School of Computer Science

Results: 3584



#Item
11Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
12

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2018-07-28 03:46:38
    13Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

    Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-06-03 17:05:03
    14Theoretical computer science / Formal methods / Mathematical logic / School of Computer Science /  University of Manchester / Mathematics / Logic in computer science / Automated theorem proving / Formal verification / SPASS / Andrei Voronkov / Vampire / First-order logic

    Testing a Saturation-Based Theorem Prover: Experiences and Challenges Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,2 1 School of Computer Science, University of Manchester, UK

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-07-31 12:00:20
    15Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol

    SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

    Add to Reading List

    Source URL: crysp.uwaterloo.ca

    Language: English - Date: 2018-08-13 15:14:33
    16Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

    A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    17Computing / Hacking / Human behavior / Information and communications technology / Telephone tapping / Computer programming / Hacker / Internet security / Wargame / Security hacker

    Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

    Add to Reading List

    Source URL: afnom.net

    Language: English - Date: 2018-10-16 09:54:50
    18Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

    LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    19Automated theorem proving / Resolution / IP / X0 / Vampire / Mathematics / Propositional calculus / Logic

    Revisiting Question Answering in Vampire Giles Reger School of Computer Science, University of Manchester, UK The 4th Vampire Workshop

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-08-08 02:42:18
    20Media access control / IEEE 802 / Computing / Data transmission / Ethernet / Wireless networking / IEEE 802.15.4 / Carrier-sense multiple access with collision avoidance / Carrier-sense multiple access / Medium access control / Zigbee / Exponential backoff

    Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2007-06-27 11:48:43
    UPDATE