School of Computer Science

Results: 3584



#Item
11Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
12Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2018-07-28 03:46:38
    13Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu  Abstract

    Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-06-03 17:05:03
    14Testing a Saturation-Based Theorem Prover: Experiences and Challenges Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,2 1 School  of Computer Science, University of Manchester, UK

    Testing a Saturation-Based Theorem Prover: Experiences and Challenges Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,2 1 School of Computer Science, University of Manchester, UK

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-07-31 12:00:20
    15SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

    SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

    Add to Reading List

    Source URL: crysp.uwaterloo.ca

    Language: English - Date: 2018-08-13 15:14:33
    16A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

    A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    17Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

    Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

    Add to Reading List

    Source URL: afnom.net

    Language: English - Date: 2018-10-16 09:54:50
    18LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

    LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    19Revisiting Question Answering in Vampire Giles Reger School of Computer Science, University of Manchester, UK The 4th Vampire Workshop

    Revisiting Question Answering in Vampire Giles Reger School of Computer Science, University of Manchester, UK The 4th Vampire Workshop

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-08-08 02:42:18
    20Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

    Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2007-06-27 11:48:43