Colloquium Archive

Java: It's Better Than You Think, For Reasons You Haven't Realized You Already Know

William Grosso, Mountain View

03/20/2003

In this talk, the speaker will draw upon his past experience as chair of SDForum's Java SIG (www.sdforum.org/sigs/java) and his current role as the chair of SD Forum's Emerging Technology SIG (www.sdforum.org/sigs/emerging) to explain why beginning and intermediate programmers should learn Java, why most (practical) software innovations over the next few years will involve programs written in Java, and why programmers using Java-based systems are going to reinvent the internet overthe next 5 years.

Luby-Rackoff Ciphers Over Finite Algebraic Structures Or Why Xor Is Not So Exclusive

Zully Ramzan, IP Dynamics, Campbell

03/27/2003

Luby and Rackoff showed how to construct pseudo-random permutations from pseudo-random functions; their paper formalized the concept of a secure block cipher. Their goal was to understand what makes the U.S. Data Encryption Standard (DES) secure. The technique is based on composing several Feistel permutations. The Feistel permutation, a fundamental building block of DES, involves applying a so-called round function to the right half of the input and taking the XOR with the left half of theinput. We consider the question of what happens when operations other than the XORare applied. In particular, we engage in a study of Luby-Rackoff ciphers when the operation in the underlying Feistel network is addition over an arbitrary finite algebraic structure. We obtain the following results: We construct a Luby-Rackoff cipher which can be easily broken when XOR is used, but is secure against adaptive chosen plaintextand ciphertext attacks when addition in finite groups of characteristic greater than 2 are considered. This cipher has better time/space complexity and uses fewer random bits than all previously considered Luby-Rackoff ciphers. We show that our construction is tight when operations are performed over a finite field, and a minor relaxation in one ofthe requirements results in it being insecure, though the attack here is non-obvious. We examine various other Luby-Rackoff ciphers known to be insecure under XOR. In some cases, we can break these ciphers over arbitrary Abelian groups --- though we have to employ new more complex techniques. In other cases, however, the security remains an open problem. This talk is based on joint work with Sarvar Patel and Ganesh Sundaram of Lucent Technologies/Bell Labs, and appeared in SAC 2002.

Informatics And Visualization Tools For Pharmacogenetics Research

Tom Ferrin, University of California, San Francisco

04/03/2003

Genetic variation among individuals can play a critical role in their response to drugtherapy. Dosage levels that provide good efficacy in one individual may produce toxic effects in another, or may have little therapeutic effect at all. Understanding and predicting individual drug response will become increasing important in the future and requires the analysis of large amounts of genomic information. This talk will describe one of the current studies underway in this area and discuss the types of data analysis and visualization required to elucidate the pharmacogenetics of a class of proteins known as membrane transporters.

Trench-Based Practical Tips For Creative Solutions To Vexatious Programming Perplexities

Don L. Jewett , Abratech Corp., Sausalito

04/17/2003

Creative solutions to difficult problems are often retrospectively honored in our society (when the solution works). But there is also a mystery that seems to surround the process, and many think one must passively wait for inspiration to "strike". Many examples abound that show the Steps to creativity can be enhanced and even manipulated, and the examples come from programming, and from science. This talk is about those examples, and the generalizations that can be derived from them. One generalization: Very high intelligence is not a requisite, but there is one behavioral traitthat is absolutely necessary.

Inside Computer Game Development

Jason Shankel, Maxis Corp., Walnut Creek

04/24/2003

The computer game industry is a hybrid of two very different fields: technology and entertainment. In this talk, I will describe how a typical computer game evolves from the concept stage, through development, and finally to the marketplace, with special emphasis on how game developers deal with the many conflicts that arise between the technological and the entertainment requirements of a game.

Pages