DOC PREVIEW
UVA CS 1120 - GuardRails, Big Data, and Secure Computation

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

University of Virginia 2 December 2011 cs1120: Introduction of Computing Explorations in Language, Logic, and Machines Class 40: GuardRails, Big Data, and Secure Computation Upcoming (Remaining!) Schedule • Today, 5:00pm: Last chance to request time to present your PS8 in class. Send an email (cc:ing all your team members) that explains briefly what you would like to do and how much time you think you need. There will be an Internet-connected PC you can use, and I will provide paper plates and plastic forks; if there is anything else you need for your presentation, let me know. • The last regularly scheduled office hours are this Sunday (1-6pm in Davis Commons). If you need to meet with me, I will be available briefly after class Monday, but traveling the rest of the week. • Monday’s class will be your PS8 presentations. You are welcome and encouraged to invite friends who are not in the class to come to this, and I’ve heard rumors that there may be cakes, games, gingerbread, songs, and brownies that they will enjoy. • Monday, 5 December (7:59pm): PS8, Final Submission due • Monday, 12 December (1:00pm): Final Exam due Turning in Problem Set 8 For Option J, just create a zip file of your aazda/src directory that includes all the files you edited and your answers. Submit this using the Alonzo-bot server. For Option C/W, submit your artifact by posting a comment to the “PS8 Submissions” post on the course site. Your post should include: (a) a full list of your team (normal names, not email IDs) (b) a description of your target audience (c) the actual artifact, or a link to it. If it is not possible to post your actual artifact (e.g., it uses a medium such as cake that cannot be easily transmitted over HTTP), you should instead post a description of your artifact (including pictures is usually a good idea). (d) if necessary, a poetic license statement. If there is anything in your artifact that you are aware is not completely correct technically, you may include a statement explaining where you took poetic license. GuardRails: A Secure Web Application Framework Jonathan Burket (BACS and Physics 2013) http://guardrails.cs.virginia.edu [email protected] Why are most web applications created using web application frameworks? Why is it dangerous to allow untrusted users to inject scripts (code) into web pages delivered to other users? How is a source-to-source translator (like GuardRails) similar to and different from an interpreter? Would it have been possible to implement MemoCharme from PS7 as a Charme-to-Charme source-to-source translator instead of by modifying the Charme interpreter?Modeling HVAC Systems Virginia Smith (BACS and Math 2012) [email protected] Scientific Computing: A field that studies numerical computation techniques, algorithms, and mathematical models in order to analyze and solve scientific problems. Data Mining: The process of analyzing/finding patterns among large quantities of data. What is “big data”? What does machine learning mean? Can machines really learn? Secure Computation using Smartphones Peter Chapman (BACS and Cognitive Science 2012) http://www.MightBeEvil.com http://www.cs.virginia.edu/sca What is the goal of secure computation? What are some interesting applications of secure computation on smartphones? Do you want your genome on your smartphone? Why is it hard to do secure computation on


View Full Document

UVA CS 1120 - GuardRails, Big Data, and Secure Computation

Download GuardRails, Big Data, and Secure Computation
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view GuardRails, Big Data, and Secure Computation and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view GuardRails, Big Data, and Secure Computation 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?