Institution
Helsinki Institute for Information Technology
Facility•Espoo, Finland•
About: Helsinki Institute for Information Technology is a facility organization based out in Espoo, Finland. It is known for research contribution in the topics: Population & Bayesian network. The organization has 630 authors who have published 1962 publications receiving 63426 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: An independent factor model is developed, which has the unique capability to isolate the former as an independent discrete binary noise factor, which forms the basis of inferring missed presences by means of denoising in a probabilistic formalism.
37 citations
••
18 Nov 2010TL;DR: This work presents an algorithm for obtaining partial but in the large sample limit correct information about pairwise total causal effects in linear non-Gaussian acyclic models with hidden variables.
Abstract: Causal relationships among a set of observed variables are often modeled using directed acyclic graph (DAG) structures, and learning such structures from data is known as the causal discovery problem. We here consider the learning of linear non-Gaussian acyclic models [9] with hidden variables [5]. Estimation of such models is computationally challenging and hence only possible when the number of variables is small. We present an algorithm for obtaining partial but in the large sample limit correct information about pairwise total causal effects in such a model. In particular, we obtain consistent estimates of the total effects for all variable pairs for which there exist an unconfounded superset of observed variables. Simulations show that the estimated pairwise total effects are good approximations of the true total effects.
37 citations
•
01 Jan 2019TL;DR: In this article, the authors use pointer authentication (PA) to build novel defenses against various classes of run-time attacks, including the first PA-based mechanism for data pointer integrity.
Abstract: Run-time attacks against programs written in memory-unsafe programming languages (e.g., C and C++) remain a prominent threat against computer systems. The prevalence of techniques like return-oriented programming (ROP) in attacking real-world systems has prompted major processor manufacturers to design hardware-based countermeasures against specific classes of run-time attacks. An example is the recently added support for pointer authentication (PA) in the ARMv8-A processor architecture, commonly used in devices like smartphones. PA is a low-cost technique to authenticate pointers so as to resist memory vulnerabilities. It has been shown to enable practical protection against memory vulnerabilities that corrupt return addresses or function pointers. However, so far, PA has received very little attention as a general purpose protection mechanism to harden software against various classes of memory attacks. In this paper, we use PA to build novel defenses against various classes of run-time attacks, including the first PA-based mechanism for data pointer integrity. We present PARTS, an instrumentation framework that integrates our PA-based defenses into the LLVM compiler and the GNU/Linux operating system and show, via systematic evaluation, that PARTS provides better protection than current solutions at a reasonable performance overhead
37 citations
••
07 May 2011TL;DR: In the present outdoor study, subjects did building-selection tasks in an urban area and the proposed two-component Fitts' law model provided a good fit with laboratory data, but it is not known if it generalizes to real-world AR tasks.
Abstract: Rohs and Oulasvirta (2008) proposed a two-component Fitts' law model for target acquisition with magic lenses in mobile augmented reality (AR) with 1) a physical pointing phase, in which the target can be directly observed on the background surface, and 2) a virtual pointing phase, in which the target can only be observed through the device display. The model provides a good fit (R2=0.88) with laboratory data, but it is not known if it generalizes to real-world AR tasks. In the present outdoor study, subjects (N=12) did building-selection tasks in an urban area. The differences in task characteristics to the laboratory study are drastic: targets are three-dimensional and they vary in shape, size, z-distance, and visual context. Nevertheless, the model yielded an R2 of 0.80, and when using effective target width an R2 of 0.88 was achieved.
37 citations
••
TL;DR: This paper addresses appropriation from the other direction, drawing from ecological psychology and focusing on cognitive processes in context, highlighting the need to study how schemata are put into use and how they evolve through new interpretations.
Abstract: Appropriation refers to the processes that take place when new uses are invented for tools and when these uses develop into practices and start spreading within a user community. Most research in human–computer interaction and computersupported cooperative work to date has studied this phenomenon from a social sciences approach, thus focusing on the practice side of the phenomenon. This paper addresses appropriation from the other direction, drawing from ecological psychology and focusing on cognitive processes in context. Appropriation from this perspective is understood as an interpretation process in which the user perceives in a tool a new opportunity for action, thus acquiring a new mental usage schema that complements the existing uses. This approach highlights the need to study how schemata are put into use and how they evolve through new interpretations. Ensuing research questions are presented together with three strategies of applying the new approach in system design.
37 citations
Authors
Showing all 632 results
Name | H-index | Papers | Citations |
---|---|---|---|
Dimitri P. Bertsekas | 94 | 332 | 85939 |
Olli Kallioniemi | 90 | 353 | 42021 |
Heikki Mannila | 72 | 295 | 26500 |
Jukka Corander | 66 | 411 | 17220 |
Jaakko Kangasjärvi | 62 | 146 | 17096 |
Aapo Hyvärinen | 61 | 301 | 44146 |
Samuel Kaski | 58 | 522 | 14180 |
Nadarajah Asokan | 58 | 327 | 11947 |
Aristides Gionis | 58 | 292 | 19300 |
Hannu Toivonen | 56 | 192 | 19316 |
Nicola Zamboni | 53 | 128 | 11397 |
Jorma Rissanen | 52 | 151 | 22720 |
Tero Aittokallio | 52 | 271 | 8689 |
Juha Veijola | 52 | 261 | 19588 |
Juho Hamari | 51 | 176 | 16631 |