Deletions and dishonesty: Probabilistic data structures in adversarial settings
M Filić, K Kocher, E Kummer… - … Conference on the Theory …, 2024 - Springer
Probabilistic data structures (PDS) are compact representations of high-volume data that
provide approximate answers to queries about the data. They are commonplace in today’s …
provide approximate answers to queries about the data. They are commonplace in today’s …
[PDF][PDF] Cuckoo filters in adversarial settings
K Kocher - 2023 - ethz.ch
The Cuckoo filter is a probabilistic data structure for approximate membership queries. The
structure is a space-efficient data store that supports the insertion of elements, deletions, and …
structure is a space-efficient data store that supports the insertion of elements, deletions, and …
Outcomes of ACL Reconstruction Utilizing Supercritical CO2-Sterilized Allografts
Background: Allograft tendons are perceived to have a high ACL graft failure rate in primary
anterior cruciate ligament (ACL) reconstruction (ACLR). Historical series may be biased by …
anterior cruciate ligament (ACL) reconstruction (ACLR). Historical series may be biased by …
2022 IEEE 16th International Conference on Semantic Computing (ICSC)| 978-1-6654-3418-8/22/$31.00© 2022 IEEE| DOI: 10.1109/ICSC52841. 2022.00060
…, BR Kandur Raja, F Keshtkar, G Kismihók, M Kocher… - computer.org
… 201William, Femi 274Wolfe, Robert 91Wu, Wenyan 179Xiao, Yunkai 83Xu, Luxun
217Zhang, Yifan 67Zhao, Keran 257Zhdanov, Pavel 263Zimmermann, A. 201325 …
217Zhang, Yifan 67Zhao, Keran 257Zhdanov, Pavel 263Zimmermann, A. 201325 …
System-level design to detect fault injection attacks on embedded real-time applications
Fault injection attack has been a serious threat to security-critical embedded systems for a
long time, yet existing research ignores addressing of the problem from a system-level …
long time, yet existing research ignores addressing of the problem from a system-level …
Detecting fault injection attacks on embedded real-time applications: A system-level perspective
This paper presents an approach to the synthesis of secure real-time applications mapped
on distributed embedded systems, which focuses on preventing fault injection attacks. We …
on distributed embedded systems, which focuses on preventing fault injection attacks. We …
Documentation of inquiry-based learning: fostering a sense of wonder, curiousity and imagination in the primary years
KM Timothy - 2013 - open.library.ubc.ca
… In her article, “Setting Our Little Sails: Pedagogical Documentation as a Phenomological Act”
(2009) Kocher explained how she came to view pedagogical documentation after attending …
(2009) Kocher explained how she came to view pedagogical documentation after attending …
LSM Trees in Adversarial Environments
H Tirmazi - arXiv preprint arXiv:2502.08832, 2025 - arxiv.org
The Log Structured Merge (LSM) Tree is a popular choice for key-value stores that focus on
optimized write throughput while maintaining performant, production-ready read latencies. …
optimized write throughput while maintaining performant, production-ready read latencies. …
[BOOK][B] Willküren der Brockmänner, eines freyen friesischen Volkes
TD Wiarda - 1820 - books.google.com
Brotmannorum nachher bekannt gewordenen Küren. § . 14. Merks würdiges, diesem Coder
nachgefügtes Verzeichniß der, nach einer ins nern Unruhe auserkannten Brüchen. § . 15. …
nachgefügtes Verzeichniß der, nach einer ins nern Unruhe auserkannten Brüchen. § . 15. …
[PDF][PDF] Beware of Insufficient Redundancy
Fault injection attacks pose a serious threat to cryptographic implementations. Countermeasures
beyond sensors and shields usually deploy some form of redundancy to detect or even …
beyond sensors and shields usually deploy some form of redundancy to detect or even …