Birmingham

Results: 8627



#Item
1Mathematics / Temporal logic / Mathematical analysis / Mathematical logic / Formal languages / Model theory / Generalized functions / Computation tree logic / Logic in computer science / Linear temporal logic / Interpretation / IP

Stochastic Model Checking? Marta Kwiatkowska, Gethin Norman, and David Parker School of Computer Science, University of Birmingham Edgbaston, Birmingham B15 2TT, United Kingdom Abstract. This tutorial presents an overvi

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2011-06-22 09:34:32
2BitTorrent / Peer-to-peer file sharing / File sharing / Computing / Comparison of BitTorrent clients / Torrent file / The Pirate Bay / Copyright infringement / Peer-to-peer / Peer exchange / Torrent poisoning

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonz´alez Toro School of Computer Science, University of Birmingham, UK Abstract. It is known

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
3Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
4Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Computing / Hacking / Human behavior / Information and communications technology / Telephone tapping / Computer programming / Hacker / Internet security / Wargame / Security hacker

Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

Add to Reading List

Source URL: afnom.net

Language: English - Date: 2018-10-16 09:54:50
6Oral history / Maria Rogers Oral History Program / Queens Memory Project / Queens Library / Public library / Hennepin County Library / Library / New York City / Education in the United States / Geography of New York state) / John Sessions Memorial Award

Module 3 : Promotion examples Press Releases Austin Public Library / Austin History Center: ​The History Center ​announces a special Family Day at the Archives. Birmingham Public Library: ​Press Release recruiting

Add to Reading List

Source URL: archive-it.org

Language: English - Date: 2018-04-25 19:46:12
7Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
8Media access control / IEEE 802 / Computing / Data transmission / Ethernet / Wireless networking / IEEE 802.15.4 / Carrier-sense multiple access with collision avoidance / Carrier-sense multiple access / Medium access control / Zigbee / Exponential backoff

Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2007-06-27 11:48:43
9California Institute of Technology faculty / Chiara Mingarelli / University of Birmingham / Birmingham / Supervisor / Doctor of Philosophy / Science and technology in Canada / Science and technology in Italy / Science

University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014)

Add to Reading List

Source URL: www.chiaramingarelli.com

Language: English - Date: 2015-05-06 01:44:17
10Education / Educational psychology / Human behavior / Educational assessment / Flag / Capture the flag / Exercise / CTFS / VM / Formative assessment / Educational technology / Test

An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education Tom Chothia School of Computer Science University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
UPDATE