Sciweavers

3533 search results - page 73 / 707
» Information theory and Thermodynamics
Sort
View
CCS
2011
ACM
13 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
APAL
2010
78views more  APAL 2010»
14 years 10 months ago
Extending and interpreting Post's programme
Computability theory concerns information with a causal
S. Barry Cooper
ICML
1999
IEEE
15 years 10 months ago
Machine-Learning Applications of Algorithmic Randomness
Most machine learning algorithms share the following drawback: they only output bare predictions but not the con dence in those predictions. In the 1960s algorithmic information t...
Volodya Vovk, Alexander Gammerman, Craig Saunders
CHI
2009
ACM
15 years 10 months ago
Toward a unified theory of the multitasking continuum: from concurrent performance to task switching, interruption, and resumpti
Multitasking in user behavior can be represented along a continuum in terms of the time spent on one task before switching to another. In this paper, we present a theory of behavi...
Dario D. Salvucci, Niels Taatgen, Jelmer P. Borst
DESRIST
2010
Springer
229views Education» more  DESRIST 2010»
15 years 1 months ago
Comparing Two Software Design Process Theories
This paper explores an ongoing conflict concerning the nature of software design. This conflict manifests itself as antagonism between managers and developers, debates about agile ...
Paul Ralph