Posts by Collection

publications

Asynchronus Authentication

Published in , 1900

If the communication between the user and the authenticator is asynchronous, every authentication mechanism is dominated by one defined by a monotonic Boolean function based on credential availability. A scenario-based greedy algorithm can approximate optimal mechanisms by focusing on the most likely scenarios, and surprisingly, even weak credentials can significantly enhance security when used strategically.

Download Paper

Executing Instructions in Situated Collaborative Interactions

Published in , 1900

A collaborative natural language instruction-following game designed to study human-system collaboration. The game, enables exploring how users adapt to system capabilities and how systems recover from errors. It provides insights into improving interaction between users and systems in dynamic, task-driven environments.

Using Deep Neural Networks and Derivative Free Optimization to Accelerate Coverage Closure

Published in , 1900

In optimization tasks where functions are noisy and derivatives are unavailable, incorporating deep neural networks as surrogate models can significantly speed up derivative-free optimization (DFO) methods. This approach, applied to Coverage Directed Generation, leads to faster optimization and fewer simulations, reducing computation time by up to 48%.