Now showing items 261-280 of 380

    • OFLOPS-Turbo: Testing the Next-Generation OpenFlow switch 

      Rotsos, Charalampos; Antichi, Gianni; Bruyere, Marc; Owezarski, Philippe; Moore, Andrew William (IEEE, 2015-05-15)
      The heterogeneity barrier breakthrough achieved by the OpenFlow protocol is currently paced by the variability in performance semantics among network devices, which reduces the ability of applications to take complete ...
    • On microarchitectural mechanisms for cache wearout reduction 

      Valero, A; Miralaei, Negar; Petit, S; Sahuquillo, J; Jones, Timothy Martin (IEEE, 2017-03-01)
      Hot carrier injection (HCI) and bias temperature instability (BTI) are two of the main deleterious effects that increase a transistor's threshold voltage over the lifetime of a microprocessor. This voltage degradation ...
    • On Symmetric Circuits and Fixed-Point Logics 

      Anderson, Matthew; Dawar, Anuj (Springer, 2016)
      We study properties of relational structures, such as graphs, that are decided by families of Boolean circuits. Circuits that decide such properties are necessarily invariant to permutations of the elements of the ...
    • On the analogy between vehicle and vehicle-like cavities with reverberation chambers 

      Herbert, Steven; Loh, Tian-Hong; Wassell, Ian James; Rigelsford, Jonathan (IEEE, 2014-10-17)
      Deploying wireless systems in vehicles is an area of current interest. Often, it is implicitly assumed that the electromagnetic environment in vehicle cavities is analogous to that in reverberation chambers, it is therefore ...
    • The online stolen data market: disruption and intervention approaches 

      Hutchings, Alice; Holt, Thomas J (Taylor & Francis, 2016-06-21)
      This article brings a new taxonomy and collation of intervention and disruption methods that can be applied to the online stolen data market. These online market-places are used to buy and sell identity and financial ...
    • An Operational Semantics for C/C++11 Concurrency 

      Nienhuis, Kyndylan; Memarian, K; Sewell, Peter Michael (Association for Computing Machinery, 2016-10-19)
      The C/C++11 concurrency model balances two goals: it is relaxed enough to be efficiently implementable and (leaving aside the "thin-air" problem) it is strong enough to give useful guarantees to programmers. It is ...
    • Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce the latency of Tor 

      Herbert, SJ; Murdoch, Steven James; Punskaya, Elena (Institute of Engineering and Technology, 2014-08-11)
      In this paper the expected cell latency for multi-hop M/D/1 queuing networks, where users choose nodes randomly according to some distribution, is derived. It is shown that the resulting optimisation surface is convex, and ...
    • Optimized Node Selection for Compressive Sleeping Wireless Sensor Networks 

      Chen, Wei; Wassell, Ian J. (IEEE, 2015-02-05)
      In this paper, we propose an active node selection framework for compressive sleeping wireless sensor networks (WSNs) in order to improve signal acquisition performance, network lifetime and the use of spectrum resources. ...
    • Optimized Node Selection for Compressive Sleeping Wireless Sensor Networks 

      Chen, Wei; Wassell, Ian James (IEEE, 2015-02-05)
      In this paper, we propose an active node selection framework for compressive sleeping wireless sensor networks (WSNs) in order to improve signal acquisition performance, network lifetime and the use of spectrum resources. ...
    • OSNT: Open Source Network Tester 

      Antichi, Gianni; Shahbaz, Muhammad; Geng, Yilong; Zilberman, Noa; Covington, Adam; Bruyere, Marc; McKeown, Nick et al. (IEEE, 2014)
      Despite network monitoring and testing being critical for computer networks, current solutions are both extremely expensive and inflexible. Into this lacuna we launch the Open Source Network Tester (OSNT), a fully open-source ...
    • Palimpsest: A layered language for exploratory image processing 

      Blackwell, Alan Frank (Elsevier, 2014-08-09)
      Palimpsest is a novel purely-visual language intended to support exploratory live programming. It demonstrates a new paradigm for the visual representation of constraint programming that may be appropriate to future ...
    • Passwords and the Evolution of Imperfect Authentication 

      Bonneau, Joseph; Herley, Cormac; van, Oorschot Paul C; Stajano, Francesco Mario (ACM, 2014)
      Theory on passwords has lagged behind practice, where large providers use back-end smarts to survive with imperfect technology. Simplistic models of user and attacker behaviors have led the research community to emphasize ...
    • A PCIe DMA engine to support the virtualization of 40 Gbps FPGA-accelerated network appliances 

      Zazo, Jose Fernando; Lopez-Buedo, Sergio; Audzevich, Yury; Moore, Andrew William (IEEE, 2016-02-02)
      Network Function Virtualization (NFV) allows creating specialized network appliances out of general-purpose computing equipment (servers, storage, and switches). In this paper we present a PCIe DMA engine that allows ...
    • Pebble games with algebraic rules 

      Dawar, Anuj; Holm, Bjarki
      We define a general framework of $\textit{partition games}$ for formulating two-player pebble games over finite structures. The framework we introduce includes as special cases the pebble games for finite-variable logics ...
    • The pebbling comonad in Finite Model Theory 

      Abramsky, S; Dawar, Anuj; Wang, P (IEEE, 2017-08-08)
      Pebble games are a powerful tool in the study of finite model theory, constraint satisfaction and database theory. Monads and comonads are basic notions of category theory which are widely used in semantics of computation ...
    • Performance Implications of Transient Loop-Carried Data Dependences in Automatically Parallelized Loops 

      Murphy, Niall; Jones, Timothy; Mullins, Robert; Campanoni, Simone (Association for Computing Machinery, 2016-03-17)
      Recent approaches to automatic parallelization have taken advantage of the low-latency on-chip interconnect provided in modern multicore processors, demonstrating significant speedups, even for complex workloads. Although ...
    • Personal Data: Thinking Inside the Box 

      Chaudhry, Amir; Crowcroft, Jonathon Andrew; Howard, Heidi; Madhavapeddy, Anil Venkata; Mortier, Richard Michael; Haddadi, Hamed; McAuley, Derek (ACM, 2015)
      We are in a ‘personal data gold rush’ driven by advertising being the primary revenue source for most online companies. These companies accumulate extensive personal data about individuals with minimal concern for us, the ...
    • Personality perception of robot avatar tele-operators 

      Bremner, Paul; Celiktutan, Oya; Gunes, Hatice (2016-04-14)
    • Personality perception of robot avatar tele-operators 

      Bremner, Paul; Celiktutan, Oya; Gunes, Hatice (IEEE, 2016-04-14)
      Nowadays a significant part of human-human interaction takes place over distance. Tele-operated robot avatars, in which an operator's behaviours are portrayed by a robot proxy, have the potential to improve distance ...
    • Personality Perception of Robot Avatar Teleoperators in Solo and Dyadic Tasks 

      Bremner, PA; Celiktutan, O; Gunes, Hatice (Frontiers, 2017-05-23)
      Humanoid robot avatars are a potential new telecommunication tool, whereby a user is remotely represented by a robot that replicates their arm, head, and possible face movements. They have been shown to have a number of ...