Sciweavers

101
Voted
PODC
2015
ACM
9 years 11 months ago
How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality
In his seminal result, Cleve [STOC’86] established that secure distributed computation— guaranteeing fairness—is impossible in the presence of dishonest majorities. A genero...
Juan A. Garay, Jonathan Katz, Björn Tackmann,...
190
Voted
PODC
2015
ACM
9 years 11 months ago
Algebraic Methods in the Congested Clique
In this work, we use algebraic methods for studying distance computation and subgraph detection tasks in the congested clique model. Specifically, we adapt parallel matrix multipl...
Keren Censor-Hillel, Petteri Kaski, Janne H. Korho...
87
Voted
ASWEC
2015
IEEE
9 years 11 months ago
Multiple Bug Spectral Fault Localization Using Genetic Programming
—Debugging is crucial for producing reliable software. One of the effective bug localization techniques is SpectralBased Fault Localization (SBFL). It locates a buggy statement b...
Lee Naish, Neelofar, Kotagiri Ramamohanarao
90
Voted
ASWEC
2015
IEEE
9 years 11 months ago
Scalable Rollback for Cloud Operations Using AI Planning
—Human-induced faults play a large role in systems reliability. In cloud platforms, system administrators may inadvertently make catastrophic mistakes, like deleting a virtual di...
Suhrid Satyal, Ingo Weber, Len Bass, Min Fu
99
Voted
ASWEC
2015
IEEE
9 years 11 months ago
Cost-Effective Traceability Links for Architecture-Level Software Understanding: A Controlled Experiment
An important architectural challenge is to recover traceability links between the software architecture and artifacts produced in the other activities of the development process, ...
Muhammad Atif Javed, Srdjan Stevanetic, Uwe Zdun