Now showing items 104-123 of 353

    • Effects of Valence and Arousal on Working Memory Performance in Virtual Reality Gaming 

      Gabana, D; Tokarchuk, L; Hannon, E; Gunes, Hatice
      The role of affective states in cognitive performance has long been an area of interest in cognitive science. Recent research in game-based cognitive training suggest that cognitive games should incorporate real-time ...
    • Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits 

      Choudary, Marios O; Kuhn, Markus Guenther (Springer, 2015-03-17)
      Template attacks and stochastic models are among the most powerful side-channel attacks. However, they can be computationally expensive when processing a large number of samples. Various compression techniques have been ...
    • Efficient template attacks 

      Choudary, Omar; Kuhn, Markus G. (Springer, 2014)
      Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice, ...
    • Efficient, portable template attacks 

      Choudary, MO; Kuhn, Markus Guenther (IEEE, 2018-02-01)
      Template attacks recover data values processed by tamper-resistant devices from side-channel waveforms, such as supply-current fluctuations (power analysis) or electromagnetic emissions. They first profile a device to ...
    • Emu: Rapid Prototyping of Networking Services. 

      Sultana, Nikolai; Galea, Salvator; Greaves, David James; Wójcik, Marcin; Shipton, Jonny; Clegg, Richard G; Mai, Luo et al. (USENIX Association, 2017)
      Due to their performance and flexibility, FPGAs are an attractive platform for the execution of network functions. It has been a challenge for a long time though to make FPGA programming accessible to a large audience of ...
    • Enabling Performance Evaluation Beyond 10 Gbp 

      Antichi, Gianni; Rostos, Charalampos; Moore, Andrew William (ACM, 2015-10)
      Despite network monitoring and testing being critical for computer networks, current solutions are both extremely expensive and inflexible. This demo presents OSNT (www.osnt.org), a community-driven, high-performance, ...
    • Enabling the new economic actor: data protection, the digital economy, and the Databox 

      Crabtree, Andy; Lodge, Tom; Colley, James; Greenhalgh, Chris; Mortier, Richard Michael; Haddadi, Hamed (Springer, 2016-08-02)
      This paper offers a sociological perspective on data protection regulation and its relevance to design. From this perspective, proposed regulation in Europe and the USA seeks to create a new economic actor—the consumer as ...
    • ENDEAVOUR: A Scalable SDN Architecture for Real-World IXPs 

      Antichi, Gianni; Castro, I; Chiesa, M; Fernandes, EL; Lapeyrade, R; Koop, D; Han, JH et al. (IEEE, 2017-11-01)
      Innovation in interdomain routing has remained stagnant for over a decade. Recently, IXPs have emerged as economically-advantageous interconnection points for reducing path latencies and exchanging ever increasing traffic ...
    • Energy neutral operation of vibration energy-harvesting sensor networks for bridge applications 

      Gaglione, Andrea; Rodenas-Herraiz, David; Jia, Yu; Nawaz, Sarfraz; Arroyo, Emmanuelle; Mascolo, Cecilia; Soga, Kenichi et al.
      greatly benefit from the use of wireless sensor networks (WSNs), however energy harvesting for the operation of the network remains a challenge in this setting. While solar and wind power are possible and credible solutions ...
    • Enhancing the L1 Data Cache Design to Mitigate HCI 

      Valero, Alejandro; Miralaei, Negar; Petit, Salvador; Sahuquillo, Julio; Jones, Timothy Martin (Faculty of Computer Science and Technology, University of Cambridge, 2015-07-28)
      Over the lifetime of a microprocessor, the Hot Carrier Injection (HCI) phenomenon degrades the threshold voltage, which causes slower transistor switching and eventually results in timing violations and faulty operation. ...
    • Equality: A tool for free-form equation editing 

      Cummins, Stephen; Davies, Ian; Rice, Andrew; Beresford, Alastair Richard (2015-06-10)
    • An Error-Oriented Approach to Word Embedding Pre-Training 

      Farag, Y; Rei, Marek; Briscoe, Edward John (Association for Computational Linguistics, 2017-09-08)
      We propose a novel word embedding pre-training approach that exploits writing errors in learners' scripts. We compare our method to previous models that tune the embeddings based on script scores and the discrimination ...
    • Ethical issues in research using datasets of illicit origin 

      Thomas, Daniel R.; Pastrana Portillo, Sergio; Hutchings, Alice; Clayton, Richard Neil; Beresford, Alastair Richard (ACM, 2017-11-01)
      We evaluate the use of data obtained by illicit means against a broad set of ethical and legal issues. Our analysis covers both the direct collection, and secondary uses of, data obtained via illicit means such as exploiting ...
    • An Event-Triggered Programmable Prefetcher for Irregular Workloads 

      Ainsworth, Sam; Jones, Timothy Martin
      Many modern workloads compute on large amounts of data, often with irregular memory accesses. Current architectures perform poorly for these workloads, as existing prefetching techniques cannot capture the memory access ...
    • Evolving Fortran types with inferred units-of-measure 

      Orchard, Dominic; Rice, Andrew; Oshmyan, Oleg (Elsevier, 2015-04-18)
      Dimensional analysis is a well known technique for checking the consistency of equations involv- ing physical quantities, constituting a kind of type system. Various type systems for dimensional analysis, and its re nement ...
    • Examining signals of trust in criminal markets online 

      Holt, Thomas J; Smirnova, Olga; Hutchings, Alice (Oxford University Press, 2016-09-15)
      This study examines the signals of trust in stolen data advertisements by analysing the structural and situational factors that influence the type of feedback sellers receive. Specifically, this article explores the factors ...
    • Expected F-Measure Training for Shift-Reduce Parsing with Recurrent Neural Networks 

      Xu, W; Auli, M; Clark, Stephen Christopher (Association for Computational Linguistics, 2016-06-17)
      We present expected F-measure training for shift-reduce parsing with RNNs, which enables the learning of a global parsing model optimized for sentence-level F1. We apply the model to $\small \text{CCG}$ parsing, where it ...
    • Explicit Delegation Using Configurable Cookies 

      Llewellyn-Jones, David; Jenkinson, G; Stajano, Francesco Mario
      Password sharing is widely used as a means of delegating access, but it is open to abuse and relies heavily on trust in the person being delegated to. We present a protocol for delegating access to websites as a natural ...
    • Exploiting Hidden Block Sparsity: Interdependent Matching Pursuit for Cyclic Feature Detection 

      Wang, Yu; Chen, Wei; Wassell, Ian James (IEEE, 2013-12-13)
      In this paper, we propose a novel Compressive Sensing (CS)-enhanced spectrum sensing approach for Cognitive Radio (CR) systems. The new framework enables cyclic feature detection with a significantly reduced sampling rate. ...