Recent years have seen extensive investigation of the information aggregation properties of prediction markets. However, relatively little is known about conditions under which a ...
Krishnamurthy Iyer, Ramesh Johari, Ciamac Cyrus Mo...
In this paper we explore the idea that the code that constitutes a program actually forms a higher-level, program specific language. The symbols of the language are the abstracti...
Very large systems have an architecture that is designed to allow them to evolve through a long life. Such systems are developed by teams of architects. One of the first things t...
People are able to determine whether or not a given document is interesting just by glancing through it. However, when asked to make explicit the rules upon which such a decision ...
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...