Tiny Transactions on Computer Science (TinyToCS) is the premier venue for computer science research of 140 characters or less.
Volume 4 Index Follow @TinyToCS
Research and Review Methodology: The Way Our Community Continues to Thrive
I Aver: Providing Declarative Experiment Specifications Facilitates the Evaluation of Computer Systems Research
Providing declarative statements that describe the outcome of an experiment can significantly improve the task of validating its results.
It is More Blessed to Give than to Receive - Open Software Tools Enable Open Innovation
Sharing software tools enables open innovation, brings faster upgrades and frees up resources, but demands investments in the open community.
The Full Mont(olog)y: Using Ontologies to Optimize the CS Literature Review
We need a comprehensive and maintainable ontology of CS research to drive scientific progress despite massive knowledge availability.
Power, Energy, and Thermal: How Do We Survive in the Post-Dennard Scaling Era
Squeezing Energy Savings Out Of Similar Data and Computation in GPGPUs
Significant energy savings (with <5.5% output quality loss) can be achieved by merging computation and storage of similar data.
Reducing Mobile Throttling from Temperature by Offloading Apps (★Video)
Offload intensive apps from phones to avoid high temperatures that cause throttling and reduce global performance.
Knowledge Discovery and Learning: Drawing Insights from "Big Data"
Machine Learning Literature using Textual Features
Why are some novels considered to be literature? A predictive model of literary judgments shows that textual features are important.
Data Integration Beyond Alignments Between Two Sources
Reconciling identity vs. distinctness of items from different sources can be NP-hard, but approximations enable flexible data integration
Is Small More Interesting? Examining Countries' GeoNames Places linked to Wikipedia
Places in small countries are three times as likely to be linked to Wikipedia with 41% of coverage compared to 13% for larger countries.
Do Take it Personal: It's Not What You Say, It's Who (and Where) You Are!
Priority of reported issues is a poor predictor of future code change. Suspicions empirically confirmed: submitter metadata most important.
Security and Privacy: Issues When Client, Cloud, and Crowd are Closely Integrated
Improving Android security by widening the role of Mandatory Access Control
The Android security ecosystem can greatly benefit from a deeper integration of SELinux Mandatory Access Control into system components.
Investigating User Profiling and Privacy Leaks in Mobile Ad Networks
User-based targeting in mobile ads is scarce & we explore if attackers can track a user by spoofing the user's identifiers in ad requests.
On Information Flow Control and Audit for Demonstrable Compliance in the Cloud
Complex policy can be built upon simple primitives enforced on every data flow. Enforcement data can be captured to demonstrate compliance.
A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information
Network-aware access control systems can provide good-enough security for sharing information with low value over intermittent network.
Computer Networks: SDN, 5G, and Beyond
How real is the threat of instability events predicted by Adversarial Queueing Theory?
Theoretical results suggests that innocent traffic patterns can overwhelm networks. Yet, for finite buffers these patterns appear harmless.
Towards Secure Decoy Routing by Using SDN
Against existing censorship circumvention protocols, we propose SDN-based Decoy Routing that is faster and resilient to traffic analysis.
Solving Signaling Storm through Long-Term Evolution Refactoring
Refactoring LTE networks opens a gold mine of research problems and provides insights for laying the cornerstone for modular 5G networks.
Data and Data Structures: Making Better Software by Understanding Data Better
A Framework for Testing Properties of Discrete Distributions: Monotonicity, Independence, and More
Wanna optimally test if your distribution has a property? Assume it does, learn the distribution, and test the hypothesis. Use χ2 distance!
Tiny ToCS Volume 4 OrganizersProgram Chair:
- Yuhao Zhu, The University of Texas at Austin
- Mark Batty, University of Kent
- Mike Dodds, University of York
- Ionel Gog, University of Cambridge
- Matthew Halpern, The University of Texas at Austin
- Paul Harvey, University of Glasgow
- Heidi Howard, University of Cambridge
- Mark Jeffrey, MIT CSAIL
- Heidy Khlaaf, University College London
- Martin Maas, University of California, Berkeley
- Sasanka Nagavalli, Carnegie Mellon University
- Adrian Sampson, Microsoft Research/Cornell University
- Malte Schwarzkopf, MIT CSAIL
- Divya Sharma, Carnegie Mellon University
- Tyler Sorensen, University College London
- Stephen Strowes, Yahoo
- John Wickerson, Imperial College London
- Xi Yang, Australian National University
Contact: tiny-tocs-pc at googlegroups dot com
Include a link to Tiny ToCS on your website:
<a href="http://tinytocs.org"><img src="http://tinytocs.org/ttocs-thumb.png"/></a>