Now showing items 90-109 of 380

    • Data Analytics Service Composition and Deployment on Edge Devices 

      Zhao, Jianxin; Tiplea, Tudor; Mortier, Richard Michael; Crowcroft, Jonathon Andrew; Wang, Liang
      Data analytics on edge devices has gained rapid growth in research, industry, and different aspects of our daily life. This topic still faces many challenges such as limited computation resource on edge devices. In this ...
    • Data Flow Management and Compliance in Cloud Computing 

      Singh, Jatinder; Powles, Julia Elizabeth; Pasquier, Thomas; Bacon, Jean Margaret (IEEE, 2015-07-01)
      As cloud computing becomes an increasingly dominant means of providing computing resources, the legal and regulatory issues associated with data in the cloud become more pronounced. These issues derive primarily from four ...
    • Data-Centric Access Control for Cloud Computing 

      Pasquier, Thomas; Bacon, Jean Margaret; Singh, Jatinder; Eyers, David (Association for Computing Machinery, 2016-06-06)
      The usual approach to security for cloud-hosted applications is strong separation. However, it is often the case that the same data is used by different applications, particularly given the increase in data-driven (`big ...
    • Datafun: A Functional Datalog 

      Arntzenius, M; Krishnaswami, Neel (Association for Computing Machinery, 2016-09-25)
      Datalog may be considered either an unusually powerful query language or a carefully limited logic programming language. Datalog is declarative, expressive, and optimizable, and has been applied successfully in a wide ...
    • A Decentralized Bayesian Algorithm For Distributed Compressive Sensing in Networked Sensing Systems 

      Chen, Wei; Wassell, Ian James (IEEE, 2015-10-07)
      Compressive sensing (CS), as a new sensing/sampling paradigm, facilitates signal acquisition by reducing the number of samples required for reconstruction of the original signal, and thus appears to be a promising technique ...
    • Deciding Univariate Polynomial Problems Using Untrusted Certificates in Isabelle/HOL 

      Li, W; Passmore, G; Paulson, Lawrence Charles
      We present a proof procedure for univariate real polynomial problems in Isabelle/HOL. The core mathematics of our procedure is based on univariate cylindrical algebraic decomposition. We follow the approach of untrusted ...
    • DeepEar: Robust Smartphone Audio Sensing in Unconstrained Acoustic Environments using Deep Learning 

      Lane, Nicholas D.; Georgiev, Petko; Qendro, Lorena (ACM, 2015-09)
      Microphones are remarkably powerful sensors of human behavior and context. However, audio sensing is highly susceptible to wild fluctuations in accuracy when used in diverse acoustic environments (such as, bedrooms, vehicles, ...
    • Definability of semidefinite programming and lasserre lower bounds for CSPs 

      Dawar, Anuj; Wang, P
      We show that the ellipsoid method for solving semidefinite programs (SDPs) can be expressed in fixed-point logic with counting (FPC). This generalizes an earlier result that the optimal value of a linear program can be ...
    • Denotational Semantics with Nominal Scott Domains 

      Lösch, Steffen; Pitts, Andrew Mawdesley (2014-07-09)
      When defining computations over syntax as data, one often runs into tedious issues concerning α-equivalence and semantically correct manipulations of binding constructs. Here we study a semantic framework in which these ...
    • A Dependent Type Theory with Abstractable Names 

      Pitts, Andrew Mawdesley; Matthiesen, Justus; Derikx, Jasper (Elsevier, 2015-04-24)
      This paper describes a version of Martin-Löf's dependent type theory extended with names and constructs for freshness and name-abstraction derived from the theory of nominal sets. We aim for a type theory for computing and ...
    • Detecting Argument Selection Defects 

      Rice, Andrew; Aftandilian, E; Jaspan, C; Johnston, E; Pradel, M; Arroyo-Paredes, Y (ACM, 2017-08-15)
      Identifier names are often used by developers to convey additional information about the meaning of a program over and above the semantics of the programming language itself. We present an algorithm that uses this information ...
    • Detecting learner errors in the choice of content words using compositional distributional semantics 

      Kochmar, Ekaterina; Briscoe, Edward John (Association for Computational Linguistics, 2014-08-23)
      We describe a novel approach to error detection in adjective-noun combinations. We present and release a new dataset of annotated errors where the examples are extracted from learner texts and annotated with error types. ...
    • Dictionary Design for Distributed Compressive Sensing 

      Chen, Wei; Wassell, Ian James; Rodrigues, Miguel RD (IEEE, 2014-08-20)
      Conventional dictionary learning frameworks attempt to find a set of atoms that promote both signal representation and signal sparsity for a class of signals. In distributed compressive sensing (DCS), in addition to ...
    • Dictionary Learning Inspired Deep Network for Scene Recognition. 

      Liu, Yang; Chen, Qingchao; Chen, Wei; Wassell, Ian James (2018)
      Scene recognition remains one of the most challenging prob- lems in image understanding. With the help of fully con- nected layers (FCL) and rectified linear units (ReLu), deep networks can extract the moderately sparse ...
    • Direct charge measurement in Floating Gate transistors of Flash EEPROM using Scanning Electron Microscopy 

      Courbon, Franck Rene; Skorobogatov, Sergei Petrovich; Woods, C (ASM International, 2016-11)
      We present a characterization methodology for fast direct measurement of the charge accumulated on Floating Gate (FG) transistors of Flash EEPROM cells. Using a Scanning Electron Microscope (SEM) in Passive Voltage Contrast ...
    • Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards 

      Simon, Laurent; Xu, Wenduan; Anderson, Ross John
      We present a new side-channel attack against soft keyboards that support gesture typing on Android smartphones. An application without any special permissions can observe the number and timing of the screen hardware ...
    • DSP.Ear: Leveraging Co-Processor Support for Continuous Audio Sensing on Smartphones 

      Georgiev, Petko; Lane, Nicholas D; Rachuri, Kiran K; Mascolo, Cecilia (2014)
      The rapidly growing adoption of sensor-enabled smartphones has greatly fueled the proliferation of applications that use phone sensors to monitor user behavior. A central sensor among these is the microphone which enables, ...
    • Dynamic Power Control and Optimization Scheme for QoS-Constrained Cooperative Wireless Sensor Networks 

      Feng, Ziqiang; Wassell, Ian James (IEEE, 2016)
      Cooperative transmission can significantly reduce the power consumption associated with long distance transmission in wireless sensor networks (WSNs). In this paper, we analyze the optimal power consumption of cluster-based ...
    • Dynamic Power Control and Optimization Scheme for QoS-Constrained Cooperative Wireless Sensor Networks 

      Feng, Ziqiang; Wassell, Ian James (IEEE, 2016-07-14)
      Cooperative transmission can significantly reduce the power consumption associated with long distance transmission in wireless sensor networks (WSNs). In this paper, we analyze the optimal power consumption of cluster-based ...
    • Effects of Valence and Arousal on Working Memory Performance in Virtual Reality Gaming 

      Gabana, D; Tokarchuk, L; Hannon, E; Gunes, Hatice
      The role of affective states in cognitive performance has long been an area of interest in cognitive science. Recent research in game-based cognitive training suggest that cognitive games should incorporate real-time ...