While password managers are a vital tool for internet security, they can...
Since the introduction of bcrypt in 1999, adaptive password hashing
func...
The average cryptocurrency user today faces a difficult choice between
c...
Motion tracking "telemetry" data lies at the core of nearly all modern
e...
The emergence of affordable standalone virtual reality (VR) devices has
...
The adoption of virtual reality (VR) technologies has rapidly gained mom...
Virtual reality (VR) telepresence applications and the so-called "metave...
We present the first general construction of a Multi-Factor Key Derivati...
Catching and attributing code change-induced performance regressions in
...
Thirty study participants playtested an innocent-looking "escape room" g...
As software systems grow in complexity and the space of possible
configu...
Hyperparameter tuning is the black art of automatically finding a good
c...
Hyperparameter tuning is the black art of automatically finding a good
c...
Most cloud computing optimizers explore and improve one workload at a ti...
As software systems grow in complexity, the space of possible configurat...
Finding the right cloud configuration for workloads is an essential step...
This paper introduces Data-Driven Search-based Software Engineering (DSE...
Finding good configurations for a software system is often challenging s...
With the advent of big data applications, which tends to have longer
exe...
Context: Evolutionary algorithms typically require a large number of
eva...
Context: One of the black arts of data mining is learning the magic
para...