Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

Four short links: 8 November 2013

  1. An Empirical Study of Cryptographic Misuse in Android Applications (PDF) — We develop program analysis techniques to automatically check programs on the Google Play marketplace, and *find that 10,327 out of 11,748 applications that use cryptographic APIs (88% overall) make at least one mistake.
  2. Introduction to Behaviour Trees — DAGs with codey nodes. Behavior trees replace the often intangible growing mess of state transitions of finite state machines (FSMs) with a more restrictive but also more structured traversal defining approach.
  3. P vs NP Cheat Sheet the space and time Big-O complexities of common algorithms used in Computer Science.
  4. Game Theory and Network Effects in Open Sourcedelicate balance of incentives go into the decision for companies to Open Source or close source their software in the midst of discussions of Nash Equilibria. Enjoy.

Don't be the product, buy the product!

Schweinderl