default search action
Tiny Transactions on Computer Science, Volume 4
Volume 4, 2016
- Ivo Jimenez, Carlos Maltzahn, Jay F. Lofstead, Adam Moody, Kathryn M. Mohror, Remzi H. Arpaci-Dusseau, Andrea C. Arpaci-Dusseau:
I Aver: Providing Declarative Experiment Specifications Facilitates the Evaluation of Computer Systems Research. - Per Runeson, Hussan Munir, Krzysztof Wnuk:
It is More Blessed to Give than to Receive - Open Software Tools Enable Open Innovation. - Kathryn Dahlgren:
The Full Mont(olog)y: Using Ontologies to Optimize the CS Literature Review.
- Daniel Wong:
Squeezing Energy Savings Out Of Similar Data and Computation in GPGPUs. - William Agnew, Hyunjong Lee, Minsung Jang, Ada Gavrilovska, Karsten Schwan:
Drawing Insights from "Big Data" Machine Learning Literature using Textual Features Why are some novels considered to be literature? A. predictive model of literary judgments shows that textual features are important. Andreas van Cranenburgh: Reducing Mobile Throttling from Temperature by Offloading Apps. - Gerard de Melo:
Data Integration Beyond Alignments Between Two Sources. - Dirk Ahlers:
Is Small More Interesting? Examining Countries' GeoNames Places linked to Wikipedia. - Markus Borg, Petter Gulin, Linus Olofsson:
Do Take it Personal: It's Not What You Say, It's Who (and Where) You Are!
- Enrico Bacis, Simone Mutti, Marco Rosa, Stefano Paraboschi:
Improving Android security by widening the role of Mandatory Access Control. - Eeva Terkki, Ashwin Rao, Sasu Tarkoma:
Investigating User Profiling and Privacy Leaks in Mobile Ad Networks. - Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon:
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud. - Reena Singh, Timothy A. Gonsalves:
A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information.
- Daniel S. Berger, Martin Karsten, Jens B. Schmitt:
How real is the threat of instability events predicted by Adversarial Queueing Theory? - Chaitanya Kumar, Vinayak Naik:
Towards Secure Decoy Routing by Using SDN. - Matteo Pozza, Heikki Lindholm, Hannu Flinck, Claudio E. Palazzi, Ashwin Rao, Sasu Tarkoma:
Solving Signaling Storm through Long-Term Evolution Refactoring.
- Jayadev Acharya, Constantinos Daskalakis, Gautam Kamath:
A Framework for Testing Properties of Discrete Distributions: Monotonicity, Independence, and More. - Tony Finch:
QP tries are smaller and faster than crit-bit trees. - Ivan Kuraj:
Programming with Enumerators: Constructive Approach to Challenge the Status Quo in Automated Data Structure Generation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.