computation: No cheating learn one w j,b. Cheating learn both w j,b. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
68 Implementation Implementation Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
69 Implementation Results Experimented on a Linux VM on a laptop 64bit, i7-4650u, 1.70GHz and 5.4GB of RAM. Used only one core. Enabled AES-NI instructions set. AES circuit (with 8,492 non-xor and 25,124 XOR gates). 6.4 seconds Libraries used: JustGarble [BHKR13], OpenSSL, RELIC-toolkit. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
70 Implementation Observations Module or part name Time(sec.) Time(sec.) AES circuit SHA256 circuit First message Second message Receiver s computation Cheating recovery < 0.01 < 0.01 Total time I/O time Figure : For t = 40 Very small Garbling time. Cheating recovery time. Bottlenecks Exponentiations (Elliptic curve multiplication) IO (used file for communications) Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
71 Implementation Observations Module or part name Time(sec.) Time(sec.) AES circuit SHA256 circuit Total time I/O time Non-I/O time Figure : For t = 40 SHA256 garbled circuit size is 10 times larger. Same input size, different output size Resulting in Large increase in IO. Small increase in non-io. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
72 Implementation Thank You! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
73 Implementation References Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher. In IEEE S&P, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, and Amit Sahai. Efficient non-interactive secure computation. In EUROCRYPT, pages Springer-Verlag, Yehuda Lindell. Fast cut-and-choose based protocols for malicious and covert adversaries. In CRYPTO, pages 1 17, Yehuda Lindell and Benny Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. In TCC, pages Springer, Payman Mohassel and Ben Riva. Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In CRYPTO, pages 36 53, Chris Peikert, Vinod Vaikuntanathan, and Brent Waters. A framework for efficient and composable oblivious transfer. In CRYPTO, Abhi Shelat and Chih-Hao Shen. Two-output secure computation with malicious adversaries. In EUROCRYPT, pages Springer, abhi shelat and Chih-hao Shen. Fast two-party secure computation with minimal assumptions. In CCS, pages ACM, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
74 Implementation resources... SHA256 circuit (with 194,083 non-xor gates and 42,029 XOR gates). AES circuit (with 8,492 non-xor and 25,124 XOR gates). Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29
CAAD CTF 2018 Rules June 21, 2018 Version 1.1
CAAD CTF 2018 Rules June 21, 2018 Version 1.1 The organizer will invite 5 teams to participate CAAD CTF 2018. We will have it in Las Vegas on Aug. 10 th, 2018. The rules details are below: 1. Each team
More informationDealing with Dependent Failures in Distributed Systems
Dealing with Dependent Failures in Distributed Systems Ranjita Bhagwan, Henri Casanova, Alejandro Hevia, Flavio Junqueira, Yanhua Mao, Keith Marzullo, Geoff Voelker, Xianan Zhang University California
More informationProvably Secure Camouflaging Strategy for IC Protection
Provably Secure Camouflaging Strategy for IC Protection Meng Li 1 Kaveh Shamsi 2 Travis Meade 2 Zheng Zhao 1 Bei Yu 3 Yier Jin 2 David Z. Pan 1 1 Electrical and Computer Engineering, University of Texas
More informationHierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5
Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5 Random Access Machine, RAM Maybe the standard model of algorithms
More informationThree-Dimensional Ray-Cast Pong
Three-Dimensional Ray-Cast Pong Richard Hughes Elizabeth Power! Overview What is Pong? Traditional Pong is a two-dimensional game that simulates table tennis. The player controls a paddle by moving it
More informationSNARKs with Preprocessing. Eran Tromer
SNARKs with Preprocessing Eran Tromer BIU Winter School on Verifiable Computation and Special Encryption 4-7 Jan 206 G: Someone generates and publishes a common reference string P: Prover picks NP statement
More informationGetting Started with the LabVIEW Toolkit for LEGO MINDSTORMS NXT
Getting Started with the LabVIEW Toolkit for LEGO MINDSTORMS NXT Contents Overview...2 Mass Compiling...2 Building a LabVIEW VI that Runs on the NXT...3 Running a LabVIEW VI on the NXT...4 Building a LabVIEW
