


default search action
Tiny Transactions on Computer Science, Volume 3
Volume 3, 2015
- Jade Alglave, Luc Maranget, Daniel Poetzl, Tyler Sorensen:
I compute, therefore I am (buggy): methodic doubt meets multiprocessors. - Byron Cook, Carsten Fuhs, Kaustubh Nimkar, Peter W. O'Hearn:
Embracing Overapproximation for Proving Nontermination. - Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure.
- Alejandro Bellogín, Alan Said:
The Not-so-Magic Magic Barrier of Recommender Systems. - Vineet Kumar:
Sarcasm Detection: Beyond Machine Learning Algorithms. - Shervin Malmasi:
Discriminating Similar Languages: Persian and Dari. - Alan Said, Alejandro Bellogín:
Non-transparent recommender system evaluation leads to misleading results. - Vikrant Yadav, Faisal Khan:
Handling Information Overload: Automatic Generation of Wikipedia Articles.
- George Roussos:
Tiny Location Fingerprints Uniquely Identify Individuals.
- Johanna Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates. - Nicole Borrelli:
KISS On My List: Improving Platform Security and User Privacy by Simplifying the Android Permissions Model. - Ethan Heilman:
Preimage Attacks Against Spectral Hash and PTX Functions.
- Markus Borg, Leif Jonsson:
The More the Merrier: Leveraging on the Bug Inflow to Guide Software Maintenance. - Rodrigo R. G. Souza, Christina Chavez, Roberto Almeida Bittencourt:
On Integration Repositories, Build Sheriffs, and Patch Backouts.
- Jiuyue Ma, Xiufeng Sui, Yupeng Li, Zihao Yu, Bowen Huang, Yungang Bao:
Supporting Differentiated Services in Computers via Networking Technologies. - Zubair Nabi:
Stream Processing Systems Have Arrived at the Big Data Party. But Where Are All the Benchmarks? - Jatinder Singh:
The role of reconfigurable, policy-based middleware in supporting the Internet of Things.
- Philip Bille:
On Regular Expression Matching and Deterministic Finite Automata. - Edy Portmann:
Cognitive computing leads to the next level of answering questions on the Web.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.