Sciweavers

SAC
2015
ACM
8 years 7 months ago
HTTP over UDP: an experimental investigation of QUIC
This paper investigates “Quick UDP Internet Connections” (QUIC), which was proposed by Google in 2012 as a reliable protocol on top of UDP in order to reduce Web Page retrieva...
Gaetano Carlucci, Luca De Cicco, Saverio Mascolo
SAC
2015
ACM
8 years 7 months ago
A universal topic framework (UniZ) and its application in online search
Probabilistic topic models, such as PLSA and LDA, are gaining popularity in many fields due to their high-quality results. Unfortunately, existing topic models suffer from two d...
Youngchul Cha, Keng-hao Chang, Hari Bommaganti, Ye...
SAC
2015
ACM
8 years 7 months ago
Fast as a shadow, expressive as a tree: hybrid memory monitoring for C
One classical approach to ensuring memory safety of C programs is based on storing block metadata in a tree-like datastructure. However it becomes relatively slow when the number ...
Arvid Jakobsson, Nikolai Kosmatov, Julien Signoles
SAC
2015
ACM
8 years 7 months ago
Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system
In this paper we demonstrate several examples of solving challenging algorithmic problems from the Google Code Jam programming contest with the Prolog-based ECLi PSe system using ...
Sergii Dymchenko, Mariia Mykhailova
SAC
2015
ACM
8 years 7 months ago
Discovering weighted motifs in gene co-expression networks
An important dimension of complex networks is embedded in the weights of its edges. Incorporating this source of information on the analysis of a network can greatly enhance our u...
Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fer...
SAC
2015
ACM
8 years 7 months ago
Adaptive just-in-time value class optimization: transparent data structure inlining for fast execution
The performance of value classes is highly dependent on how they are represented in the virtual machine. Value class instances are immutable, have no identity, and can only refer ...
Tobias Pape, Carl Friedrich Bolz, Robert Hirschfel...
SAC
2015
ACM
8 years 7 months ago
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services
Given the trend towards mobile computing, the next generation of ubiquitous “smart” services will have to continuously analyze surrounding sensor data. More than ever, such se...
Assaad Moawad, Thomas Hartmann 0001, Franço...
SAC
2015
ACM
8 years 7 months ago
Effective manycast messaging for Kademlia network
Peer-to-peer (P2P) communication plays an ever-expanding role in critical applications with rapidly growing user bases. In addition to well-known P2P systems for data sharing (e.g...
Lubos Matl, Tomás Cerný, Michael J. ...
SAC
2015
ACM
8 years 7 months ago
Truth and myth of independent software testing: a controlled human experiment
Organizations often outsource software testing activities to optimize software testing and verify developed software by independent experts. Related benefits include expectations ...
Ali Sunyaev, Dirk Basten