More informationArtificial Intelligence for the EChO Mission Scheduler
Artificial Intelligence for the EChO Mission Scheduler Álvaro García Piquer Ignasi Ribas Josep Colomé Institute of Space Sciences (CSIC/IEEC), Barcelona, Spain SCIOPS 2013 September 10 13, 2013 Introduction
More informationUNIVERSITY OF WATERLOO
UNIVERSITY OF WATERLOO Department of Chemical Engineering ChE 524 Process Control Laboratory Instruction Manual January, 2001 Revised: May, 2009 1 Experiment # 2 - Double Pipe Heat Exchanger Experimental
More informationSpacecraft Simulation Tool. Debbie Clancy JHU/APL
FSW Workshop 2011 Using Flight Software in a Spacecraft Simulation Tool Debbie Clancy JHU/APL debbie.clancy@jhuapl.edu 443-778-7721 Agenda Overview of RBSP and FAST Technical Challenges Dropping FSW into
More informationDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Design Strategies for ARX with Provable Bounds: SPARX and LAX Daniel Dinu 1, Léo Perrin 1, Aleksei Udovenko 1, Vesselin Velichkov 1, Johann Großschädl 1, Alex Biryukov 1 1 SnT, University of Luxembourg
More informationQueue analysis for the toll station of the Öresund fixed link. Pontus Matstoms *
Queue analysis for the toll station of the Öresund fixed link Pontus Matstoms * Abstract A new simulation model for queue and capacity analysis of a toll station is presented. The model and its software
More informationReducing Code Size with Run-time Decompression
Reducing Code Size with Run-time Decompression Charles Lefurgy, Eva Piccininni, and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University
More informationCONTROL LOGIC DESCRIPTION DOCUMENT IC-410ND
Configuration # : 41G20F0 CONTROL LOGIC DESCRIPTION DOCUMENT IC-410ND Input/output table: Inputs Qty Outputs Qty Inside Temperature Probe 3 Inflatable Balloon 8 Chimney Temperature Probe 1 Chimney Activator
More informationUsing MATLAB with CANoe
Version 2.0 2017-03-09 Application Note AN-IND-1-007 Author Restrictions Abstract Vector Informatik GmbH Public Document This application note describes the usage of MATLAB /Simulink combined with CANoe.
More informationBasic Autoclave #1 Ideal Gas Law, Inert Gas
11. Autoclaves 40 Overview An autoclave is a high pressure, high temperature hydrometallurgy unit with carefully controlled conditions. In this chapter, we will simulate an autoclave using two different
More informationHydronic Systems Balance
Hydronic Systems Balance Balancing Is Misunderstood Balancing is application of fundamental hydronic system math Balance Adjustment of friction loss location Adjustment of pump to requirements By definition:
More informationImperfectly Shared Randomness in Communication
Imperfectly Shared Randomness in Communication Madhu Sudan Harvard Joint work with Clément Canonne (Columbia), Venkatesan Guruswami (CMU) and Raghu Meka (UCLA). 11/16/2016 UofT: ISR in Communication 1
More informationEEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Wenbing Zhao. Department of Electrical and Computer Engineering
EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline 2 Review of lecture 5 The
More informationC. Mokkapati 1 A PRACTICAL RISK AND SAFETY ASSESSMENT METHODOLOGY FOR SAFETY- CRITICAL SYSTEMS
C. Mokkapati 1 A PRACTICAL RISK AND SAFETY ASSESSMENT METHODOLOGY FOR SAFETY- CRITICAL SYSTEMS Chinnarao Mokkapati Ansaldo Signal Union Switch & Signal Inc. 1000 Technology Drive Pittsburgh, PA 15219 Abstract
More informationOutline. Terminology. EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Steps in Capacity Planning and Management
EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review of lecture 5 The
More informationVLSI Design 12. Design Styles
1 9 8 5 1 9 8 7 1 9 9 1 1 9 9 3 1 9 9 9 2 0 0 1 2 0 0 5 2 0 0 7 2 0 0 9 Pr odu ctiv it y (T r an s./ St a f -M o nt h ) VLSI Design Last module: Floorplanning Sequential circuit design Clock skew This
More informationHW #5: Digital Logic and Flip Flops
HW #5: Digital Logic and Flip Flops This homework will walk through a specific digital design problem in all its glory that you will then implement in this weeks lab. 1 Write the Truth Table (10 pts) Consider
More informationUser manual. PCA EXCEL one4all with corridorfunction PCA T5 ECO lp with corridorfunction TE one4all with corridorfunction
User manual PCA EXCEL one4all with corridorfunction PCA T5 ECO lp with corridorfunction TE one4all with corridorfunction Contents 1 Introduction...2 2 Installation...2 3 Commissioning...3 4 corridorfunction
