Sciweavers

26354 search results - page 29 / 5271
» How we refactor, and how we know it
Sort
View
ACL
2012
11 years 10 months ago
You Had Me at Hello: How Phrasing Affects Memorability
Understanding the ways in which information achieves widespread public awareness is a research question of significant interest. We consider whether, and how, the way in which th...
Cristian Danescu-Niculescu-Mizil, Justin Cheng, Jo...
APSEC
2006
IEEE
14 years 1 months ago
Evaluation of Source Code Updates in Software Development Based on Component Rank
Essential activities for the achievement of trouble-free software development are monitoring a software product and management of a software project. Monitoring changes that have ...
Reishi Yokomori, Masami Noro, Katsuro Inoue
SAGT
2010
Springer
160views Game Theory» more  SAGT 2010»
13 years 6 months ago
How Do You Like Your Equilibrium Selection Problems? Hard, or Very Hard?
The PPAD-completeness of Nash equilibrium computation is taken as evidence that the problem is computationally hard in the worst case. This evidence is necessarily rather weak, in ...
Paul W. Goldberg
FOCS
2007
IEEE
14 years 2 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...