Published as: Erlingsson, Úlfar, and John MacCormick. Ad hoc Extensibility and Access Control. ACM SIGOPS Operating Systems Review 40, no. 3 (2006): 93-101. This author post-print is made available on Dickinson Scholar...
If you're a fan of the British TV show Sherlock, you might be interested to hear that the lead actor in that show, Benedict Cumberbatch, will be starring as the legendary English scientist Alan Turing in a movie to be...
Ensemble methods are widely applied in classification problems. Ensemble methods combine results from multiple classifiers to overcome the possible deficiency of any single classifier. One important question is how to construct...
In this paper we present two novel abstract syntax tree (AST) indexing algorithms that solve the get-descendants-by-type problem in near constant time. This work has been implemented in the U.S. Department of Energy's ROSE...
Bryant, Sarah N., and Jennifer B. Schaefer. Becoming Successful Proof-Writers Through Peer Review, Journals, and Portfolios. In Beyond Lecture: Resources and Pedagogical Techniques for Enhancing the Teaching of Proof-Writing...
We present a case study on the development of a formally verified PHP web social network application. With the expansion of social media and our presence in the cyber world, the privacy and security of our content online have...
Genetic Algorithms (GAs) are a branch of search algorithms popularly used due to their ability to find near optimal solutions in reasonable amounts of time. The algorithm itself stems from the Darwinian Theory of natural...
Evolutionary Robotics is an expanding area in the world of robotics that incorporates ideas from fields such as Biology, Engineering, and Computer Science. The main idea behind Evolutionary Robotics is to use computerized...