What if you could run untrusted code and still be able to sleep at night, safe and sound?
Disclaimer: our award-winning work [1] can only calm your unsafe-software related fears; we recommend complementing this by additionally checking for monsters under your bed, and leaving …
Figure 1: diagram showing the code conversion process in a distributed storage system.
Today’s society is data-driven, and many of the applications that society relies on require storing ever-increasing amounts of data.
To this end, distributed storage systems have become the …
The physicist’s method is a powerful framework for cost analysis that
many a computer scientist will learn at some point in their undergraduate career.
However, its high-level description leaves some practical gaps, especially concerning
how to actually bookkeep its finer details…
As machine learning systems become increasingly implemented in safety-critical applications, such as autonomous driving and healthcare, we need to ensure these systems are reliable and trustworthy. For example, we might wish to determine whether a car’s camera-based autopilot sys…
This blog post is based on a research paper with the same title, authored by Anilesh Krishnaswamy, Haoming Li, David Rein, Hanrui Zhang, and Vincent Conitzer, published at AAAI 2021.
TL;DR: We investigate a classification problem where each data point being classified is controll…
An extended version of this post appears on my personal site.
Suppose you’re building a collaborative app, along the lines of Google Docs/Sheets/Slides, Figma, Notion, etc., but without a central server. One challenge you’ll face is the actual collaboration: when one user cha…
Blockchains are a powerful technology which allow decentralized agreement with an immutable history. Since transactions can be added, but not removed, blockchains allow distributed banking as a trustworthy alternative to central banking.
A vast amount of cryptographic research on…
Many social-media and Internet-of-Things services have large numbers of tiny objects, each a few hundred bytes or less.
For example, edges in Facebook’s social graph, which are needed to connect friends, posts, and images among other content, average under 100 bytes.
Twitter twee…
This blog post is adapted from the Delphi blog, originally published on March 10th, 2021. Again, thank you to the Allegheny County Health Department, the DELPHI Group, Chris Scott, and Roni Rosenfeld.
One of the Delphi Group’s goals is to create informative tools for healthcare o…
This is the first post being made to the CSD PhD blog, testing out the
system. And so, indeed, hello world!
That’s really all there is to this
post. You don’t need to keep reading. I just have to fill this space so
that the preview of this post is filled up. That way when it re…