More informationPhysical Design of CMOS Integrated Circuits
Physical Design of CMOS Integrated Circuits Dae Hyun Kim EECS Washington State University References John P. Uyemura, Introduction to VLSI Circuits and Systems, 2002. Chapter 5 Goal Understand how to physically
More information- 2 - Companion Web Site. Back Cover. Synopsis
Companion Web Site A Programmer's Introduction to C# by Eric Gunnerson ISBN: 1893115860 Apress 2000, 358 pages This book takes the C programmer through the all the details from basic to advanced-- of the
More informationIteration: while, for, do while, Reading Input with Sentinels and User-defined Functions
Iteration: while, for, do while, Reading Input with Sentinels and User-defined Functions This programming assignment uses many of the ideas presented in sections 6 and 7 of the course notes. You are advised
More informationBlocking time reduction for level crossings using the genetic algorithm
Computers in Railways X 299 Blocking time reduction for level crossings using the genetic algorithm Y. Noguchi 1, H. Mochizuki 1, S. Takahashi 1, H. Nakamura 1, S. Kaneko 1 & M. Sakai 2 1 Nihon University,
More informationSoftware Reliability 1
Software Reliability 1 Software Reliability What is software reliability? the probability of failure-free software operation for a specified period of time in a specified environment input sw output We
More informationSUPPLEMENT MATERIALS
SUPPLEMENT MATERIALS This document provides the implementation details of LW-FQZip 2 and the detailed experimental results of the comparison studies. 1. Implementation details of LW-FQZip 2 LW-FQZip 2
More informationAn Architecture for Combined Test Data Compression and Abort-on-Fail Test
An Architecture for Combined Test Data Compression and Abort-on-Fail Test Erik Larsson and Jon Persson Embedded Systems Laboratory Department of Computer and Information Science Linköpings Universitet,
More informationAutomatic Isokinetic Sampler. ST5 Evo
Automatic Isokinetic Sampler ST5 Evo Automatic Isokinetic Sampler ST5 Evo Moreover, in case of pump failure, the CU can work with a spare Dado PU unit or with any pump capable to supply the needed flowrate,
More informationTrack. Track return. Interval protocols. Phosphate Decrement Test (PDT) Modified PDT (10 x 40m on 30)
Track o o o Free timing mode with 1-6 gates (Athletes can run through gates in any order, ideal for complex patterns) Standard timing (2-6 gates, timing intervals) Traffic light sprint (1-6 gates, start
More informationCS 341 Computer Architecture and Organization. Lecturer: Bob Wilson Cell Phone: or
CS 341 Computer Architecture and Organization Lecturer: Bob Wilson Cell Phone: 508-577-9895 Email: robert.wilson@umb.edu or bobw@cs.umb.edu 1 Welcome to CS341 This course teaches computer architecture
More informationScience&Motion. SAM BalanceLab. Sports. control the invisible. Most advanced pressure plate for coaching
SAM BalanceLab Science&Motion Sports control the invisible Most advanced pressure plate for coaching Balance - the invisible key to success Stop the guesswork and start to rely on facts Science and Motion
More informationWell-formed Dependency and Open-loop Safety. Based on Slides by Professor Lui Sha
Well-formed Dependency and Open-loop Safety Based on Slides by Professor Lui Sha Reminders and Announcements Announcements: CS 424 is now on Piazza: piazza.com/illinois/fall2017/cs424/home We must form
More informationFast Software-managed Code Decompression
Fast Software-managed Code Decompression Charles Lefurgy and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University of Michigan, Ann Arbor
More informationSmart Card based application for IITK Swimming Pool management
CS499 End Semester Report Smart Card based application for IITK Swimming Pool management Submitted By: Ankur Mittal Project Guide: Prof. Rajat Moona Introduction In today s world, there is an increasing
More informationA 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder
A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder Rahul Jain 1, Khushboo Singh 2, Ghanshyam Jangid 3 1 Assistant Professor GIT College Jaipur, Rajasthan, India 2 M.Tech Student, Suresh
More informationThe Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization
