Estimating Hidden Bug Count — Part 2/3
Part 1: Introduction and Basic Theory > Part 3: Harsh Reality That simple logic is nice, but practice makes it questionable for at least two reasons: Bugs found by either of the parties are fixed.…
Estimating Hidden Bug Count — Part 1/3
Part 1: Introduction Probably every piece of software has some defects in it. Known defects (also called bugs) are found by manufacturers and users and fixed. Unknown ones remain there, waiting to be discovered some…
Weak Instances of PLWE
Zero-Effort Payments
Zero-Effort Payments (ZEP) is a seamless mobile computing system designed to accept payments with no effort on the customer’s part beyond a one-time opt-in. With ZEP, customers need not present cards nor operate smartphones to…
Konstantinos Vamvourellis talks about his stint at MSR India
Konstantinos is a PhD student in CSE at City University of New York. He is interested is research areas such as Cryptography and Privacy and worked with two groups at MSR India: Algorithms and Data…