Sciweavers

7296 search results - page 1459 / 1460
» informs 2010
Sort
View
CHI
2011
ACM
13 years 1 months ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
CCS
2011
ACM
12 years 9 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
SODA
2012
ACM
170views Algorithms» more  SODA 2012»
12 years 6 days ago
Compression via matroids: a randomized polynomial kernel for odd cycle transversal
The Odd Cycle Transversal problem (OCT) asks whether a given graph can be made bipartite by deleting at most k of its vertices. In a breakthrough result Reed, Smith, and Vetta (Op...
Stefan Kratsch, Magnus Wahlström
ECOOP
2010
Springer
14 years 2 months ago
The Essence of JavaScript
We reduce JavaScript to a core calculus structured as a small-step operational semantics. We present several peculiarities of the language and show that our calculus models them. W...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
JSYML
2010
114views more  JSYML 2010»
13 years 8 months ago
The Ackermann functions are not optimal, but by how much?
By taking a closer look at the construction of an Ackermann function we see that between any primitive recursive degree and its Ackermann modification there is a dense chain of p...
Harold Simmons
« Prev « First page 1459 / 1460 Last » Next »