University of Birmingham

Results: 2922



#Item
1Stochastic Model Checking? Marta Kwiatkowska, Gethin Norman, and David Parker School of Computer Science, University of Birmingham Edgbaston, Birmingham B15 2TT, United Kingdom  Abstract. This tutorial presents an overvi

Stochastic Model Checking? Marta Kwiatkowska, Gethin Norman, and David Parker School of Computer Science, University of Birmingham Edgbaston, Birmingham B15 2TT, United Kingdom Abstract. This tutorial presents an overvi

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2011-06-22 09:34:32
2The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonz´alez Toro School of Computer Science, University of Birmingham, UK Abstract. It is known

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonz´alez Toro School of Computer Science, University of Birmingham, UK Abstract. It is known

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
3Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
4A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

Add to Reading List

Source URL: afnom.net

Language: English - Date: 2018-10-16 09:54:50
6LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
7Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2007-06-27 11:48:43
8University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014)

University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014)

Add to Reading List

Source URL: www.chiaramingarelli.com

Language: English - Date: 2015-05-06 01:44:17
9An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education Tom Chothia School of Computer Science University of Birmingham, UK

An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education Tom Chothia School of Computer Science University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
10Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24