The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization Ali Khanafer *, Murali Kodialam **, Krishna P. N. Puttaswamy ** * Coordinated Science Laboratory, UIUC ** Bell Laboratories,
More informationStack Height Analysis for FinFET Logic and Circuit
2015 Spring ECE 7332 Stack Height Analysis for FinFET Logic and Circuit Xinfei Guo & Qing Qin May 8 th, 2015 Outline Background & Motivation FinFET Design and Simulation Flow Stack Height Analysis A Case
More informationMPCS: Develop and Test As You Fly for MSL
MPCS: Develop and Test As You Fly for MSL GSAW 2008 Michael Tankenson & Lloyd DeForrest Wednesday April 2, 2008 Copyright 2008 California Institute of Technology. Government sponsorship acknowledged. Mission
More informationA Novel Decode-Aware Compression Technique for Improved Compression and Decompression
A Novel Decode-Aware Compression Technique for Improved Compression and Decompression J. Suresh Babu, K. Tirumala Rao & P. Srinivas Department Of Electronics & Comm. Engineering, Nimra College of Engineering
More informationCommunication Amid Uncertainty
Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan
More informationDSTWU A Shortcut Distillation Model in Aspen Plus V8.0
DSTWU A Shortcut Distillation Model in Aspen Plus V8.0 1. Lesson Objectives Learn how to use DSTWU to start distillation column design. Learn the strengths and limitations of shortcut methods 2. Prerequisites
More informationPROGRAMMING LINX LEARNING GAME
PROGRAMMING LINX LEARNING GAME Linx Overview Linxis a game based on removing colored balls from a moving path by creating chains of three or more of the same color. Players control a firing mechanism (in
More informationLab 4: Root Locus Based Control Design
Lab 4: Root Locus Based Control Design References: Franklin, Powell and Emami-Naeini. Feedback Control of Dynamic Systems, 3 rd ed. Addison-Wesley, Massachusetts: 1994. Ogata, Katsuhiko. Modern Control
More informationA CO 2 Waveform Simulator For Evaluation and Testing of Respiratory Gas Analyzers
2011 ROCKY MOUNTAIN NASA SPACE GRANT CONSORTIUM 1 A CO 2 Waveform Simulator For Evaluation and Testing of Respiratory Gas Analyzers Christina Long, and Joseph Orr, Ph.D. Department of Bioengineering, University
More informationSurfing Interconnect
Surfing Interconnect Mark R. Greenstreet and Jihong Ren University of British Columbia, Rambus Surfing Interconnect p.1/17 Motivation Wires are the problem: Wires scale poorly with feature size: Gate delays
More informationOxygen Meter User Manual
Oxygen Meter User Manual Monday, July 23, 2007 1. Outline...2 2. Program...3 2.1. Environment for program execution...3 2.2. Installation...3 2.3. Un installation...3 2.4. USB driver installation...3 2.5.
More informationChapter 20. Planning Accelerated Life Tests. William Q. Meeker and Luis A. Escobar Iowa State University and Louisiana State University
Chapter 20 Planning Accelerated Life Tests William Q. Meeker and Luis A. Escobar Iowa State University and Louisiana State University Copyright 1998-2008 W. Q. Meeker and L. A. Escobar. Based on the authors
More informationReliability of Safety-Critical Systems Chapter 4. Testing and Maintenance
Reliability of Safety-Critical Systems Chapter 4. Testing and Maintenance Mary Ann Lundteigen and Marvin Rausand mary.a.lundteigen@ntnu.no RAMS Group Department of Production and Quality Engineering NTNU
More informationA Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
The First International Workshop on Cyber-Physical Networking Systems A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems ChrisY.T.Ma Advanced Digital Sciences Center Illinois at Singapore
More informationThe Game of Yinsh (Phase II)
The Game of Yinsh (Phase II) COL333 October 27, 2018 1 Goal The goal of this assignment is to learn the adversarial search algorithms (minimax and alpha beta pruning), which arise in sequential deterministic
More information215 Liquid Handler Up-Grade Manual
BRUKER NMR 220 25 Liquid Handler Up-Grade Manual For Up-Grade to Run with XWINNMR Vers.. Manual # H977 The kit will include: H9770 BEST NMR Up-Grade Kit to No. Article Bruker # Comment 500mm Capillary
More informationTSP at isolated intersections: Some advances under simulation environment
TSP at isolated intersections: Some advances under simulation environment Zhengyao Yu Vikash V. Gayah Eleni Christofa TESC 2018 December 5, 2018 Overview Motivation Problem introduction Assumptions Formation
More informationREPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, , PASS
REPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, TST 00191 REV. A Crystal Group Inc 850 Kacena Rd., Hiawatha, IA Phone: 877 279 7863 Fax: 319 393 2338 9/23/2014 Revision History REV Date Approved Description
More informationA study on the relation between safety analysis process and system engineering process of train control system
A study on the relation between safety analysis process and system engineering process of train control system Abstract - In this paper, the relationship between system engineering lifecycle and safety
More informationSHUFFLE TURN OF HUMANOID ROBOT SIMULATION BASED ON EMG MEASUREMENT
SHUFFLE TURN OF HUMANOID ROBOT SIMULATION BASED ON EMG MEASUREMENT MASANAO KOEDA, TAKAYUKI SERIZAWA, AND YUTA MATSUI Osaka Electro-Communication University, Faculty of Information Science and Arts, Department
More informationSafety Critical Systems
Safety Critical Systems Mostly from: Douglass, Doing Hard Time, developing Real-Time Systems with UML, Objects, Frameworks And Patterns, Addison-Wesley. ISBN 0-201-49837-5 1 Definitions channel a set of
More informationRescue Rover. Robotics Unit Lesson 1. Overview
Robotics Unit Lesson 1 Overview In this challenge students will be presented with a real world rescue scenario. The students will need to design and build a prototype of an autonomous vehicle to drive
More informationModule 3 Developing Timing Plans for Efficient Intersection Operations During Moderate Traffic Volume Conditions
Module 3 Developing Timing Plans for Efficient Intersection Operations During Moderate Traffic Volume Conditions CONTENTS (MODULE 3) Introduction...1 Purpose...1 Goals and Learning Outcomes...1 Organization
More informationCommunication Amid Uncertainty
Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan
More informationSimulation analysis of the influence of breathing on the performance in breaststroke
Available online at www.sciencedirect.com Procedia Engineering 34 (2012 ) 736 741 9 th Conference of the International Sports Engineering Association (ISEA) Simulation analysis of the influence of breathing
More informationPLM & Lake Handbook. Table of Contents. Lake System Overview 3. Firmware & Presets 5. Groups & Overlays 20. File Management 30
PLM & Lake Handbook Table of Contents Lake System Overview 3 1.1 Lake Terminology 3 1.2 PLM signal path 4 Firmware & Presets 5 2.1 Updating Amplifier Firmware 5 2.2 Loading Frame Presets 7 2.3 Recalling
More informationA Semi-Automated Functional Test Data Analysis Tool
A Semi-Automated Functional Test Data Analysis Tool Peng Xu, Philip Haves, Moosung Kim Lawrence Berkeley National Lab Synopsis The growing interest in commissioning is creating a demand that will increasingly
More informationCPE/EE 427, CPE 527 VLSI Design I L21: Sequential Circuits. Review: The Regenerative Property
CPE/EE 427, CPE 527 VLSI esign I L21: Sequential Circuits epartment of Electrical and Computer Engineering University of Alabama in Huntsville Aleksandar Milenkovic ( www.ece.uah.edu/~milenka ) www.ece.uah.edu/~milenka/cpe527-5f
More informationAN-140. Protege WX SALLIS Integration Application Note
AN-140 Protege WX SALLIS Integration Application Note The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology
More informationa quick quiz on cricket & crypto 7 questions in 7 minutes Craig Costello 2014 ECC Rump Session Chennai, India
a quick quiz on cricket & crypto 7 questions in 7 minutes Craig Costello 2014 ECC Rump Session Chennai, India Question 1 The favourite to win next year s cricket world cup is: Question 1 The favourite
More informationInternational Journal of Engineering Trends and Technology (IJETT) Volume 18 Number2- Dec 2014
Compression and Decompression of FPGA Bit Stream Using Bitmask Technique K.Khuresh Gouse 1 N.Chitra 2 K.Maheshwari 3 1 PG Student (M.Tech), 2 Associate Professor, 3 Associate Professor, Dept. of ECE, Gates
More informationVLSI Design I; A. Milenkovic 1
Review: The Regenerative Property V i V o V i V o CPE/EE 47, CPE 57 VLSI esign I : Sequential Circuits epartment of Electrical and Computer Engineering University of labama in Huntsville leksandar Milenkovic
More informationArithmetic Coding Modification to Compress SMS
G8-5 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia Arithmetic Coding Modification to Compress SMS Ario Yudo Husodo #1, Rinaldi Munir *2 #*
