Sciweavers

COMBINATORICS
2016
52views more  COMBINATORICS 2016»
10 years 1 months ago
Doubled Patterns are 3-Avoidable
In combinatorics on words, a word w over an alphabet Σ is said to avoid a pattern p over an alphabet ∆ if there is no factor f of w such that f = h(p) where h : ∆∗ → Σ...
Pascal Ochem
COGSR
2016
79views more  COGSR 2016»
10 years 1 months ago
Human stigmergy: Theoretical developments and new applications
: The concept of stigmergy has been used to analyze self-organizing activities in an ever-widening range of domains, including social insects, robotics, social media, and human soc...
Ted G. Lewis, Leslie Marsh
COGSR
2016
50views more  COGSR 2016»
10 years 1 months ago
Stigmergic coordination in FLOSS development teams: Integrating explicit and implicit mechanisms
: The vast majority of literature on coordination in team-based projects has drawn on a conceptual separation between explicit (e.g. plans, feedbacks) and implicit coordination mec...
Francesco Bolici, James Howison, Kevin Crowston
COGSCI
2016
56views more  COGSCI 2016»
10 years 1 months ago
Investigating Conversational Dynamics: Interactive Alignment, Interpersonal Synergy, and Collective Task Performance
This study investigates interpersonal processes underlying dialog by comparing two approaches, interactive alignment and interpersonal synergy, and assesses how they predict colle...
Riccardo Fusaroli, Kristian Tylén
COGSCI
2016
50views more  COGSCI 2016»
10 years 1 months ago
Self-Directed Learning Favors Local, Rather Than Global, Uncertainty
Collecting (or “sampling”) information that one expects to be useful is a powerful way to facilitate learning. However, relatively little is known about how people decide whic...
Douglas Markant, Burr Settles, Todd M. Gureckis
COGSCI
2016
41views more  COGSCI 2016»
10 years 1 months ago
Rapid Learning in a Children's Museum via Analogical Comparison
We tested whether analogical training could help children learn a key principle of elementary engineering—namely, the use of a diagonal brace to stabilize a structure. The conte...
Dedre Gentner, Susan C. Levine, Raedy M. Ping, Ash...
CODASPY
2016
10 years 1 months ago
Scalable and Secure Logistic Regression via Homomorphic Encryption
Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this pape...
Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phon...
CODASPY
2016
10 years 1 months ago
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authenticatio...
John Maheswaran, Daniel Jackowitz, Ennan Zhai, Dav...
CODASPY
2016
10 years 1 months ago
Toward Large-Scale Vulnerability Discovery using Machine Learning
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. ...
CODASPY
2016
10 years 1 months ago
Risk-based Analysis of Business Process Executions
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed...
Mahdi Alizadeh, Nicola Zannone