scispace - formally typeset
Search or ask a question
Institution

Helsinki Institute for Information Technology

FacilityEspoo, Finland
About: Helsinki Institute for Information Technology is a facility organization based out in Espoo, Finland. It is known for research contribution in the topics: Population & Bayesian network. The organization has 630 authors who have published 1962 publications receiving 63426 citations.


Papers
More filters
Proceedings Article
30 Jul 2005
TL;DR: The purpose of this paper is to significantly improve the time complexity of the Normalized Maximum Likelihood criterion by using the discrete Fourier transform and the convolution theorem.
Abstract: Stochastic complexity of a data set is defined as the shortest possible code length for the data obtainable by using some fixed set of models. This measure is of great theoretical and practical importance as a tool for tasks such as model selection or data clustering. In the case of multinomial data, computing the modern version of stochastic complexity, defined as the Normalized Maximum Likelihood (NML) criterion, requires computing a sum with an exponential number of terms. Furthermore, in order to apply NML in practice, one often needs to compute a whole table of these exponential sums. In our previous work, we were able to compute this table by a recursive algorithm. The purpose of this paper is to significantly improve the time complexity of this algorithm. The techniques used here are based on the discrete Fourier transformand the convolution theorem.

13 citations

Proceedings ArticleDOI
07 May 2011
TL;DR: There is nothing wrong with the attitude of user-centered design which has probably been present in all major innovations down the centuries, but the practice of UCD in HCI lacks attention to business factors and long term uptake of technology in society.
Abstract: The user-centered design (UCD) process in HCI has recently been criticized for not delivering breakthrough innovations in technology. In this paper we consider this critique through a literature review and two case studies of innovation. Our conclusions suggest that there is nothing wrong with the attitude of user-centered design which has probably been present in all major innovations down the centuries. Rather, the practice of UCD in HCI lacks attention to business factors and long term uptake of technology in society. This compromises its impact on products and should be incorporated into the study of HCI itself.

13 citations

Journal ArticleDOI
TL;DR: In this article, it is shown that the k-core decomposition is also a factor-2 approximation to the optimal locally dense decomposition, however, as demonstrated by their experimental evaluation, in practice k-cores have different structure than locally dense subgraphs, and as predicted by the theory, K-core are not always well-aligned with graph density.
Abstract: Decomposing a graph into a hierarchical structure via k-core analysis is a standard operation in any modern graph-mining toolkit. k-core decomposition is a simple and efficient method that allows to analyze a graph beyond its mere degree distribution. More specifically, it is used to identify areas in the graph of increasing centrality and connectedness, and it allows to reveal the structural organization of the graph. Despite the fact that k-core analysis relies on vertex degrees, k-cores do not satisfy a certain, rather natural, density property. Simply put, the most central k-core is not necessarily the densest subgraph. This inconsistency between k-cores and graph density provides the basis of our study. We start by defining what it means for a subgraph to be locally dense, and we show that our definition entails a nested chain decomposition of the graph, similar to the one given by k-cores, but in this case the components are arranged in order of increasing density. We show that such a locally dense decomposition for a graph Ge(V,E) can be computed in polynomial time. The running time of the exact decomposition algorithm is O(vVv2vEv) but is significantly faster in practice. In addition, we develop a linear-time algorithm that provides a factor-2 approximation to the optimal locally dense decomposition. Furthermore, we show that the k-core decomposition is also a factor-2 approximation, however, as demonstrated by our experimental evaluation, in practice k-cores have different structure than locally dense subgraphs, and as predicted by the theory, k-cores are not always well-aligned with graph density.

13 citations

Proceedings ArticleDOI
26 Oct 2015
TL;DR: Two group key establishment protocols for secure multicast communications among resource-constrained devices in IoT are developed and analyzed and justified by performance and security analysis.
Abstract: Wireless Sensor Network (WSN) is a fundamental technology of the Internet of Things (IoT). Group communications in the form of broadcasting and multicasting incur efficient message deliveries among resource-constrained sensors in IoT-enabled WSNs. Secure and efficient key management is significant to protect the authenticity, integrity, and confidentiality of multicast messages. This paper develops two group key establishment protocols for secure multicast communications among resource-constrained devices in IoT. The applicability of the two protocols are analyzed and justified by performance and security analysis.

13 citations

Proceedings ArticleDOI
09 Jul 2007
TL;DR: This paper covers the approach to implement XML security specifications on mobile devices that allows efficient single-pass processing of XML encryption and signatures and proposes extensions to security specifications to better take into account the needs of mobile devices.
Abstract: The population of mobile devices capable of participating in the Internet has increased dramatically in the last few years. To include this population into the Web service world requires support for the most important features, in particular security at the message level. This paper covers our approach to implement XML security specifications on mobile devices that allows efficient single-pass processing of XML encryption and signatures. Furthermore, we propose extensions to security specifications to better take into account the needs of mobile devices. We demonstrate the performance of our implementation, as well as our proposed extensions, through experiments, carried out in a real mobile environment.

12 citations


Authors

Showing all 632 results

NameH-indexPapersCitations
Dimitri P. Bertsekas9433285939
Olli Kallioniemi9035342021
Heikki Mannila7229526500
Jukka Corander6641117220
Jaakko Kangasjärvi6214617096
Aapo Hyvärinen6130144146
Samuel Kaski5852214180
Nadarajah Asokan5832711947
Aristides Gionis5829219300
Hannu Toivonen5619219316
Nicola Zamboni5312811397
Jorma Rissanen5215122720
Tero Aittokallio522718689
Juha Veijola5226119588
Juho Hamari5117616631
Network Information
Related Institutions (5)
Google
39.8K papers, 2.1M citations

93% related

Microsoft
86.9K papers, 4.1M citations

93% related

Carnegie Mellon University
104.3K papers, 5.9M citations

91% related

Facebook
10.9K papers, 570.1K citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
20224
202185
202097
2019140
2018127