Sciweavers

1045 search results - page 154 / 209
» The Use of Exceptions
Sort
View
ICSE
2011
IEEE-ACM
12 years 11 months ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
CP
2011
Springer
12 years 8 months ago
Pseudo-Tree-Based Incomplete Algorithm for Distributed Constraint Optimization with Quality Bounds
A Distributed Constraint Optimization Problem (DCOP) is a fundamental problem that can formalize various applications related to multi-agent cooperation. Since it is NP-hard, consi...
Tenda Okimoto, Yongjoon Joe, Atsushi Iwasaki, Mako...
CSCW
2012
ACM
12 years 3 months ago
Technology-mediated contributions: editing behaviors among new wikipedians
The power-law distribution of participation characterizes a wide variety of technology-mediated social participation (TMSP) systems, and Wikipedia is no exception. A minority of a...
Judd Antin, Coye Cheshire, Oded Nov
30
Voted
PKC
2012
Springer
219views Cryptology» more  PKC 2012»
11 years 10 months ago
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
We identify a potential weakness in the standard security model for dynamic group signatures which appears to have been overlooked previously. More specifically, we highlight tha...
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Go...
AAAI
2012
11 years 10 months ago
The Price of Neutrality for the Ranked Pairs Method
The complexity of the winner determination problem has been studied for almost all common voting rules. A notable exception, possibly caused by some confusion regarding its exact ...
Markus Brill, Felix A. Fischer