


default search action
Tiny Transactions on Computer Science, Volume 2
Volume 2, 2013
- Vijay Chidambaram
:
Is Ordering of Disk Updates Required to Maintain File-System Crash-Consistency? - Pinar Tözün
, Ippokratis Pandis:
Smart Thread Scheduling is the Key for OLTP. - Mike Dodds, Mark Batty, Alexey Gotsman:
C/C++ Causal Cycles Confound Compositionality.
- Anshul Kundaje, Sofia Kyriazopoulou-Panagiotopoulou, Max W. Libbrecht, Cheryl L. Smith, Debasish Raha, Elliott E. Winters, Steven M. Johnson, Michael P. Snyder, Serafim Batzoglou, Arend Sidow:
Clustering reveals ubiquitous heterogeneity and asymmetry of genomic signals at functional elements. - Alexei Lisitsa:
First-order theorem proving in the exploration of Andrews-Curtis conjecture. - Jon Crowcroft, Gerard Briscoe:
Towards Provable Remote Data Deletion Through Quantum Entanglement.
- Alejandro Bellogín, Pablo Castells, Iván Cantador:
Predicting Recommender System Performance from an Information Retrieval Perspective. - Robin L. Hill, Anna Dickinson, John L. Arnott:
Experienced old eyes can look young in HCI research. - Robin L. Hill, Wayne S. Murray:
Punctuation has a point, so use it! - Edy Portmann:
A Restriction-Centered Theory of Reasoning and Computation to materialize a Web 3.0. - Sangjin Han, Aurojit Panda, Sylvia Ratnasamy:
HW Databases, Where art Thou?
- George Porter:
See straight through data center bandwidth limitations with X-Rays. - Ravi Bhoraskar:
Using MOOCs as a global testbed for network measurement. - Will Scott, Sujit Packiaraj, Arvind Krishnamurthy:
Detecting DNS Censorship without an internal vantage point.
- Matthias Lange:
Securing Two-factor Authentication for Smartphones in a Usable Way by Adding a Connected Token. - Antonio Davoli:
Don't show your hand: on the security leakages of *BFT systems. - Bernard Butler, Brendan Jennings:
How soon can you decide whether Alice is permitted to communicate or share resources with Bob? - Amy Tang, Ashwin Rao, Justine Sherry, David R. Choffnes:
Android Apps: What are they doing with your precious Internet?
- Sasa Petrovic, Miles Osborne, Victor Lavrenko:
Recency is good: expanding with fresh news improves event detection in Twitter. - Bogdan Vasilescu, Andrea Capiluppi, Alexander Serebrenik:
Men at work: the StackOverflow case. - Rammohan Narendula:
Exploiting User Behaviors from Today's Online Social Networks to Build Distributed Alternatives. - Rammohan Narendula:
The Case of Coopetition: Facebook and Decentralized Alternatives.
- Eric Bouwers:
The next step in software metrics research. - Roberto Bruni, Andrea Corradini, Fabio Gadducci, Alberto Lluch-Lafuente, Andrea Vandin:
Adaptation is a Game. - Jos Kraaijeveld:
Applying existing software metrics to development release cycles.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.