Deletions and dishonesty: Probabilistic data structures in adversarial settings

M Filić, K Kocher, E Kummer… - … Conference on the Theory …, 2024 - Springer
Probabilistic data structures (PDS) are compact representations of high-volume data that
provide approximate answers to queries about the data. They are commonplace in today’s …

[PDF][PDF] Cuckoo filters in adversarial settings

K Kocher - 2023 - ethz.ch
The Cuckoo filter is a probabilistic data structure for approximate membership queries. The
structure is a space-efficient data store that supports the insertion of elements, deletions, and …

Outcomes of ACL Reconstruction Utilizing Supercritical CO2-Sterilized Allografts

JE Farey, LJ Salmon, JP Roe… - … Journal of Sports …, 2024 - journals.sagepub.com
Background: Allograft tendons are perceived to have a high ACL graft failure rate in primary
anterior cruciate ligament (ACL) reconstruction (ACLR). Historical series may be biased by …

2022 IEEE 16th International Conference on Semantic Computing (ICSC)| 978-1-6654-3418-8/22/$31.00© 2022 IEEE| DOI: 10.1109/ICSC52841. 2022.00060

…, BR Kandur Raja, F Keshtkar, G Kismihók, M Kocher… - computer.org
… 201William, Femi 274Wolfe, Robert 91Wu, Wenyan 179Xiao, Yunkai 83Xu, Luxun
217Zhang, Yifan 67Zhao, Keran 257Zhdanov, Pavel 263Zimmermann, A. 201325 …

System-level design to detect fault injection attacks on embedded real-time applications

W Jiang, L Wen, K Jiang, X Zhang, X Pan… - ACM Journal on …, 2016 - dl.acm.org
Fault injection attack has been a serious threat to security-critical embedded systems for a
long time, yet existing research ignores addressing of the problem from a system-level …

Detecting fault injection attacks on embedded real-time applications: A system-level perspective

L Wen, W Jiang, K Jiang, X Zhang… - 2015 IEEE 17th …, 2015 - ieeexplore.ieee.org
This paper presents an approach to the synthesis of secure real-time applications mapped
on distributed embedded systems, which focuses on preventing fault injection attacks. We …

Documentation of inquiry-based learning: fostering a sense of wonder, curiousity and imagination in the primary years

KM Timothy - 2013 - open.library.ubc.ca
… In her article, “Setting Our Little Sails: Pedagogical Documentation as a Phenomological Act”
(2009) Kocher explained how she came to view pedagogical documentation after attending …

LSM Trees in Adversarial Environments

H Tirmazi - arXiv preprint arXiv:2502.08832, 2025 - arxiv.org
The Log Structured Merge (LSM) Tree is a popular choice for key-value stores that focus on
optimized write throughput while maintaining performant, production-ready read latencies. …

[BOOK][B] Willküren der Brockmänner, eines freyen friesischen Volkes

TD Wiarda - 1820 - books.google.com
Brotmannorum nachher bekannt gewordenen Küren. § . 14. Merks würdiges, diesem Coder
nachgefügtes Verzeichniß der, nach einer ins nern Unruhe auserkannten Brüchen. § . 15. …

[PDF][PDF] Beware of Insufficient Redundancy

T Bartkewitz, S Bettendorf, T Moos, A Moradi… - tches.iacr.org
Fault injection attacks pose a serious threat to cryptographic implementations. Countermeasures
beyond sensors and shields usually deploy some form of redundancy to detect or even …