Now showing items 238-257 of 328

• #### Palimpsest: A layered language for exploratory image processing ﻿

(2014-08-09)

(2014)
• #### A PCIe DMA engine to support the virtualization of 40 Gbps FPGA-accelerated network appliances ﻿

(2016-02-02)
• #### Pebble games with algebraic rules ﻿

We define a general framework of $\textit{partition games}$ for formulating two-player pebble games over finite structures. The framework we introduce includes as special cases the pebble games for finite-variable logics ...
• #### The pebbling comonad in Finite Model Theory ﻿

(IEEE, 2017-08-08)
Pebble games are a powerful tool in the study of finite model theory, constraint satisfaction and database theory. Monads and comonads are basic notions of category theory which are widely used in semantics of computation ...
• #### Performance Implications of Transient Loop-Carried Data Dependences in Automatically Parallelized Loops ﻿

(Association for Computing Machinery, 2016-03-17)
Recent approaches to automatic parallelization have taken advantage of the low-latency on-chip interconnect provided in modern multicore processors, demonstrating significant speedups, even for complex workloads. Although ...
• #### Personal Data: Thinking Inside the Box ﻿

(ACM, 2015)
• #### Personality perception of robot avatar tele-operators ﻿

(2016-04-14)
• #### Personality perception of robot avatar tele-operators ﻿

(IEEE, 2016-04-14)
Nowadays a significant part of human-human interaction takes place over distance. Tele-operated robot avatars, in which an operator's behaviours are portrayed by a robot proxy, have the potential to improve distance ...
• #### Personality Perception of Robot Avatar Teleoperators in Solo and Dyadic Tasks ﻿

(Frontiers, 2017-05-23)
Humanoid robot avatars are a potential new telecommunication tool, whereby a user is remotely represented by a robot that replicates their arm, head, and possible face movements. They have been shown to have a number of ...
• #### Pico in the Wild: Replacing Passwords, One Site at a Time ﻿

(Internet Society, 2017-04-29)
Passwords are a burden on the user, especially nowadays with an increasing number of accounts and a proliferation of different devices. Pico is a token-based login method that does not ask users to remember any secrets, ...
• #### Polymorphism, subtyping, and type inference in MLsub ﻿

(Association for Computing Machinery, 2017-01-01)
We present a type system combining subtyping and ML-style parametric polymorphism. Unlike previous work, our system support type inference and has compact principal types. We demonstrate this system in the minimal language ...
• #### Poster Abstract: Bridge structural monitoring through a vibration energy harvesting wireless sensor network ﻿

(Association for Computing Machinery, 2016-11-17)
• #### Practicalities of predicting quality of high dynamic range images and video ﻿

(2016-08-03)
© 2016 IEEE.The paper discusses the use of existing metrics, such as HDR-VDP and extensions of MS-SSIM and PSNR, for prediction of quality in high dynamic range (HDR) images and video. The discussion is based on the ...
• #### The practices of programming ﻿

(2016-11-08)
© 2016 IEEE.How diverse are the ways that programming is done? While a variety of accounts exist, each appears in isolation, neither framed in terms of a distinct practice, nor as one of many such practices. In this work ...
• #### A Proposition-based Abstractive Summarizer ﻿

(International Committee on Computational Linguistics, 2016-12-11)
Abstractive summarisation is not yet common amongst today's deployed and research systems. Most existing systems either extract sentences or compress individual sentences. In this paper, we present a summariser that works ...
• #### Queues Don’t Matter When You Can JUMP Them! ﻿

(USENIX Association, 2015-03-27)
QJUMP is a simple and immediately deployable approach to controlling network interference in datacenter networks. Network interference occurs when congestion from throughput-intensive applications causes queueing that ...
• #### Randomized diffusion for indivisible loads ﻿

(2015-01-01)
• #### Randomized Load Balancing on Networks with Stochastic Inputs ﻿

(Leibniz International Proceedings in Informatics, 2017-07-14)
Iterative load balancing algorithms for indivisible tokens have been studied intensively in the past. Complementing previous worst-case analyses, we study an average-case scenario where the load inputs are drawn from a ...
• #### Randomized rumor spreading in dynamic graphs ﻿

(2014-01-01)