Sciweavers

CJTCS
2016
48views Hardware» more  CJTCS 2016»
10 years 15 days ago
Reducing uniformity in Khot-Saket hypergraph coloring hardness reductions
: In a recent result, Khot and Saket [FOCS 2014] proved the quasi-NP-hardness of coloring a 2-colorable 12-uniform hypergraph with 2(logn)Ω(1) colors. This result was proved usin...
Girish Varma
CJTCS
2016
71views Hardware» more  CJTCS 2016»
10 years 15 days ago
Layouts of Expander Graphs
Abstract: Bourgain and Yehudayoff recently constructed O(1)-monotone bipartite expanders. By combining this result with a generalisation of the unraveling method of Kannan, we cons...
Vida Dujmovic, Anastasios Sidiropoulos, David R. W...
CJ
2016
59views Hardware» more  CJ 2016»
10 years 15 days ago
A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-Free Property
Abstract. The minimum spanning tree (MST) construction is a classical problem in Distributed Computing for creating a globally minimized structure distributedly. Self-stabilization...
Lélia Blin, Maria Potop-Butucaru, Stephane ...
CIM
2016
62views Hardware» more  CIM 2016»
10 years 15 days ago
Adaptive Assistance for Brain-Computer Interfaces by Online Prediction of Command Reliability
One of the challenges of using brain-computer interfaces (BCIs) over extended periods of time is the variation of the users’ performance from one experimental day to another. The...
Sareh Saeedi, Ricardo Chavarriaga, Robert Leeb, Jo...
CHB
2016
10 years 15 days ago
Social presence, trust, and social commerce purchase intention: An empirical research
Lacking the presence of human and social elements is claimed one major weakness that is hindering the growth of e-commerce. The emergence of social commerce (SC) might help amelio...
Baozhou Lu, Weiguo Fan, Mi Zhou
CHB
2016
10 years 15 days ago
Exploring college students' generational differences in Facebook usage
Svetlana Cicevic, Andreja Samcovic, Milkica Nesic
CHB
2016
10 years 15 days ago
Adolescents and self-taken sexual images: A review of the literature
:  Despite  increasing  public  interest  and  concern  about  young  people’s  involvement  in  the   self-­‐production  of  sexu...
Karen Cooper, Ethel Quayle, Linda S. Jonsson, Carl...
CGO
2016
IEEE
10 years 16 days ago
BlackBox: lightweight security monitoring for COTS binaries
After a software system is compromised, it can be difficult to understand what vulnerabilities attackers exploited. Any information residing on that machine cannot be trusted as ...
Byron Hawkins, Brian Demsky, Michael B. Taylor
CGO
2016
IEEE
10 years 16 days ago
Inference of peak density of indirect branches to detect ROP attacks
A program subject to a Return-Oriented Programming (ROP) attack usually presents an execution trace with a high frequency of indirect branches. From this observation, several rese...
Mateus Tymburibá, Rubens E. A. Moreira, Fer...