More informationbeestanbul RoboCup 3D Simulation League Team Description Paper 2012
beestanbul RoboCup 3D Simulation League Team Description Paper 2012 Baris Demirdelen, Berkay Toku, Onuralp Ulusoy, Tuna Sonmez, Kubra Ayvaz, Elif Senyurek, and Sanem Sariel-Talay Artificial Intelligence
More informationAvailable online at ScienceDirect. Transportation Research Procedia 2 (2014 )
Available online at www.sciencedirect.com ScienceDirect Transportation Research Procedia 2 (2014 ) 264 272 The Conference on in Pedestrian and Evacuation Dynamics 2014 (PED2014) Exhaustive analysis with
More informationiloq H10S3, H10S4 AND H10S5 PADLOCK
1 iloq H10S3, H10S4 AND H10S5 PADLOCK General The patented, award winning iloq S10 locking system offers advanced security and convenient access management for master-key locking environments. The iloq
More informationDevelopment of Fish type Robot based on the Analysis of Swimming Motion of Bluefin Tuna Comparison between Tuna-type Fin and Rectangular Fin -
Development of Fish type Robot based on the Analysis of Swimming Motion of Bluefin Tuna Comparison between Tuna-type Fin and Rectangular Fin - Katsuya KUGAI* Abstract The swimming motion of Tuna type fishes
More informationRacecar Rear Wing Setup Optimization via 2D CFD Simulations
Racecar Rear Wing Setup Optimization via 2D CFD Simulations Simulating Systems Ground Transportation Motorsport Graduate Engineer Test & Development Lotus Cars STAR Global Conference 2014 Vienna Austria
More informationCloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World. Omer
Cloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World Omer Kilic @OmerK omer@erlang-solutions.com Outline Challenges in modern computing systems Heterogeneous computing Co-processors
More informationReconfigurable Computing Lab 01: Traffic Light Controller
Informatik 12 Cauerstr. 11 91058 Erlangen Reconfigurable Computing Lab 01: Traffic Light Controller In this lab, a traffic light controller (see Exercise 1) will be implemented on the Digilent Spartan-3
More informationELE 455/555 Computer System Engineering. Section 2 The Processor Class 4 Pipelining with Hazards
ELE 455/555 Computer System Engineering Section 2 The Processor Class 4 Pipelining with Hazards Overview Simple Datapath 2 tj Overview Pipeline Control 3 tj Data Hazards Data Hazards sub $2,$1,$3 $2 =?
More informationATM 322 Basic Pneumatics H.W.6 Modules 5 7
ATM 322 Basic Pneumatics H.W.6 Modules 5 7 Name: Answer Key Mark: Question I: Write (T) for True and (F) for false sentences. A) For the time dependant process control; Step enabling conditions are generated
More informationJOLLY2. Installation user s manual. 6 different operating modes selectable. version 3.3. DATA TO BE FILLED OUT BY THE INSTALLER (Page 1)
ENGLISH ENGLISH ENGLISH ENGLISH Installation user s manual Warning! electrical scheme modified JANUARY 2005 version 3.3 JOLLY2 DATA TO BE FILLED OUT BY THE INSTALLER (Page 1) 6 different operating modes
More informationKnowledge. Improvement. Success. SAM PuttLab. 3D putt replay module
Knowledge. Improvement. Success. www.scienceandmotion.com SAM PuttLab 3D putt replay module The COMPLETE putting solution Putt training in a new dimension 43% of the golf shots are putts, however, putting
More informationPolynomial DC decompositions
Polynomial DC decompositions Georgina Hall Princeton, ORFE Joint work with Amir Ali Ahmadi Princeton, ORFE 7/31/16 DIMACS Distance geometry workshop 1 Difference of convex (dc) programming Problems of
More informationTeam Description: Building Teams Using Roles, Responsibilities, and Strategies
Team Description: Building Teams Using Roles, Responsibilities, and Strategies Simon Ch'ng and Lin Padgham (schng cs. trait, edu. au) (linpa cs. rrait, edu. au) Department of Computer Science Royal Melbourne
More informationTTL Flash Interface connections
TTL Flash Interface connections Nikon TTL Hot-shoe Interface Gnd = Ground, Earth, Mass, Common. X = X (trigger) contact. Q = Quench or TTL stop. Rdy = Ready to fire SP = Speedlight present (Monitor). The
More informationCONDUITS DST-Tel Aviv-Yafo Case Study
CONDUITS DST-Tel Aviv-Yafo Case Study Introduction The city of Tel Aviv-Yafo is the nucleus of the Tel Aviv metropolitan area and serves as the financial and cultural centre of Israel. With a population
More informationHIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE.
HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE Kazunori Uruma 1, Katsumi Konishi 2, Tomohiro Takahashi 1 and Toshihiro Furukawa 1 1 Graduate School of Engineering, Tokyo University
More informationNeural Network in Computer Vision for RoboCup Middle Size League
Journal of Software Engineering and Applications, 2016, *,** Neural Network in Computer Vision for RoboCup Middle Size League Paulo Rogério de Almeida Ribeiro 1, Gil Lopes 1, Fernando Ribeiro 1 1 Department
More informationOut-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors
Out-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors Ben Chan (Chinese University of Hong Kong) Nina Qian (Chinese University of Hong Kong) Mentors: Ed D Azevedo (ORNL) Shiquan
More informationAn approach for optimising railway traffic flow on high speed lines with differing signalling systems
Computers in Railways XIII 27 An approach for optimising railway traffic flow on high speed lines with differing signalling systems N. Zhao, C. Roberts & S. Hillmansen Birmingham Centre for Railway Research
More informationBWS is a Bitcoin-based community-centric crypto currency with a focus on
BWS Team Page 1 BWS is a Bitcoin-based community-centric crypto currency with a focus on decentralization, privacy, and real-world use. It utilizes an energy efficient Proof of Stake protocol and a second-tier
More informationRoboCup Soccer Simulation League 3D Competition Rules and Setup for the 2011 competition in Istanbul
RoboCup Soccer Simulation League 3D Competition Rules and Setup for the 2011 competition in Istanbul V. 1.0 June 2011 Table of Contents 1. Introduction...2 2. Tournament Format...3 3. Schedule...4 4. Hardware
More informationProfile-driven Selective Code Compression
Profile-driven Selective Code Compression Yuan Xie and Wayne Wolf Electrical Engineering Department Princeton University Princeton, NJ 08540, USA yuanxie,wolf@ee.princeton.edu Haris Lekatsas NEC USA 4
More informationHow a championshipwinning. cut engineering cycles by 30% Advanced project management software speeds performance improvements to the track.
TEAM PENSKE How a championshipwinning race team cut engineering cycles by 30% Advanced project management software speeds performance improvements to the track. CHALLENGE SOLUTION RESULTS View Overview
More informationXC2 Client/Server Installation & Configuration
XC2 Client/Server Installation & Configuration File downloads Server Installation Backup Configuration Services Client Installation Backup Recovery Troubleshooting Aug 12 2014 XC2 Software, LLC Page 1
More informationEducation and Research
Richard Wall University of Idaho http://www.ece.uidaho.edu/ee/digital/rwall/research/transportation/niatt.html edu/ee/digital/rwall/research/transportation/niatt html 1 Presentations Summary of activities
More informationBUYER S GUIDE AQUAlogger 530WTD
OCEAN & ENVIRONMENTAL BUYER S GUIDE AQUAlogger 530WTD Wireless Temperature and Depth Logger AQUAlogger 530WTD The AQUAlogger 530WTD has an innovative design that includes the ability to transfer stored
More informationCardiac Output Simulation for Specific Makes of Monitor. Each injection yields in a time-temperature curve whose area represents the cardiac output:
Cardiac Output Simulation for Specific Makes of Monitor Theory The measurement of the volume of blood pumped by the heart is a valuable diagnostic tool in the management of patients undergoing major cardiovascular
More informationDesigning Mechanisms for Reliable Internet-based Computing
Designing Mechanisms for Reliable Internet-based Computing Chryssis Georgiou University of Cyprus, Cyprus Antonio Fernandez Miguel Mosteiro Universidad Rey Juan Carlos, Spain Trustworthy Network Computing
More information