Now showing items 261-280 of 380

• #### OFLOPS-Turbo: Testing the Next-Generation OpenFlow switch ﻿

(IEEE, 2015-05-15)
The heterogeneity barrier breakthrough achieved by the OpenFlow protocol is currently paced by the variability in performance semantics among network devices, which reduces the ability of applications to take complete ...
• #### On microarchitectural mechanisms for cache wearout reduction ﻿

(IEEE, 2017-03-01)
Hot carrier injection (HCI) and bias temperature instability (BTI) are two of the main deleterious effects that increase a transistor's threshold voltage over the lifetime of a microprocessor. This voltage degradation ...
• #### On Symmetric Circuits and Fixed-Point Logics ﻿

(Springer, 2016)
We study properties of relational structures, such as graphs, that are decided by families of Boolean circuits. Circuits that decide such properties are necessarily invariant to permutations of the elements of the ...
• #### On the analogy between vehicle and vehicle-like cavities with reverberation chambers ﻿

(IEEE, 2014-10-17)
Deploying wireless systems in vehicles is an area of current interest. Often, it is implicitly assumed that the electromagnetic environment in vehicle cavities is analogous to that in reverberation chambers, it is therefore ...
• #### The online stolen data market: disruption and intervention approaches ﻿

(Taylor & Francis, 2016-06-21)
This article brings a new taxonomy and collation of intervention and disruption methods that can be applied to the online stolen data market. These online market-places are used to buy and sell identity and financial ...
• #### An Operational Semantics for C/C++11 Concurrency ﻿

(Association for Computing Machinery, 2016-10-19)
The C/C++11 concurrency model balances two goals: it is relaxed enough to be efficiently implementable and (leaving aside the "thin-air" problem) it is strong enough to give useful guarantees to programmers. It is ...
• #### Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce the latency of Tor ﻿

(Institute of Engineering and Technology, 2014-08-11)
In this paper the expected cell latency for multi-hop M/D/1 queuing networks, where users choose nodes randomly according to some distribution, is derived. It is shown that the resulting optimisation surface is convex, and ...
• #### Optimized Node Selection for Compressive Sleeping Wireless Sensor Networks ﻿

(IEEE, 2015-02-05)
In this paper, we propose an active node selection framework for compressive sleeping wireless sensor networks (WSNs) in order to improve signal acquisition performance, network lifetime and the use of spectrum resources. ...
• #### Optimized Node Selection for Compressive Sleeping Wireless Sensor Networks ﻿

(IEEE, 2015-02-05)
In this paper, we propose an active node selection framework for compressive sleeping wireless sensor networks (WSNs) in order to improve signal acquisition performance, network lifetime and the use of spectrum resources. ...
• #### OSNT: Open Source Network Tester ﻿

(IEEE, 2014)
Despite network monitoring and testing being critical for computer networks, current solutions are both extremely expensive and inflexible. Into this lacuna we launch the Open Source Network Tester (OSNT), a fully open-source ...
• #### Palimpsest: A layered language for exploratory image processing ﻿

(Elsevier, 2014-08-09)
Palimpsest is a novel purely-visual language intended to support exploratory live programming. It demonstrates a new paradigm for the visual representation of constraint programming that may be appropriate to future ...
• #### Passwords and the Evolution of Imperfect Authentication ﻿

(ACM, 2014)
Theory on passwords has lagged behind practice, where large providers use back-end smarts to survive with imperfect technology. Simplistic models of user and attacker behaviors have led the research community to emphasize ...
• #### A PCIe DMA engine to support the virtualization of 40 Gbps FPGA-accelerated network appliances ﻿

(IEEE, 2016-02-02)
Network Function Virtualization (NFV) allows creating specialized network appliances out of general-purpose computing equipment (servers, storage, and switches). In this paper we present a PCIe DMA engine that allows ...
• #### Pebble games with algebraic rules ﻿

We define a general framework of $\textit{partition games}$ for formulating two-player pebble games over finite structures. The framework we introduce includes as special cases the pebble games for finite-variable logics ...
• #### The pebbling comonad in Finite Model Theory ﻿

(IEEE, 2017-08-08)
Pebble games are a powerful tool in the study of finite model theory, constraint satisfaction and database theory. Monads and comonads are basic notions of category theory which are widely used in semantics of computation ...
• #### Performance Implications of Transient Loop-Carried Data Dependences in Automatically Parallelized Loops ﻿

(Association for Computing Machinery, 2016-03-17)
Recent approaches to automatic parallelization have taken advantage of the low-latency on-chip interconnect provided in modern multicore processors, demonstrating significant speedups, even for complex workloads. Although ...
• #### Personal Data: Thinking Inside the Box ﻿

(ACM, 2015)
We are in a ‘personal data gold rush’ driven by advertising being the primary revenue source for most online companies. These companies accumulate extensive personal data about individuals with minimal concern for us, the ...
• #### Personality perception of robot avatar tele-operators ﻿

(2016-04-14)
• #### Personality perception of robot avatar tele-operators ﻿

(IEEE, 2016-04-14)
Nowadays a significant part of human-human interaction takes place over distance. Tele-operated robot avatars, in which an operator's behaviours are portrayed by a robot proxy, have the potential to improve distance ...
• #### Personality Perception of Robot Avatar Teleoperators in Solo and Dyadic Tasks ﻿

(Frontiers, 2017-05-23)
Humanoid robot avatars are a potential new telecommunication tool, whereby a user is remotely represented by a robot that replicates their arm, head, and possible face movements. They have been shown to have a number of ...