Sciweavers

BCS
2008
13 years 6 months ago
Distributed Defence Against Denial of Service Attacks: A Practical View
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
Gülay Öke, Georgios Loukas
BCS
2008
13 years 6 months ago
Improved SIFT-Features Matching for Object Recognition
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...
Faraj Alhwarin, Chao Wang, Danijela Ristic-Durrant...
BCS
2008
13 years 6 months ago
Implications of Electronics Technology Trends to Algorithm Design
Scaling of electronics technology has brought us to a pivotal point in the design of computational devices. Technology scaling favours transistors over wires which has led us into...
Daniel Greenfield, Simon W. Moore
BCS
2008
13 years 6 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
BCS
2008
13 years 6 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
BCS
2008
13 years 6 months ago
A Vision of the Next Generation Internet: A Policy Oriented Perspective
Network Architecture (PONA) and an abstract two part protocol stack with a virtualization layer in between. We also introduce the concept of generalized communication end-points
Subarthi Paul, Raj Jain, Jianli Pan, Mic Bowman
BCS
2008
13 years 6 months ago
Compiling C-like Languages to FPGA Hardware: Some Novel Approaches Targeting Data Memory Organisation
This paper describes our approaches to raise the level of abstraction at which hardware suitable for accelerating computationally-intensive applications can be specified. Field-Pr...
Qiang Liu, George A. Constantinides, Konstantinos ...
BCS
2008
13 years 6 months ago
Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
Much of the traffic carried by Sensor Networks will originate from routine measurements or observations by sensors which monitor a particular situation, such as the temperature an...
Erol Gelenbe, Edith C. H. Ngai
BCS
2008
13 years 6 months ago
Contexts for Human Action
We argue that the mathematics developed for the semantics of computer languages can be fruitfully applied to problems in human communication and action.
Graham White